The remainder of this paper is organized as follows. In the
next section, we describe our system setup and channel model.
In Section III, we discuss the conventional “threshold” method
and its shortcomings. Our proposed method is presented in Section
IV. Numerical results are presented in Section V, including
throughput comparisons between the “threshold” method and
our proposed method. Finally, we conclude in Section VI.