Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Identifying sensor holes is one of the important subjects in wireless sensor networks. Holes happen when one or more sensors are not functioning or few sensors are missing during deployment in any designated area. The presence of holes hinders the information flow in sensor networks. Different coverage models are developed and very few or no attempt was made to detect the sensor holes using game models...
Social networks help to bring the special interest groups on a common platform to develop their businesses, share common interest, and bridge the communication. Once you are inside this online community, you can begin to create your own interest group network of friends and eliminate members that do not share common interests or goals. Most popular sites to help in building the social network includes...
The problem of detecting malicious nodes in wireless sensor networks is considered. Since current security mechanisms are inadequate for wireless sensor networks, we must develop a new framework to detect malicious nodes using Zero-Sum game approach and selective node acknowledgements in the forward data path. The first few sections of the paper provide a game model with probability of cost required...
Wireless sensor networks has grown a lot in recent years and offers excellent opportunities in defense related applications such as monitoring environment and collecting data related to antisocial activities. Currently, the needs of wireless sensors have become inevitable in daily life. With the continuous growth of wireless sensor networks in daily life, business, and defense applications, the security...
Future wireless networks will be loaded with voice, messaging, file transferring, multimedia teleconferencing, games, and Web browsing. With the increasing traffic and real time demand the current status of networking cannot meet the demands of future wireless applications. Traffic will be jammed on current wireless channels and customers will enter into a deadlock situation. Therefore, new models...
Power control at the MAC layer in multi-hop transmissions and interference limited link rates of cognitive wireless networks is an important task in cross-layer design. This paper examines the per-node optimal transmission power such that the resulting power consumption may help provide better service in transmission. We examined optimal transmission of power using game theory and analyze the conflicting...
The objective of this research is to provide appropriate cross-layer architecture for wireless cognitive networks for efficient resource allocation and improved quality of service. We proposed the blackboard model, which is known for coordinating multiple agents (cognitive nodes) in a real-time manner, receiving the current state of information from these nodes, providing conclusions basing on information...
While there is an enormous amount of material to study, the usage of internet technology is increasingly shielding the need for textbooks. Currently, students spend lot of money for textbooks, while study material is available on the internet. This internet-based examination system is flexible for teachers to set and control the student examinations. There are many features like information sharing...
The efficient utilization of underutilized spectrum is the main theme of current research. The cognitive radio with the help of Q-learning algorithm is used to detect the presence of primary signals and utilize the spectrum in the absence of primary signals. The proposed Q-learning algorithm model identifies previously known signals and learns to detect the signals which otherwise could not be detected,...
Optimum allocation of spectrum and achieving the best revenue is highly desirable for electronic market places. Currently static allocation of spectrum is underutilized. The majority of the researchers are working to achieve optimum allocation and better utilization of the spectrum. Selecting a better part of the spectrum for bidding is equally important part in the market to transfer the information...
Orthogonal frequency division multiplexing (OFDM) is a promising technology for high data rate transmission in wideband wireless systems for achieving high downlink capacities in future cellular systems. In this paper, first each user is assigned one subcarrier (channel) with best channel-to-noise ratio for the channel and random power for each channel. The goal is to minimize the overall transmission...
In this paper subcarrier and power allocation to each user at base-station maximizes the user data rates, subject to constraints on total power and bit error rate. First, each subchannel is assigned to the user with best channel-to-noise ratio for the channel, with random power distributed by water filling algorithm. The Gao's (2006) subcarrier allocation algorithm was used to calculate the power...
A novel genetic algorithm application is proposed for adaptive power and subcarrier allocation in multi-user OFDM systems. The proposed method is compared with Eshan's [Ehsan Bakhtiari and Babak H. Khalaj, "A new Joint Power and Subcarrier Allocation Scheme for Multiuser OFDM Systems", 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, Beijing, China, Vol. 2, PP 1959...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.