The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Transmit antenna selection is very common technique to reduce system complexity and power consumption at transmitter side while maintaining nearly the same performance of multiple antennas. In this paper, we introduce a transmit antenna selection (TAS) scheme for non orthogonal multiple access (NOMA) to improve the performance in terms of total sum rate. We consider a downlink multiuser multi-input...
Wireless sensor networks (WSNs) have the security vulnerabilities caused by the limited capacity of sensor nodes. So, there are various defense schemes against attacks on the network layer. For example, there is a scheme for detecting compromised node while sensing data transmission from the source to the base station. The checkpoint based multi-hop acknowledgement scheme (CHEMAS) was proposed to...
Statistical en-route filtering scheme is proposed by Ye et al to detect and drop a fabricated report. In this paper, we propose a fuzzy based path renewal method.
In many wireless sensor network (WSN) applications, sensor nodes are deployed in unattended environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. Sensor nodes are subject to compromise physically and surreptitious use by an adversary. The adversary can capture them to inject an incorrect data into the sensor field in order to reduce network...
Wireless sensor networks are generally deployed in hostile environment so the security service is the essential part of wireless sensor networks. To achieve the security service, key management is the fundamental one. Many key management schemes have been proposed considering the characteristics of sensor nodes. Despite the advances of key management techniques, wireless sensor networks still have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.