The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate a Raptor-coded distributed noncoherent scheme based on a non-orthogonal spacetime modulation (NOSTM) signal and a dynamic decode-andforward (DF) relaying scenario. The distributed NOSTM signal is firstly proposed based on unitary space-time modulation (USTM) and spatial multiplexing (SM). The dynamic DF relaying protocol is investigated to process the non-orthogonal feature...
There is an unfairness between long-term TCP flows and short-term TCP flows because of the single queue and first-in-first-out scheduling algorithm in access point (AP) in WLAN. This paper suggests a priority scheduling algorithm. In the algorithm AP maintains one queue with a timer for each TCP flow. The scheduled orders of queues are based on values of timers. Network Simulator (NS) is used to simulate...
Wireless Industrial communications is emerging technology after the Fieldbus in industrial field. Since the industrial control application is needed in wireless industrial technologies, WIA-PA standard is defining the protocol suite, system management, gateway, and security for low-data-rate wireless connectivity with fixed, portable, and moving devices supporting limited power consumption requirements...
Noninteractive deniable authentication protocol is vulnerable to the receiver key compromise impersonation attack, which are owing to the reason that the authentication message is computed from the receiver's private and some other public values. Consequently, in order to be suitable for evaluation the security of noninteractive deniable authentication protocol, we have to redefine the attribute of...
WiMAX security has two goals, one is to provide privacy across the wireless network and the other is to provide access control to the network. The security sub-layer of IEEE 802.16 employs an authenticated client/server key management protocol in which the BS, the server, controls the distribution of keying material to the client SS. This paper analyzes the physical layer threat and MAC layer threat...
WiMAX security has two goals, one is to provide privacy across the wireless network and the other is to provide access control to the network. The security sublayer of IEEE 802.16 employs an authenticated client/server key management protocol in which the BS, the server, controls the distribution of keying material to the client SS. This paper analyzes the physical layer threat and MAC layer threat...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.