The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Considering the temporal and spatial correlations of sensor readings in wireless sensor networks (WSNs), this paper develops a clustered spatio-temporal compression scheme by integrating network coding (NC), compressed sensing (CS) and spatio-temporal compression for correlated data. The proper selection of NC coefficients and measurement matrix is investigated for this scheme. This design ensures...
In this paper, power allocation schemes are proposed for the total transmit power of the source and the relay in a triplet relaying system based on Bit Error Rate (BER) analysis. Considering Amplify-and-Forward (AF), Decode-and-Forward (DF) for relaying systems and direct transmission (DT) without relay, we perform a fair comparison with respect to their power consumption in order to achieve the same...
The future returns of each securities cannot be correctly reflected by the data in the past, there for the expert's judgement and experience should be considered to estimate the security returns in the future. In this paper, we study mean-semi absolute deviation portfolio selection problem when both the expected return and semi absolute deviation of each underlying asset and vary in estimated intervals...
This paper minimizes the routing security risk while limiting the delivery ratio under an ideal value by 1) finding multiple paths between source and destination node; 2) employing the game theory to obtain the most reliability paths and further optimize shares allocation on these paths; 3) integrating secret sharing scheme, and achieving tradeoff between security risk and delivery ratio according...
In order to approach the theoretical limit of the decode-and-forward strategy for the half-duplex relay channel, distributed LDPC coding schemes have been proposed. In these schemes, the code applied at the source should be decodable at the relay to yield correct parity bits. With the help of the parity bits the destination should also be able to estimate the transmitted information correctly. For...
It is a challenge to thwart both the passive attacks and active attacks in mobile ad hoc networks for their unique characteristics. The improvement of security often sacrifices the delivery rate or other QoS. We propose secure multipath routing scheme based on modified secret sharing as an effective mechanism to protect data confidentiality and simultaneously enhance data delivery rate in mobile ad...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.