The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Some typical MAC protocols have been proposed for multi-hop CR network recently. In a multi-hop MAC protocol, a node uses the common control channel to perform channel negotiation before data transmission. Recent research findings indicate that insecure transmission of control channels open vulnerable holes for the Denial of Service attacks. This paper makes a security analysis for CR network MAC...
Cognitive radio network has received increasing attention in recent few years. Cognitive radio network is viewed as a novel network for improving the utilization of a precious natural resource: the radio electromagnetic spectrum. This paper first gives a general overview of the background and concept of cognitive radio network. Then we focus on the routing algorithm based on the QoS requirement. In...
To meet the dynamic spectrum access of cognitive radio (CR), the selfish game-theoretic model is identified for multi-hop networking with CR nodes, which matches well with the physical administrative structure in real-life situations. This paper investigates user communication session via a cross-layer optimization approach, with joint consideration of power control, scheduling, and routing. Both...
The advent of microarray technologies has made the experimental study of gene expression faster and more efficient. It is an important task to analyze the gene expression data acquired from the microarray experiments. Biclustering is a popular method to search a subset of genes which exhibit similar expression patterns along a subset of conditions in the gene expression matrix. In this paper, we propose...
Wireless indoor positioning systems have become very popular and attractive in recent years. These systems have been successfully used in many fields such as asset tracking and inventory management, and location fingerprinting schemes are the most promising technique because of technical restrictions. However, how to optimize the location of access points to improve the positioning accuracy is still...
Multi-channel MAC protocols have recently been proposed to improve the throughput of wireless networks. In this paper, many multi-channel MAC protocols for wireless networks are studied. The classification standards for multi-channel MAC protocols are firstly described, and then the key mechanisms of the existing representative MAC protocols are analyzed. At last, comparison of the characteristics...
With the rapid development of wireless networks, location aware services are becoming more and more attractive especially in indoor areas. To provide location aware services, obtaining the position of a user accurately is vital and using existing communications infrastructure is preferred for cost reasons. In recent years, location fingerprinting schemes are still the most promising because of technical...
Cognitive radio is a new technology which can sense the availability of local spare spectrum and be used to communicate with each other. In a multi-hop network consisted of cognitive radio nodes, the spectrum sharing for each cognitive radio node is very important. In real condition, as the number of users in different fixed regions is diverse, the dynamic spectrum sharing strategy should be dissimilar...
Efficient scheduling of parallel applications in a dynamic environment reveals several challenges due to its high heterogeneity, dynamic behavior, and space shared utilization. In this paper, first we compared some typical scheduling strategies and pointed out their shortcomings, and then we proposed a new scheduling strategy based on an advanced genetic algorithm, finally we simulated the strategy...
To investigate how to support user communication sessions in cognitive radio (CR), the radio technology should jointly perform power control, scheduling, and flow routing, which are generated by a multi-hop wireless network. With the adjustments of migrating nodes to neighboring nodes, a bandwidth footprint tree (BFT) is defined in this paper. Based on reducing hot spots approach, the distributed...
Cognitive radio networks is recognized as the technology to solve the problem of spectrum shortage and promote the efficient use of the spectrum. However, the research of CR networks technologies only stays in the theoretical stage recently. Therefore, developing a CR networks platform becomes an urgent problem to solve. Several CR platforms have being deployed by the research community. However,...
With the introduction of resource-rich mobile elements into wireless sensor networks, the energy-efficiency of such network can be enhanced. In this paper, we study the deployment problem of these mobile elements. A novel potential-field-based coordination protocol, named aggregator deployment protocol for energy conservation (ADPEC) for wireless sensor networks is proposed. The proposed protocol...
In this paper, a novel scalable scheme, scalable data aggregation monitoring (SDAM), is proposed for efficient data gathering with aggregation (fusion) in wireless sensor networks (WSN). Different from existing schemes, SDAM not only optimizes data transmission cost, but also incorporates the function of data fusion, which is crucial for emerging sensor networks with data management and high availability...
This paper is mainly devoted to analyze the efficiency of security administration and assurance of virtual organization(VO) in autonomous domains. For grid applications, access control is usually implemented through mapping VO-space users to autonomous domains' local users, which reduces the efficiency of security administration and bears the risk of violating security policy of these domains applying...
In wireless sensor networks, Energy efficiency is the most important performance target to prolong the networks lifetime. As the idle listening of sensor nodes result in primary energy waste, many typical MAC protocols are designed to save power by placing the radio in the low-power sleep mode, however, such schemes can lead to sleep latency problems in multi-hop transmissions. This paper analyses...
Recently RFID has been applied in many different areas such as supplying chain management and inventory control. While the RFID system has many advantages, however, it may create new problems to the user's privacy. In this paper, we propose a new architecture of RFID system which designs a special data privacy protection module in traditional RFID system for protecting users' privacy. And the new...
Although many outdoor location techniques have been proposed, these techniques are ideal outdoors but they are generally not available indoors. With the increasing use of mobile computing devices and an expansion of wireless local area networks (WLAN), there is growing interest in an indoor wireless positioning systems based on WLAN infrastructure. This paper proposes a method that is based on IEEE...
Wireless mesh networks (WMNs) will play an important role in the next generation wireless communication systems because it can support broadband services with ubiquitous coverage by low transmission power. However, the question will be caused by using the shortest path routing protocol such as DSR and AODV in such multi-hop networks. Load unbalance of nodes will sharply degrade the traffic quality...
With the development of microarray technologies, biclustering is becoming an important method to analyze gene expression data. This method searches a subset of genes and a subset of conditions in a given matrix, such that the genes have the similar behaviors over the conditions. Biclustering is an NP- complete problem, so some researches are devoted into finding a good algorithm to solve the problem...
A great challenge of media access control design is brought by wireless sensor networks. Many schemes have been proposed, most of which are based on contention or TDMA. In this paper, we research on contention based MAC protocol for WSN, and present an advanced scheme with adjustable sleep mode based on T-MAC. The performance analysis show that the new scheme can further reduce the active time and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.