Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, the distributed fault detection (FD) problem is addressed for a class of linear stochastic multi-agent systems (MASs). A novel distributed cooperative control scheme is given for reaching bounded formation of the MAS. It is proved that by using relative outputs between neighboring agents, a set of distributed fault detection filters can be designed for each agent to detect the faults...
We consider a collision channel model without feedback based on a time-slotted communication channel shared by K users. In this model, packets transmitted in the same time slot collide with each other and are unrecoverable. Each user accesses the channel according to an internal periodical pattern called protocol sequence. Due to the lack of feedback, users cannot synchronize their protocol sequences,...
The collision channel without feedback (CCw/oFB) model depicts a scenario in which multiple users share a communication channel with random relative time offsets among their clocks. This paper considers an extension of this model, which allows the receiver to use successive interference cancellation (SIC) to iteratively cancel the interference caused by those collided packets that have been decoded...
In this paper, load balancing is defined as the process of allocating workload to reduce the mean job waiting time. In a distributed multi-server system, load balancing is a challenging task if there is no central coordination or time-synchronization among users. In this paper, we present a queuing model for a distributed asynchronous multi-server system. To realize load balancing, we propose a distributed...
A Group Key Agreement (GKA) protocol is necessary for establishing a group key among all of the group members over a public network. The protocol presents a fundamental challenge in secure and efficient group communications. Without the disadvantages of centralized method, Contributory Group Key Agreement (CGKA) is more suitable for dynamic groups. Recently, a Dynamic Asymmetric Group Key Agreement...
Recently, many Internet of Things (IoT) or wireless sensor network (WSN) applications adopt ZigBee as their communication protocol. In these applications, messages may need to be disseminated to some specific objects or nodes using multicast transmissions. However, we observe that the original ZigBee multicast protocol causes extremely high packet overhead and energy consumption. In this work, we...
Information and communication technology (ICT) played a critical role in disaster management in last few decades. One example is the messaging service for disaster alerts, rescue workers, and victims. Many of these messaging services are developing based on existing messaging services and in ad hoc manner to meet the communication requirements in different disaster scenario. However, most, if not...
RFID is a non-contact technology using radio frequencies to achieve automatic and unique identification. It has been widely applied in various areas, such as access management, toll collection, and contact less payment. However, because the information transmission medium between readers and tags is radio frequency, it is easy for attackers to eavesdrop on or tamper with data. Hence, creating a secure...
We report a squeezed-state measurement-device-independent quantum key distribution protocol, which could greatly increase the maximum transmission distance and enhance the robustness to channel noise than the coherent-state based protocol.
We propose a modified no-switching continuous-variable quantum key distribution protocol to improve the secret key rate and maximum transmission distance by inserting a noiseless linear amplifier at the output of quantum channel. Security analysis shows that a noiseless linear amplifier with gain g can increase the maximum transmission distance of no-switching protocol by 100log10g km
Internet of Things (IoT) has been widely researched over the past decade. Recently, many research results of IoT related to emergency system, smart building and medical system, etc. The key for IoT applications are the ability to interact with physical world through computation, communication, and machine control. However, each sensor device in IoT cannot conveniently communicate with other terminal...
This paper proposes a low power multi-Lane Mobile Industry Processor Interface (MIPI) Camera Serial Interface 2 (CSI-2) receiver architecture which adopts an 8-Byte parallel CSI protocol layer for hardware implementations. The proposed scheme can work in environment with 4 data Lanes and 1 Gb/s per data Lane, i.e. with maximum data rate 4 Gb/s, at 62.5 MHz which increases logic operations from 8 ns...
With the advances of network technology, electronic auctions have become increasingly popular in recent years. In 2012, Xiong <etal/> proposed a bidder-anonymous auction scheme based on revocable ring signature to enhance the computation efficiency and provide a dispute protocol. Nevertheless, we find that it has design weaknesses and is vulnerable to denial-of-service attacks. Furthermore,...
In recent years, counterfeiters have become a menace to industry worldwide. This problem is not specific to certain products or countries. More and more RFID applications to solve malicious behaviors have been presented. However, these RFID applications still existed some disputes and not conform to EPCglobal Class 1 Generation 2 (C1G2) standards. Most techniques are not suitable for on-line automatic...
This paper proposes a hybrid concurrency control scheme for transactional composite services. The scheme uses the information gathered from the workflow specifications of the composite services to reduce the overhead in detecting cycles in the serialization graph. The scheme carries out runtime analysis of the SQL statements used by the composite services to determine whether the clients that execute...
In this paper we propose an anti-collision algorithm named IBTA for Radio Frequency Identification (RFID) when tag collision problem occurred. RFID is a flagship technology that has been developed for years since 1990s. Because of the shared wireless channel between RFID reader and tags during communication, the tag collision problem is a matter of significance to the performance of a RFID system...
It is well known that in general, feedback cannot increase the capacity of a discrete memoryless channel. However, it can help simplify the complexity of encoding and decoding. Schalkwijk and Kailath (1966) developed a class of block codes for Gaussian channels with ideal feedback. They showed that the probability of decoding error decreases as a second-order exponent in block length for rates below...
With the development of large scale integrated circuit, internet communication, information security and so on, Radio frequency identification (RFID) technology has entered the commercial application stage, to be the most actively and promising high-tech in modern information technology field it plays a tremendous role in promoting humanity enters a information-based and digital society. Now a big...
A composite service consists of many Web Services. The execution of a composite service is conducted by an execution engine according to the workflow specification. Since different composite services might share and access some of the Web Services concurrently, ensuring the correctness of the concurrent execution of the composite services becomes an important issue. This paper proposes a concurrency...
RFID system is gaining popularity and attracting interest from both the enterprises and academic institutes. But now, we face several security problems and challenges in RFID systems. In human centric applications, location privacy problem is the most important issue that should be solved. In this paper, we propose a RFID authentication scheme that achieves the goal of location privacy. We also cite...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.