The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Spatial modulation (SM) is proposed to both achieve a high energy efficiency (EE) and low implementation complexity, which attracts a lot of academic interests. Generalised SM (GenSM) is proposed to achieve a higher spectral efficiency (SE) than traditional SM system, and there are many researches about detection in GenSM system. In this paper, we propose a novel low-complexity detection algorithm...
In In-band Full-duplex (IBFD) wireless networks, the RTS/CTS mechanism is unable to establish an asymmetric dual link and to recognize the transmission mode of communication nodes to capture more opportunities of IBFD transmission, which limits total network throughput. In this paper, we propose a novel distributed IBFD MAC mechanism to establish symmetric/asymmetric dual link in wireless networks...
Cloud Radio Access Network (C-RAN) is a cost-effective solution for cellular operators which not only offers resource allocation and interference management flexibility, but also helps them enhance the energy efficiency of the network. The key character of the C-RAN architecture is a centralized Baseband Unit (BBU) pool which consists of high-capacity processing units and real-time virtualization...
This paper compares the energy consumption of non-cooperative schemes and the Selective Decode and Forward (SDF) cooperative protocol in Wireless Sensor Networks. This Analysis was performed over Nakagami-m channel, under Outage probability and system end-to-end throughput constraints. Under these constraint, we assume that in multi-hop and cooperative schemes scenarios, the nodes operate at a spectral...
Preserving privacy in Big data is one of the most debated topics of computer security. The fast growing volume of data and the need of companies to extract value from that data creates new complicated and serious security challenges. Despite its wide spread, the common use and the popularity of Big data paradigm, significant risks and challenges are inherent to this new concept, especially when we...
A wideband rectangular patch antenna is presented and experimentally investigated in this paper to covering X- and Ku-Bands. The results are given in terms of the reflection coefficient, and the radiation pattern, and the realized gain. The simulated and experimental results are in agreement. The measured result shows that the wideband antenna works around two resonant frequencies of 11.073 GHz and...
In this paper, we present a new efficient authenticated key agreement protocol. Compared with other cross-domain protocols which are all in the same cryptosystem, our protocol is innovatively designed to shift between the Public Key Infrastructure (PKI) and the Identity-based Cryptosystem (IBC). This protocol combined with heterogeneous signcryption method is proved to satisfy confidentiality and...
Homomorphic encryption is a well established means for performing operations on encrypted data. In many real-world applications however, the need arises to perform division over integers and yield a floating point result. This cannot be performed in the encrypted domain of most homomorphic encryption schemes. Thus, one has to resort to Secure Two Party Computation which suffers from high communication...
We propose a trust management system (TMS) for the social Internet of things (SIOT) called TMCoI-SIOT. The proposed system integrates numerous factors such as direct and indirect trust; transaction factors and social modeling of trust. The novelty of our approach can be summed up in three aspects. The first aspect concerns the network architecture which is seen as a set of nodes groups called community...
Communication protocols have been designed according to a layered stack architecture, but with the evolution of networks, this layered stack system cannot meet the wireless network requirements. In sensor networks, and specifically the routing issue, given the need to conserve sensor energy and maximize application performance, cooperation between several layers in the protocol stack is needed. This...
IMS (IP Multimedia Subsystem) is confronted to various evolutions. The purpose of these evolutions is mainly to enhance subscriber experience by offering a variety of services that meets his needs and requirements. This variety of services and features involves interactions between different actors such as operators, service providers and subscribers. A meaningful mass of information within networks...
Nowadays Cloud computing services are becoming a necessity due to the huge evolution of internet technology and the need of outsourcing data into external servers. However, data externalization introduces several issues. Access control is one of the most challenging issues, it must ensure data confidentiality through enforced and flexible access policies. Revocation is one of the important tasks of...
For classification data, we use Wireless sensor networks (WSNs) as hardware for collecting data from harsh environments and controlling important events in phenomena. To evaluate the quality of a sensor and its network, we use the accuracy of sensor readings as surely one of the most important measures. Therefore, for anomalous measurement, real time detection is required to guarantee the quality...
Minimizing latency is a major issue for data aggregation in wireless sensor networks (WSNs). Hence, the proposed algorithms must achieve the minimum delay in data delivery while decreasing the energy consumption. In this paper, we propose a new version of the prefix frequency filtering technique (PFF) proposed by [1], which aims to minimize aggregation latency. PFF finds similar sets of data generated...
In this paper, we propose a geometric positioning technique for cooperative localization in Wireless Networks. The proposed technique is based on building geometric constraints from radio observables. These constraints are then merged to estimate the true position. In this paper we address situations where blind nodes, due to the lack of radio observables, cooperate to estimate their positions. Compared...
This research focuses on developing a positioning algorithm for Optical Wireless Communication (OWC) based indoor positioning systems. The proposed Two Receiver Indoor Positioning (TRIP) algorithm has the potential to overcome the light beam overlapping problem and locate the position of an object in an indoor environment precisely. The current research builds upon a previously proposed positioning...
Nowadays, many wireless sensor networks have been distributed in the real world to collect valuable raw sensed data. The challenge is to extract high-level knowledge from this huge amount of data. However, the identification of outliers can lead to the discovery of useful and meaningful knowledge. In the field of wireless sensor networks, an outlier is defined as a measurement that deviates from the...
In this paper, a novel broadband dual-polarized (slant ±45°) base station antenna element operating at 790–960 MHz is proposed. The antenna element consists of two pairs of symmetrical dipoles, four couples of baluns, a cricoid pedestal and two kinds of plastic fasteners. Specific shape metal reflector is also designed to achieve stable radiation pattern and high front-to-back ratio (FBR). All the...
The use of highly directional antennae in wireless networks has been shown to increase network capacity. As the beamwidth decreases, near perfect alignment is required to achieve these capacity gains. This becomes particularly challenging in mobile adhoc networks, leading to high alignment delay. In this paper, we explore ways of mitigating alignment delay in practical delay tolerant networks (DTNs)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.