The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of both economy and society,service always requires higher and higher security and quality.However, since security services always induce extra resource consumption, QoS may descend evidently. It is important and essential to find optimal solutions that can not only achieve enough level of security, but also meet as high QoS as system can. In this paper, we propose an entity,...
High energy-efficiency and low transmission delay are most important for periodical data gathering applications in wireless sensor networks (WSNs). Therefore, the product of energy consumption and transmission delay, EnergyxDelay is a good metric for such performance evaluation. This paper presents a distributed energy-efficient and delay-aware data gathering protocol, which is efficient in the ways...
Mobile ad hoc networks are a type of mobile network that functions without any fixed infrastructure. Routing protocols are vital for the proper functioning of ad hoc networks. In the present routing protocols, data is transmitted after choosing shortest path without any consideration of any particular node's traffic which raises the problem of delay of transmission and unbalanced energy consumption...
Modular design is a common approach for dealing with complex tasks in modern cryptology. The critical of this approach is to design a secure hybrid protocol. In this paper, we study password-based key exchange in the three-party setting within the UC framework and design a hybrid protocol that UC-securely realizes such task. Next we partition the task into two sub-tasks, three-party key distribution...
Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. They provide network access for both mesh and conventional clients. Wireless mesh networks is put forward as one important technology of the access of various broadband. The integration of WMNs with other networks such as the Internet, cellular, IEEE 802.11,...
Accurate identification of Link4A is the premise of performing effective jamming. Based on instantaneous information identification algorithm, three key features, including two new ones, are extracted which are used to identify 2FSK modulation signal: the maximum value of the spectral power density of the normalized-centered instantaneous amplitude gammamax, the mean of the absolute value of instantaneous...
To avoid random and blindfold forwarding decision in spray and wait routing in delay tolerant network, Binary Spray and Wait routing based on average delivery probability is proposed in this paper. Based on delivery predictability of PROPHET, average delivery predictability is proposed and used in Binary Spray and Wait routing to make forwarding decision. Furthermore, we evaluate it through simulations...
LDT and LDT-P Algorithms are proposed, which fit for linear and parallel service composition respectively .Composition Agent is responsible for searching components and generating a least delay tree. Then candidate paths are found by visiting the tree nodes with the depth-first traversal scheme. At last a path is selected for composed service considering the capability of the nodes and the bandwidth...
Wireless sensor networks (WSNs) have unlimited and extensive potential application in different areas. Right now, how to integrate WSNs into the web service is an issue in related research related areas. In this paper, firstly, we do a survey on related research work, then we put forward a delay tolerant wireless sensor web service framework (DTN-WSNWS), after that we build corresponding queuing model...
A blind multiuser receiver is proposed for multiuser detection of UWB systems in a realistic indoor channel. The proposed blind multiuser receiver is based on the constant-modulus algorithm (CMA), which is known to provide satisfactory performances in a blind setting. In order to overcome the CMA interference capture problem typical of a multiuser scenario, we propose to adopt a two stage receiver:...
This paper investigates the robust stability of uncertain neural networks with time-varying delays and Markoian Jump parameters. The norm-bounded uncertainties are included in the system matrices. The constraint on time-varying delays is removed, which means that a fast time-varying delay is admissible. Some new delay-dependent stability criterions are presented by using Lyapunov-Krasovskii function...
The enduring changes of operate demands in network stimulate the production & development of new protocols and new algorithms. But designing and calculating these protocols and algorithms concern many problems. Although it is valuable of the practical experiment in the real circumstance like laboratory and test bed, they lack proper flexibility and expansibility. Under this circumstance, Network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.