The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the front cover or splash screen of SoftCOM 2012, 20th International Conference on Software, Telecommunications and Computer Networks proceedings.
In this paper, a novel weighted zero-attracting leaky-LMS (WZA-LLMS) adaptive algorithm for sparse systems is proposed. In the proposed algorithm, a log-sum penalty is incorporated into the cost function of the leaky-LMS algorithm, which results in a shrinkage in the update equation. This shrinkage gives the algorithm the ability of attracting zeros, i.e., when the system is sparse, and hence improves...
In this paper we evaluate the outage probability in cooperative networks using the channel conditions in order to select the best four relays from a set of N relays and then the chosen relays are used for cooperation between the source and the destination. Expressions for outage probability are derived for a frequency flat Rayleigh-fading environment by using theoretic analysis of the probability...
Method of selecting the optimal antenna design for a mid-range wireless transmission of energy is applied on a class of spherical helical antennas in the paper. The effect of finite conductivity of wires on transmission performances and some methods for counteracting it are considered. It is shown that the selection of optimum antenna design depends neither on surface resistance nor on radius of conductor...
The achieving of the best ratio of performance to energy consumption and at the same time assuring manageability is an important goal towards the design of Future Networks. This paper presents a general problem formulation for Energy-Aware Traffic Engineering (ETE) and proposes a distributed, heuristic ETE scheme that provides load balancing and energy-awareness in accordance with the operator's needs...
The vehicular ad-hoc network (VANET) is one form of mobile ad-hoc networks (MANETs). Vehicles in a specific area can compose VANET to provide a variety of safety-related services. Each vehicle should broadcast its beacon message periodically to form VANET. Moreover, it is a crucial task to disseminate beacon messages of each vehicle for road safety. However, if there are lots of vehicles on the road,...
Lightning electromagnetic field and its induced effects in conductive structures, electric circuits and systems can be estimated based on some of the lightning stroke models. Engineering models, such as modified transmission line models, include attenuation factors and channel-base current functions that both determine electromagnetic field components. Electric and magnetic field waveshapes are presented...
This paper investigates the thermal rise in the human eye caused by EM wave exposure at frequencies of 1 GHz, 2 GHz, 4 GHz and 6 GHz. The power density of the incident plane wave is 10 W/m2. Because an eye under the influence of EM wave is unbounded EM scattering problem the method used for the computation of EM fields inside the 3D model of an eye is hybrid BEM/FEM using edge elements. It has been...
The recent deployment of LTE and IMS networks was not always beneficial. It also introduced new challenges for mobile network operators, researchers and industry experts. To be more precise, the dominant usage of the Diameter protocol in mobile signaling networks is getting increasing consideration in terms of interoperability, scalability and security. This paper briefly presents significant efforts...
In WTFC to TCP flow control proxy the induced loss algorithm is used to slow down TCP sender located in the TCP domain. When congestion arises in the WTFC domain, packets begin accumulating in the proxy buffer. In our previous work, the original algorithm is optimized for the case of equal delay on both domains. In the more likely case that WTFC and TCP domains have different delays, the algorithm...
This paper discusses possibility of introducing broadband USO in Croatia. We investigate the issues related to financing broadband in rural areas in Croatia and the main targets of the Croatian national broadband strategy. Furthermore, we give the main results from the report from the European Commission and try to position Croatia and compare necessary costs with other EU countries regarding the...
In this article, we propose a P2P-based mobility management protocol for global seamless handover in heterogeneous wireless networks. Unlike previous mobility management protocols such as IETF MIPv4/6 and its variants, the proposed protocol can support global seamless handover without changing the existing network infrastructure. The idea of the proposed protocol is that the location management function...
Radio Frequency IDentification (RFID) technology is increasingly becoming popular, for its widespread use and more sophisticated applications. Any prospect application is preferred to be simulated before implementation. Here, a Slot Counter algorithm (from the EPC Class 1 Generation 2 protocol) is presented, and compared to a commercially available UHF-RFID reader for the validation. For the comparison,...
The single characteristics of vehicular communications, the various network scenarios, and the traffic load generated by a wide range of vehicular applications are key aspects that make challenging to select an appropriated routing protocol for these networks. In such a context, this paper presents a simulation-based performance analysis study of store-carry-and-forward routing protocols for vehicular...
The Smart Factory concept has been enabled in the last few years thanks to both Wireless Sensor Networks (WSNs) and Radio-Frequency IDentification (RFID) technologies. Although the two technologies have been adopted in isolation in factory automation applications, their partial integration start to be considered in different research fields. In this work, we propose a fully integrated approach between...
In this paper we present a general expression for the generator matrix of array low-density parity-check codes. This is a further contribution towards understanding the inner structure of these codes. Moreover, it represents a useful tool that can be used in the estimation and optimization of their minimum distance, which is an open problem. By using the new form of the generator matrix, we derive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.