The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which are not, and instantly move into vacant channels while avoiding occupied ones. This optimizes the use of available radio-frequency (RF) spectrum while minimizing interference to other users. In this paper, we propose a new approach which uses the...
Conference proceedings front matter may contain various advertisements, welcome messages, committee or program information, and other miscellaneous conference information. This may in some cases also include the cover art, table of contents, copyright statements, title-page or half title-pages, blank pages, venue maps or other general information relating to the conference that was part of the original...
As bandwidth is a scarce resource in Wireless Mesh Networks (WMNs), a primary challenge of such networks is to design an effective bandwidth management mechanism. This paper presents a new scheme for bandwidth management using TOPSIS method utilizing a collection of mobile agents or “ants” to perform Quality of Service (QoS) provisioning by dynamic management of bandwidth. We introduce ANTTOPSIS to...
Rural areas of the developing countries lack Information and Communication Technology (ICT) infrastructures such as access network, also known as last mile connectivity, to deliver ICT services. The lack of connectivity is due to high cost of implementing ICT infrastructures. Wireless technologies are envisioned as candidates for rural connectivity. They are not only easier and faster to deploy but...
Cognitive radio (CR) technology is a promising technology that provides opportunistic access to free channels for secondary users (SUs), and enhances the spectrum efficiency [1]. In this paper, we present a novel capacity-aware spectrum allocation model for cognitive radio networks. We first modeled interference constraints based on the interference temperature concept and let the SUs to increase...
Spectrum sensing is a key problem in cognitive radio. However, traditional detectors become ineffective when noise uncertainty is severe. It was shown that the entropy of Gauss white noise is constant in the frequency domain, and a robust detector based on the entropy of spectrum amplitude was proposed. In this paper a novel detector is proposed based on the entropy of spectrum power density, and...
Recently, Mokhtarnameh, Ho, Muthuvelu proposed a certificateless key agreement protocol. In this paper, we show that their protocol is unsecured against a man-in-the-middle attack. In addition, the authors claimed that their scheme provides a binding long-term public key with a corresponding partial private key. In fact, their protocol does not achieve the binding. We propose an improved key agreement...
This paper focuses on the Geometry based Stochastic Channel Model (GSCM) and its application in high speed railway (HSR) multiple-input multiple-output (MIMO) systems. Different probability distribution functions (PDFs) of scatterers are studied and simulation results show that scatterers in Gaussian distribution make the best approximation to the realistic power delay profile (PDP) and power azimuth...
In this paper, a new scheduling scheme is proposed for finite buffer services in time-varying wireless channel environments. With the proportional fair (PF) principle, we propose the use of a time factor (TF) to guarantee the stability of the system as well as shortening the average user delay. The proposed PF-TF algorithm is parametrically adjustable that can be applied under different channel conditions...
This paper proposes a lightweight routing protocol which can satisfy the city taxi-call application. The proposed routing protocol predicts and updates the routing information and uses the greedy algorithm based on hop distance to find routes to destination quickly. The proposed routing protocol performs well in taxi-call applications. We do comprehensive simulations to evaluate the proposed protocol...
With the further development of video, the assessment and optimization of video Quality of Experience (QoE) have become an important issue. Meanwhile, QoE is the main influential factor determining the success of video applications. The paper proposes a novel QoE real-time assessment and QoE-driven Send Bitrate (SBR) adjustment scheme. Firstly, in order to assess the user experience, the NS2 simulation...
HiLow is a well-known hierarchical routing protocol used in 6LoWPAN, which has some drawbacks in accessibility, efficiency and path recoverability. In this paper, we have improved the HiLow protocol in aspects of interconnection between Internet and 6LoWPAN and network path recovery mechanism. Using an address mapping table to store both EUI-64 address and 16 bit short address, Internet nodes can...
Battery consumed node is typical in wireless sensor networks, but in the newly developed applications in household, we have found a new character that some nodes could be deployed inside the household appliances and use AC as its power supply, which are called as plug-in nodes. Unlike battery consumed nodes, they could transmit data without the limitation of energy consumption, which is a key challenge...
The problem of spectrum sensing using energy detection over double-Rayleigh fading channel was addressed in this paper. Closed-form expressions of detection probability with and without diversity were derived based on probability density function method. The related integral involving Marcum-Q function was evaluated by using alternative representations. The validity of theoretical analyses was shown...
In cognitive radio (CR), interference alignment (IA) is an effective approach to eliminate the interference of secondary users (SUs). Thus, SUs can share the spectrum with primary users (PUs). In this paper, IA for overlay CR is discussed, and a time resource auction scheme based on game theory is proposed, which uses the given related equilibrium functions to balance the benefits of PU and SUs, meanwhile...
In our scheme, the master key of Mobile Ad Hoc Network (MANET) is generated by all participants collectively, but it is not like most current scheme generated by Key Generation Center (KGC). Every participant can calculate the system public key, but any participant can not recover the system secret key without any other t-1 participants' help. Our elliptic curve cryptography (ECC)-based threshold...
The problem of wireless security for the downlink of MISO-OFDMA systems operating over a frequency-selective channel is investigated. By exploiting the dimensions provided by multiuser MISO-OFDMA systems for random user selection and beamforming, a novel physical-layer security method is to achieve low probability of interception (LPI), which let the attacker's equivalent channel be a random one,...
Path round-trip delay, i.e., path round-trip time (RTT), is one of the key metrics for evaluating network performance, also plays a crucial role in several overlay network construction protocols, peer-to-peer (P2P) applications, etc. In this paper, we present HPAP, a high precision active probe for path RTT measurement, which is based on Berkeley Packet Filter (BPF) technology. When the measuring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.