Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Thin-client computing is being adopted by many industries to bring services to users through a unique platform over wide area networks (WAN). To improve thin-client communication sessions, some authors have proposed using the thin-client protocol with enhanced image compression techniques while others have proposed using drawing commands instead. To take full advantage of the capabilities of thin-client...
In modern wireless networks especially in Machine-to-Machine (M2M) systems and in the Internet of Things (IoT) there is a high densities of users and spatial reuse has become an absolute necessity for telecommunication entities. This paper studies the maximum throughput of Carrier Sense Multiple Access (CSMA) in scenarios with spatial reuse. Instead of running extensive simulation with complex tools...
For wireless devices, which are commonly powered using batteries, energy becomes a severe bottleneck. Many efforts have been spent on the efficient use of battery energy. Recently, an alternative has been explored for prolonging the lifetime of energy constrained wireless networks and low-power wireless sensor networks. This alternative operates by availing the ambient radio-frequency (RF) signal,...
In this paper, a new watermarking method based on spread spectrum technique, which we call capacious spread spectrum (CSS) is proposed. In this method, unlike the traditional spread spectrum watermarking (TSS), more than one pseudo noise (PN) sequence will be deployed. Also, a novel method to produce orthogonal PN-sequences is achieved. Moreover, it is shown that with utilizing the new approach, for...
Internet of Things (IoT) applications carry on at an environment that is mainly highly dynamic and real time nature. Due that environment, such applications should be able to reason autonomously and give self-adaptive decisions. To date, there has not been an adequate architecture to incorporate self-adaptive property in that type of environment. Thus, we design a management architectural pattern...
Duan proposed the first certificateless undeniable signature scheme in 2008. Later in 2012, Zhao and Ye proffered an efficient scheme which enjoys from a pairing-free sign algorithm. In this paper, we prove the insecurity of their efficient scheme by mounting two attacks on its invisibility and non-impersonation. In addition, we propose an improved scheme that addresses both of the above attacks while...
SIP is amongst the most popular Voice over IP signaling protocols. Its deployment in live scenarios showed its vulnerability to flooding attacks. In this paper, we present a SIP flooding attack detection mechanism that dynamically detects SIP flooding attacks and correlates in real time the temporal characteristics of SIP reliable mechanism and the number of received INVITE requests. Experimental...
As online eco-feedback social applications are being increasingly used around the world for motivating citizens to become more energy-aware, privacy concerns in terms of sharing personal electricity consumption data among online contacts are rising. Through Social Electricity, an online application offering personal energy management through a social and collaborative environment, we study the privacy...
In this paper, power allocation over time-varying multi-user multi-relay amplify-and-forward networks is studied. Specifically, stochastic network sum-rate and max-min rate power allocation problems are formulated. However, solving such stochastic problems relies on perfect global instantaneous channel state information (CSI), and thus entails complex computations and excessive communication overheads...
This paper studies power allocation and relay selection strategies in energy harvesting cooperative wireless networks for end-to-end signal-to-noise ratio (SNR) maximization. Energy cooperation via wireless energy transfer is also considered to efficiently utilize harvested energy. Particularly, different optimal strategies are formulated as optimization problems, which are non-convex. Intelligent...
In this paper, we study a general practical stochastic energy harvesting (EH) model where in, an EH relay is able to harvest energy from the radio frequency (RF) radiation in a super capacitor. The different aspects of this stochastic energy harvesting model (SEHM) are discussed and the performance of a point-to-point (P2P) wireless link is evaluated in the presence of such an EH model and decode-and-forward...
This paper studies energy-efficient relay selection schemes for cooperative multi-hop device-to-device (D2D) networks. D2D networks exploit proximity gain by establishing direct links between devices instead of relying on cellular links for communication. We consider a D2D network with random deployment of relay nodes between the source and the destination. The relay nodes are grouped into clusters,...
In this paper, a spectrum sharing protocol that combines coordinate-interleaved orthogonal design (CIOD) and space-time block coding is proposed for cognitive radio (CR) networks. Primary system's transmitter (PT) and receiver (PR) are equipped both by one antenna while secondary system's transmitter (ST) and receiver (SR) are equipped by two and one antennas, respectively. CIOD applied by means of...
In this paper, we propose a new cooperative spectrum sensing scheme for cooperative energy detection, named multi-selective scheme. The proposed cooperative sensing scheme is based on order statistics of the reporting links between the cooperative nodes and fusion center where the links with high signal-to-noise ratios (SNRs) are selected as reliable reporting links. The performance of the proposed...
Cognitive Radio (CR) Technology has emerged for the future of wireless communications, its key parameters of interest are frequency, power and modulation techniques. The Spectrum Sensing is an important task to determine the availability of the vacant channels. In Multicarrier Communication using Digital Signal Processing Techniques, Filter Bank Multi Carrier (FBMC) has an edge over other technologies...
Good Quality of Experience is critical to the success of IPTV business development and promotion. To this end, the paper combines status data from the set-top box with the data of user's complaints and then selects the appropriate model to predict user's QoE. Firstly, we clean and conduct some statistical analysis for the dataset. Then, random under-sampling and synthetic over-sampling are applied...
Visual-based indoor localization have become a favored research area in recent years. It can be used inside a building where GPS signals are often not available. And due to its low deployment cost, visual-based indoor localization has been implemented in the complicated indoor environment. However, in order to increase the accuracy of indoor localization, the scale of image database should be as large...
Image based indoor localization is an important problem with many useful application. This paper proposes an indoor localization system for performing fine localization and less latency with more priori information, including tile angel and the relative height between camera optical center and origin in reference coordinate system (RCS). The system is divided into two stages: offline stage and online...
As some public buildings have become large in spatial scale, people find it more and more difficult to know their actual location in these buildings. Generally in the indoor environment, to get location information is relatively more complex than that in the outdoor environment, for traditional outdoor localization methods do not perform well in indoor environment. Under this circumstances, image...
Designing distributed protocols with limited requirements for exchange of feedback information between the nodes is a key element in the development of cognitive and self-organizing ad hoc networks. We argue that the Minority Game (MG) and its variations can constitute useful tools towards this direction. In particular, the MG formulation is well suited for addressing a variety of resource allocation...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.