Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper is concerned with distributed estimation of a scalar parameter using a wireless sensor network (WSN) that employs a large number of sensors operating under limited bandwidth resource. A semi-orthogonal multiple-access (MA) scheme is proposed to transmit observations from K sensors to a fusion center (FC) via N orthogonal channels, where K≥N. The K sensors are divided into N groups, where...
In this paper, we study a system consisting of a single source, a single destination, and multiple layers of parallel relays. The system is considered as a combination of broadcast channels, multiple input multiple output (MIMO) X channels, and multiple-access channels. Interference alignment (IA) is used throughout the whole system, and perfect channel state information (CSI) is assumed available...
Cognitive radio (CR) networks have drawn great attention in wireless communication fields. Efficient and reliable communication is a must to provide good services and assure a high-quality life for human beings. Resource allocation is one of the key problems in information transmission of CR networks. This paper studies power allocation in cognitive multiple input and multiple output (MIMO) orthogonal...
In the Internet of Things service environment where all things are connected, mobile devices will become an extremely important medium linking together things with built-in heterogeneous communication functions. If a mobile device is exposed to hacking in this context, a security threat arises where all things linked to the device become targets of cyber hacking; therefore, greater emphasis will be...
With the rapid growth of network traffic volumes in terms of the content and mobile data, how to cope with these two new trends of Internet has been widely discussed. Among related solutions, Named Data Networking (NDN) is aimed to achieve highly effective content distribution. Besides, the mobility support is also one of its important research contents, attracting great attentions. Thus, in this...
In this paper, we investigate the coexistence of two technologies that have been put forward for the fifth generation (5G) of cellular networks, namely, network-assisted device-to-device (D2D) communications and massive MIMO (multiple-input multiple-output). Potential benefits of both technologies are known individually, but the tradeoffs resulting from their coexistence have not been adequately addressed...
Typically, site survey is an inevitable phase for WiFi fingerprint-based localization which is regarded as one of the most promising techniques for indoor localization. However, the site survey can cause potential location privacy leakage for the participants who contribute their WiFi fingerprint measurements. In this paper, we propose a privacy-preserving site survey scheme for WiFi fingerprint-based...
Wireless network virtualization (WNV) is a promising technique to solve the ossification of current networks. In this paper, a generalized Long Term Evolution (LTE) air interface virtualization framework is proposed where virtual operators (VOs) are enabled to share the physical resources owned by the infrastructure provider (InP). This user-centric feature provides VOs with the flexibility to manage...
By modulating the electric field induced to a human body, it is possible to transfer data wirelessly using the body as a transmission medium. This method is referred to as human body communication (HBC), which has multiple advantages in comparison with the traditional radio frequency (RF) communication. First, it alleviates the traffic load from the radio channels, which are becoming more and more...
IPv6 protocol, which should replace the actual IPv4 protocol, brings many new possibilities and improvements considering simplicity, routing speed, quality of service, and security. In comparison to IPv4, IPv6 improves mechanisms for assuring a secure and confidential transfer of information. DNS has been extended to provide security services (Domain Name System Security Extensions (DNSSEC)) mainly...
Recently, several researchers have proposed to employ self-organized time division multiple access (STDMA) as an alternative Medium Access Control (MAC) protocol of vehicular communications and have studied STDMA to verify its feasibility to vehicular safety applications. However, most of studies have mainly focused on comparing STDMA with enhanced distributed channel access (EDCA) and have several...
This paper provides fundamentals in the design and analysis of Generalized Low-Density Parity Check (GLDPC)-Staircase codes over the erasure channel. These codes are constructed by extending an LDPC-Staircase code (base code) using Reed-Solomon (RS) codes (outer codes) in order to benefit from more powerful decoders. The GLDPC-Staircase coding scheme adds, in addition to the LDPC-Staircase repair...
Machine-to-machine (M2M) communication is becoming an increasingly essential part of mobile traffic and thus also a major focus of the latest 4G and upcoming 5G mobile networks. M2M communication offers various ubiquitous services and is one of the main enablers of the Internet-of-things (IoTs) vision. Nevertheless, the concept of mobile M2M communication has emerged due to the wide range, coverage...
A two-way full-duplex multiple-input multiple-output (MIMO) relay provides effective spectral efficiency and system capacity improvement. However, self-interference (SI) as a serious problem limits the development of a full-duplex relay. In this paper, the novel SI suppression schemes based on the Dempster-Shafer (DS) evidence theory are proposed to suppress SI in the two-way full-duplex MIMO relay...
The need for side information (SI) estimation poses a major challenge when selected mapping (SLM) is implemented to reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing (OFDM) systems. Recent studies on pilot-assisted SI estimation procedures suggest that it is possible to determine the SI without the need for SI transmission. However, SI estimation adds to computational...
To mitigate damages due to natural disasters and abruptly changing weather, the importance of a weather radar network system (WRNS) is growing. Because radars in the current form of a WRNS operate in distinct frequency bands, operating a WRNS consisting of a large number of radars is very costly in terms of frequency resource. In this paper, we propose a novel WRNS in which multi-site weather radars...
The energy of nodes is limited in mobile ad hoc networks(MANETs). In order to extend the network lifetime, how to select the best route is a critical issue for routing protocols in MANETs. In this work, we propose the ant colony-based energy control routing (ACECR) protocol to find an optimal route by using the positive feedback character of ant colony optimization (ACO). In our ACECR protocol, the...
This paper reports on a study of the propagation characteristics of visco-elastic, Rayleigh-like waves in stratified half-space structures. Beginning with the Kelvin model, the characterization equation and the normal displacement of visco-elastic Rayleigh waves in stratified half-space structures are derived and the influence of the visco-elastic modulus on dispersion and attenuation is discussed...
Energy harvesting embedded systems are embedded systems that integrate with energy harvesting modules. In this kind of systems, service tasks and energy harvesting tasks must be scheduled efficiently to keep the whole system working properly as long as possible. In this paper, we model an energy harvesting embedded system with an energy model, a task model, and a resource model and propose a dynamic...
In this paper, we present a game-theoretic approach to the problem of joint transmit beamforming and power control in cognitive radio (CR) multiple-input multiple-output broadcast channels (MIMO-BCs), where the primary users (PUs) coexist with the secondary users (SUs) and share the same spectrum. The cognitive base station (CBS) is equipped with multiantenna and transmits independent data streams...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.