The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network coding (NC) can greatly improve a system’s performance on throughput and channel utilization via corresponding signal processing on the relay side. Implementation of NC in relay-assisted device-to-device (RA-D2D) communications is a promising way to further explore the advantages of RA-D2D communications in cellular systems. This paper proposes a signal processing scheme for RA-D2D which jointly...
With the integration of the modern industrial control systems (ICS) with the Internet technology, ICS can make full use of the rich resources on the Internet to facilitate remote process control. However, every coin has two sides. More exposure to the outside IT world has made ICS an attractive target for hackers, so it becomes urgent to protect the security of ICS. Skilled attackers can penetrate...
This paper considers the problem of massive multiple-input-multiple-output (MIMO) wireless communication systems with quasi-orthogonal space-time block code (QOSTBC) transmission in the presence of spatial correlation effect (SCE) and mutual coupling effect (MCE). Conventional MIMO channels with QOSTBC transmission suffer from several drawbacks. The number of transmit antennas is restricted to a few...
Friend and point-of-interest (POI) recommendation are two primary individual services in location-based social networks (LBSNs). Major social platforms such as Foursquare and Instagram are all capable of recommending friends or POIs to individuals. However, most of these social websites make recommendations only based on similarity, popularity, or geographical influence; social trust among individuals...
This paper presents a novel secure medical image transmission scheme using hybrid visual cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale medical images have been considered as a secret image and split into different shares by visual cryptography (VC) encryption process. The split shares are once again encoded by Hill cipher (HC) encode process for improving the efficiency...
The advancements in the domain of Internet of Things (IoT) accelerated the development of new communication technologies. Machine to machine communication in IoT is accomplished with application protocols such as the Constrained Application Protocol and Message Queuing Telemetry Transport (MQTT). The openness of these protocols leads to various types of attacks including DoS Attack. MQTT is widely...
This paper proposes a new two-way double-relay selection strategy for wireless cooperative communication systems with its bit error rate (BER) performance analysis. In this work, two relays are first chosen to maximize the overall system performance in terms of BER. Then, either the two-phase or three-phase protocol is performed to achieve two-directional communications between the communicating terminals...
This paper analyzes the outage probability (OP) and the average symbol error rate (SER) of decode-and-forward (DF) relaying. The paper derives closed-form expressions for the OP and the average SER with optimum combining (OC) considering fast-fading multiple correlated CCIs, the correlated source-relay, and thermal noise. It is shown that the performance of the large distance between the source and...
As a new type of data, data stream has the characteristics of massive, high-speed, orderly, and continuous and is widely distributed in sensor networks, mobile communication, financial transactions, network traffic analysis, and other fields. However, due to the inherent problem of concept drift, it poses a great challenge to data stream mining. Therefore, this paper proposes a dual detection mechanism...
We propose CSIApx, a very fast and lightweight method to compress the channel state information (CSI) of Wi-Fi networks. CSIApx approximates the CSI vector as the linear combination of a small number of base sinusoids on constant frequencies and uses the complex coefficients of the base sinusoids as the compressed CSI. While it is well-known that the CSI vector can be represented as the linear combination...
With the evolution of fog computing, processing takes place locally in a virtual platform rather than in a centralized cloud server. Fog computing combined with cloud computing is more efficient as fog computing alone does not serve the purpose. Inefficient resource management and load balancing leads to degradation in quality of service as well as energy losses. Traffic overhead is increased because...
The popularization of mobile communication devices and location technology has spurred the increasing demand for location-based services (LBSs). While enjoying the convenience provided by LBS, users may be confronted with the risk of privacy leakage. It is very crucial to devise a secure scheme to protect the location privacy of users. In this paper, we propose an anonymous entropy-based location...
Service recommendation has become a promising way to extract useful or valuable information from big educational data collected by various sensors and distributed in different platforms. How to protect the private user data in each cluster during recommendation processes is an interesting but challenging problem in the educational domain. A locality-sensitive hashing (LSH) technique has recently been...
In order to combat the spoofing of global navigation satellite system (GNSS) signals, we propose a novel signal authentication method based on information-theoretic security. In particular, the satellite superimposes to the navigation signal an authentication signal containing a secret authentication message corrupted by artificial noise (AN). We impose the following properties: a)Authentication and...
Optimal topology control is an essential factor for efficient development of wireless mesh networks. For this purpose, a set of available tools can be exploited including power control, rate adaptation, channel assignment, channel selection, scheduling and routing. In most recent studies, only some of these tools are applied for throughput maximization. In this paper, we first propose a comprehensive...
In this paper, a scheme to construct the high-rate regular quasi-cyclic low-density parity-check (QC-LDPC) codes is developed based on the finite geometry low-density parity-check (LDPC) codes. To achieve this, we first decompose the EG-LDPC code into a set of the block submatrices with each of them being cyclic. Utilizing the decomposed structure, we then construct an auxiliary matrix to facilitate...
Wireless sensor networks (WSNs) consist of small sensor nodes with limited energy. Such nodes have the ability to monitor the physical conditions and communicate information among the nodes without the requirement of the physical medium. WSNs are autonomous and are distributed in space. Due to the absence of central authority and random deployment of nodes in the network, WSN is prone to security...
In this paper, a new approach to energy harvesting and data transmission optimization in a heterogeneous-based multi-class and multiple resource wireless transmission wireless sensor network system that focus on monitoring water and its quality is presented. Currently, energy is a scarce resource in wireless sensor networks due to the limited energy budget of batteries, which are typically employed...
Sensor nodes equipped with various sensory devices can sense a wide range of information regarding human or things, thereby providing a foundation for Internet of Thing (IoT). Fast and energy-efficient data collection to the control center (CC) is of significance yet very challenging. To deal with this challenge, a low redundancy data collection (LRDC) scheme is proposed to reduce delay as well as...
To improve spectrum sensing performance, a cooperative spectrum sensing method based on information geometry and fuzzy c-means clustering algorithm is proposed in this paper. In the process of signal feature extraction, a feature extraction method combining decomposition, recombination, and information geometry is proposed. First, to improve the spectrum sensing performance when the number of cooperative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.