The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper considers the problem of improving the reliability of the hardware and software of autonomous unmanned underwater vehicles. The aim of the work is to investigate and develop methods for emergency homing of the AUV to the source of the reference signal using minimal input data. The idea is proposed of estimating the speed of the source and receiver approach by analyzing the deviation of the...
Some enterprises would place their core business system in the enterprise network and cut off the connection with the external network, in order to prevent network attacks from outside. Enterprises often need to move business data from the external network to the enterprise network. There will be needs of across-network transmission. In this paper, a one-way transmission technology in network isolation...
Transmission techniques based on channel coding with feedback are proposed in this paper to enhance the security of wireless communications systems at the physical layer. Reliable and secure transmission over an additive noise Gaussian wiretap channel is investigated using Bose-Chaudhuri-Hocquenghem (BCH) and Low-Density Parity-Check (LDPC) channel codes. A hybrid automatic repeat-request (HARQ) protocol...
In this paper we propose a scheme that unconditional secure transmission is used to implement information reconciliation in key generation. Unconditional secure transmission achieved by associating MIMO beamforming with security code can be safe and reliable. Theoretically, the reconciliation and privacy amplification phase can take advantage of the unconditional communication security to reconciling...
In this paper, we propose a feedback-aided irregular repetition slotted ALOHA (F-IRSA) protocol which depends on the distance between the received packet and the set of packets already recovered at the receiver. We employ feedback messages to terminate the user retransmission process, and use successive interference cancellation (SIC) for packet recovery. We evaluate the number of transmissions per...
Wireless multimedia sensor networks (WMSNs) require data to be communicated timely and reliably. However, radio transmission errors incurred by wireless channel make it difficult to achieve these qualities simultaneously. To provide good quality of service (QoS) of WMSNs, parameters associated with the WMSNs need to be studied completely and best tradeoff needs to be made. To characterize the delay-reliability...
The diversity of IoT applications implies the requirement of reliable yet efficient MAC solutions for supporting transmissions for various traffic patterns. In this paper, we propose GoMacH, an efficient MAC protocol that provides high reliability and throughput for handling various traffic loads in IoT. GoMacH seamlessly integrates several outstanding techniques. It adopts the phase-lock scheme to...
Molecular communications (MC) is a promising paradigm which utilizes molecules to implement communication among nano-machines. Cooperative relaying strategies can be used to extend communication distance and achieve reliable remote communications. In this paper, a two-hop diffusion-based molecular communication with three nano-machine nodes is considered. To mitigate the drawback of traditional cooperative...
With the envisioned era of Internet of Vehicles (IoVs), all aspects of Intelligent Transportation Systems (ITS) will be connected to improve transport safety, relieve traffic congestion, reduce air pollution, enhance the comfort of transportation and significantly reduce road accidents. In IoVs, regular exchange of current position, direction, velocity, etc., enables mobile vehicles to predict an...
Monitoring the displacements of structures caused by slight or big seismic shakings and landslides the irrespective of observation points by simply taking the data using a single equipment is useful. GNSS antennas and receivers on the roof of a steel tower to monitor the displacement of the structure caused by the wind etc. has already been reported, but ours is the first study on a low-cost GNSS...
Solid-state sources using diode based frequency multipliers are critical for radio astronomy and atmospheric studies, as well as many other important scientific applications. This talk describes many of the technological innovations that are now used to achieve these goals and two specific recent examples that demonstrate the current capability of this technology. The first is a ∼200 GHz varactor...
Communication system design becomes more complicated due to excessive increase of number of users. Systems need to address this load, while providing acceptable levels of Quality of Service (QoS). Additionally, user expectations, quantified via Quality of Experience (QoE), need to be addressed. QoE is calculated on the application layer, where end users interact with the system. As well as user expectations,...
We investigate secure communication over a channel under two different classes of attacks at the same time: a passive eavesdropper and an active jammer. This scenario is perfectly modeled by the concept of arbitrarily varying wiretap channels (AVWCs). It has been shown that uncorrelated codes are not always capable of overcoming the various jamming attacks. On the other hand, correlated random codes...
In the communication process, when channel capacity is large enough, channel quality is decided by the wrong acceptance sequence of data packet due to channel interfere, communication limited and so on. This paper surveyed the effect of channel on data sequence reception. The simulation show the relationship between acceptance sequence and channel quality.
Recently, spoofed e-mails become sophisticated and the messages that cannot be identified by visual confirmation have been increasing. DKIM is one of the most famous methods as countermeasure of spoofed e-mail. However, since DKIM allows a signature by third party domains, a recipient server can be unable to determine whether the attached signature is the legitimate. To solve the problem, although...
Machine-type communication services in mobile cellular systems are currently evolving with an aim to efficiently address a massive-scale user access to the system. One of the key problems in this respect is to efficiently identify active users in order to allocate them resources for the subsequent transmissions. In this paper, we examine two recently suggested approaches for user activity detection:...
5G wireless networks are expected to support new applications demanding ultra high reliability and ultra low latency, such as self-driving cars, industrial control, and real-time gaming. Such services are known as ultra-reliable and low-latency communications (URLLC) targeting at 99.999% transmission correctness within 1 ms delay bound. Current Long Term Evolution (LTE) system is far from supporting...
One of the key ingredients of Intelligent Transportation Systems (ITS) is delivery of broadcast status messages among vehicles for safety purposes. This requires an efficient Medium Access Control (MAC) that provides low average delay and high reliability. To this end, Carrier Sense Multiple Access (CSMA) has been commonly proposed for Vehicle Ad Hoc Networks (VANETs). Nevertheless, the hidden- node...
The broadcast nature of visible light beam has aroused great concerns about the privacy and confidentiality of visible light communication (VLC) systems.In this paper, in order to enhance the physical layer security, we propose a channel scrambling scheme, which realizes orthogonal factorized channel scrambling with location information embedded (OFCS-LIE) for the VLC systems. We firstly embed the...
Compared with today’s 4G wireless communication network, the next generation of wireless system should be able to provide a wider range of services with different QoS requirements. One emerging new service is to exploit cooperative driving to actively avoid accidents and improve traffic efficiency. A key challenge for cooperative driving is on vehicle-to-vehicle (V2V) communication which requires...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.