The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aiming at the reverse problem of UAV communication, a reverse method matching known part of priority is presented. First, excavating the frequent items of UAV communication message, to find out the fixed part of the UAV communication protocol format, Then excavating the relationship between UAV flight data detected by radar station and UAV communication data, to find one of the part of the protocol...
Algorithms for mining very large graphs, such as those representing online social networks, to discover the relative frequency of small subgraphs within them are of high interest to sociologists, computer scientists and marketeers alike. However, the computation of these network motif statistics via naive enumeration is infeasible for either its prohibitive computational costs or access restrictions...
In this letter, the outage probabilities of selection relaying protocols are analyzed and compared for cooperative wireless networks. It is assumed that both source and relay use equal allocated time in transmission. Depending on the quality of the source-relay channel, the relay may choose either Decode-and-Forward (DF), Amplify-and-Forward (AF), or Direct-Transmission (DT) to forward signals. It...
Utilizing partially entangled states as a shared resource, a protocol for the probabilistic teleportation of an arbitrary n-qudit state is proposed in detail. It's more valuable than the research for the teleportation of any other special states. Meanwhile, we summarize the d2n kinds of states with a very concise formula after performing Bell-state measurements by the sender. All different unitary...
Information Hovering is a relatively new concept of information dissemination over a mobile set of peers. It naturally applies in many applications in vehicular ad-hoc networks, where useful information needs to be made available to all vehicles within a confined geographical area for a specific time interval. A straightforward approach, is to have all vehicles within the hovering area exchange messages...
As the bi-directional failure notification may cause signaling burst conflict in a short time, a mechanism named single-node failure notification (SNFN) based on RSVP-TE (resource reservation protocol - traffic engineering) is proposed. SNFN implemented by extending the RSVP-TE protocol rules the node issuing the notification signaling call according to ordered numbers, no matter up-stream or downstream...
This paper investigates a spectrum-efficient cooperative diversity method based on butterfly network, which endows that a relay can encode the data received from two users and then forward the coded data to destination. Under the assumption that the relay can reliably overhear the data from two users, we discuss the outage probability and diversity gain. Moreover, the outage probability and diversity...
Network covert channels can be used to transfer secret information in network protocols. For a kind of network covert channels hidden in overt sources with fixed probability distribution, we propose a modified Pearson chi-square test which improves detection accuracy. We incorporated adjacent probability values and divided the new distribution into two partitions sensitive to different hidden sections...
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a large number of replicas, which are introduced into the network to perform insider attacks. Memory overhead, energy efficiency and detection probability are the main technical concerns for any replication detection protocol...
Node clone attack, that is, the attempt by an adversary to add one or more nodes to the network by cloning captured nodes, imposes a severe threat to wireless sensor networks. Several distributed detection protocols have been proposed against this attack. However, all of them rely on too strong assumptions and cannot be efficiently applied to most of sensor networks. In this paper, we propose an innovative...
A key challenge of message forwarding in delay tolerant networks (DTNs) is to increase delivery rate and decrease delay and cost. When information for future connectivity is not available, opportunistic routing is preferred in DTNs in which messages are forwarded opportunistic (non-deterministically) to nodes with higher delivery probabilities. Many real objects have non-deterministic but cyclic motions;...
The domain name system (DNS) is integral to today's Internet. Name resolution for a domain is often dependent on servers well outside the control of the domain's owner. In this paper we propose a formal model for analyzing the name dependencies inherent in DNS, based on protocol specification and actual implementations. We derive metrics to quantify the extent to which domain names affect other domain...
In this paper, a novel wavelength assignment scheme called the WASDT (Wavelength Assignment Scheme for Data-intensive Transmission) is proposed in GMPLS based WDM Network. The WASDT is designed for the data-intensive transmission with the Optical Virtual Concatenation (OVC) technology. The novel scheme takes the data-intensive connection as a high priority connection and sends messages to all nodes...
Utilizing the construction of a diagonal projection transformation matrix, a scheme for probabilistic teleportation of an arbitrary n-qudit state is provided via partially entangled states. In addition, we investigate that the total system of particles can be expanded by Bell bases and transformation operators. Not only are the relations between transformation operators and the unitary matrixes performed...
Cooperative diversity systems rely on using relay nodes to relay copier of transmitted information to the destination such that each copy experiences different channel fading, hence increasing the diversity of the system. In this letter, we proposed a novel distributed cooperative beamforming scheme for decode-and-forward relay networks without channel state information (CSI) feedback. We further...
This paper presents an analysis of satellite communications (SATCOM) systems that use Internet protocol (IP) with quality of service (QoS) metrics, and addresses IP efficiency measures. Key contributing elements for the IP efficiency are network structure, provisional efficiency, and bandwidth-on-demand features. IP bandwidth gains will also depend on the network size, the level of hierarchy, and...
In this paper, we present a new outage probability analysis of a cooperative system with single antenna terminal. We first introduce the cooperation protocol of the presented scheme. Then, in the destination node, maximal ratio receiver combining (MRRC) and the maximum likelihood (ML) detection algorithm are applied to decode the received signal with the utilization of the signal received from the...
In this paper, we show the enhanced version of SLPv2 (Service Location Protocol version 2). It is one of the service discovery protocols in wired network, and we propose the wireless network based SLP for WSN (wireless sensor network). If a wired protocol is transferred to the wireless domain, then we have to consider some critical problems, like resource and power wall, etc. So SLP for the WSN must...
Sybil attack is one of the most challenging problems that plague current decentralized peer-to-peer systems. In Sybil attack, a single malicious user creates multiple peer identities known as sybils. These sybils are employed to target honest peers and hence subvert the system. In this paper, we propose a novel solution that enables all honest peers to protect themselves from sybils with high probability...
In agent bilateral multi-issue bidding negotiation system, how to make the negotiation agents gain satisfying result farthest and negotiate efficiently is a key issue. As for this problem, an agent negotiation system based on adaptive genetic algorithm is present and the algorithm is applied in bilateral multi-issue simultaneous bidding negotiation in E-commerce. In the system, the negotiation agent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.