The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The focus of this paper is on the precoding and feedback strategies for a radio backhaul link between an access base station (ABS) and the hub base station (HBS) in the presence of mobile stations (MSs). In this paper it is assumed that the access and the backhaul links are simultaneous and use the same frequency band. Two feedback links are exploited at the ABS in order to optimize the communication...
Mobile ad hoc networks are self organizing multi-hop wireless networks with no fixed infrastructure. All the users in these networks are mobile. The mobiles communicate either directly or via other nodes of the network by establishing routes. The mobility of nodes causes the existing links to be break frequently. So if we can predict future movement, the resources reservation can be made before be...
Broadband is a ubiquitous technology for connecting people together via a basic communications medium. Incorporating mobility into broadband antennas provides for the creation of movable nodes which can seek out other nodes. In contrast, stationary broadband nodes are incapable of finding new nodes if they are out of range or have an impediment. Supplying a broadband node with mobility and the capability...
In the future wireless communication systems, the broadband wireless technology which enables Giga-bps class data services is demanded. Broadband wireless channels become extremely frequency-selective and cause severe inter-symbol interference (ISI). Furthermore, the average received signal power changes in a random manner because of the shadowing and path losses according to the movement of a mobile...
Current state of the art localization scheme is able to locate mobile device in multipath environment by using both Line of Sight (LOS) and Non Line of Sight (NLOS) Time-Of-Arrival (TOA) and Angle-Of-Arrival (AOA) information at both the mobile device and reference device side. Each set of measured TOA and AOA can be manipulated to form a line on which mobile device are most likely located, this line...
Intelligent Transportation Systems are based on the acquisition of urban traffic information timely and accurately. This paper puts forward a prototype system of Wireless Traffic Information Service System(WTISS). In WTISS, vehicles equipped with wireless communication module are regarded as moving sensors on traffic network. Road-side station can get traffic status by analyzing data collected by...
Among civilian communication systems, vehicular networks emerge as one of the most is convincing and yet most challenging instantiations of the mobile ad hoc networking technology. Towards the deployment of vehicular communication systems, security and privacy are critical factors and significant challenges to be met. This Vehicular communication (VC) system has the potential to improve road safety...
In todaypsilas life, the importance of accessing data and information from Internet and other networks for business, entertainment, and social activity applications is ever increasing. Network protocols such as Wi-Fi (802.11) and WiMAX (802.16) have been developed for such applications. However the need for a high-speed, highly reliable and high quality access to these information services under fully...
With the development of wireless and mobile Internet technology, people in everyday life and business hope for access to the Internet even while they are in movement. IEEE 802.20 technology is mobile and can effectively address high-speed network access. In this paper the PHY layer model for simulating 802.20 in SIMULINK and subsystems in MATLAB S-function files are presented. To evaluate the performance...
Vehicular communication is gaining more and more interest from big consortia and companies in the car industry. Wireless communication in a vehicular environment creates unique opportunities but poses also its own challenges. Therefore we proposed in previous work a new routing protocol, REACT, which uses geographical information and is able to react to a fast changing environment. In this paper,...
Ultrawideband (UWB) has drawn the interest among the research and wireless communication communities due to its configurability and adaptability, which enables it to coexist with many concurrent services. There are currently various mobile communication standards in use worldwide. The mobile communication industry is under transition phase and experiencing a shift from single system connectivity to...
An autonomous dynamic spectrum access (ADSA) system overcomes the spectrum scarcity caused by the current command and control spectrum allocation paradigm, by enabling multiple uncoordinated groups of radios to access spectrum on an as-needed basis without causing mutual harmful interference. This paper describes the behavior and performance of such a system. Adaptation is driven by continual monitoring...
Wireless communications attract enormous research effort nowadays, since the continuous introduction of innovative services constitutes an attractive aspect for users, operators, as well as manufacturers. Moreover, the wireless world is currently witnessing the convergence of mobile communication systems and IP networks, towards a global communications system, operating over a common, wireless access...
The convergence of wireless communication, mobile positioning and geographic information system (GIS) has given rise to a new class of location based applications and services, which deliver real-time information to mobile users in accordance with their current locations. The mobile applications deal with tracking and management of mobile objects, and need to pose spatio-temporal queries. In this...
The key agreement protocol is the most important part to establish a secure cryptographic system and the effort to standardize the key agreement protocols is progress rapidly. Several efficient and secure key agreement protocols have been proposed so far since Diffie-Hellman proposed a public key agreement system in 1976. But, because Diffie-Hellman based key agreement protocols need a lot of computation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.