The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work proposes a blind adaptive reduced-rank scheme and constrained constant-modulus (CCM) adaptive algorithms for interference suppression in wireless communications systems. The proposed scheme and algorithms are based on a two-stage processing framework that consists of a transformation matrix that performs dimensionality reduction followed by a reduced-rank estimator. The complex structure...
As an integral part of reliable communication in wireless networks, effective link estimation is essential for routing protocols. However, due to the dynamic nature of wireless channels, accurate link quality estimation remains a challenging task. In this paper, we propose 4C, a novel link estimator that applies link quality prediction along with link estimation. Our approach is data-driven and consists...
This paper presents a new method to estimate the available bandwidth and the path capacity over a wireless network path, denoted as rt-Winf. The estimation is performed in real-time and without the need to intrusively inject packets in the network. This is accomplished by resorting to the CSMA-CA scheme with RTS/CTS packets to determine each node's channel allocation. rt-Winf repeatedly samples the...
Waiting time-optimal scheduling of items for broadcasting in wireless environments requires knowledge of their corresponding access probabilities. Feedback mechanisms have been proposed, according to which the clients notify the server of their needs directly or indirectly. This feedback is then processed at the server, producing the items' access probability distribution function estimate. Based...
In this paper, we have studied methods of detecting low signal-to-noise ratio (SNR) nodes by outlier detection in cooperative spectrum sensing. In many studies in the field of cooperative sensing, it is assumed that an average received energy among sensing nodes is equal. However, in practical wireless environment, the performance of cooperative sensing with low SNR nodes located underground, indoor,...
The hybrid localization techniques have attracted significant research interest since a variety of localization metrics can be easily obtained by most wireless devices. This paper presents a hybrid localization scheme that combines received signal strength (RSS) and round-trip time (RTT) information. It is based on a RSS ranging technique that dynamically update the model that best fit the RSS information...
Automatic modulation classification (AMC) is a scheme to identify the data samples automatically. Usually, in wireless communication, especially through the Rayleigh fading channel, AMC performance will severe degrade. This paper presents a new method for AMC, using a modified Joint Power Estimation and modulation types of the transmitted signals by observing the receive Modulation Classification...
In wireless communication, Ricean K factor which is the relative strength of the direct and scattered components of the received signal, is an important reflection of channel quality parameters. Therefore, the estimate of Ricean factor is great significance. Based on the introduction of the estimation methods of K from envelope and from the I/Q components, there is an academic analysis about the precision...
In the general wireless network, the network terminal often cannot dynamically select the best path to access the network due to the absence of the detailed network parameters, which may cause the performance reduction of the network. In this paper we propose a new dynamic access link selection scheme (DALSS) based on the real time network state. The estimation of capacity and available bandwidth...
In this paper, we propose a novel fuzzy logic congestion control mechanism to improve throughput performance of transmission control protocol (TCP) in wireless high-bandwidth delay networks. It is based on a receiver centric method of which the available bandwidth is measured at the receiver. The available bandwidth utilization serves as an incipient network congestion indicator, which acts as one...
In this paper, we propose an iterative receiver for a multi-input multi-output (MIMO) two-way wireless relay system. The two-way relay system requires two time slots to accomplish one information exchange. Compared to the traditional one-way relay system, which demands four time slots to complete one information exchange, our system only uses half as many time slots. Our proposed iterative receiver...
A new trend of mobile wireless services based on trajectory of a mobile phone and hence that of a mobile user, called Mobile Trajectory Based Services (MTBS) is emerging. To provision MTBS, a mobile operator needs to determine the trajectories of a mobile user over a period of time (a week for example) and then save them as mobility profile. There are two major challenges in determining the trajectory...
Robust and fast detection of the victim location during emergency cases such as vast area floods and other natural disasters is an important part of public safety communications. Even though cognitive radio technology is commonly related to public safety communications from the aspect of interoperability; awareness, learning, and intelligence features of cognitive radios can be beneficial for victim...
In this paper, we propose name resolution middleware that involves positional awareness to identify target hosts in wireless visible area communication (WVAC). WVAC is a wireless communication network that enables users to exchange information with nearby hosts, especially within the users' visible area, wherein the underlying network can be locally and temporarily constructed without the aid of any...
In this paper, we propose a novel relay selection scheme based on geographical information, aiming to minimize the symbol error probability (SEP) for wireless ad hoc relay networks. The proposed scheme utilizes only the source-relay and relay-destination distances as selection criteria to choose the best relay. In particular, such geographical information is often available during network initialization...
Many measurement studies showed that network traffic usually exhibits self-similar nature, meanwhile, wireless fading channels lead to the time-variant service rates of network nodes. Compared with classical queuing systems with Markov sources or constant service rates, the queuing system with self-similar input in a wireless fading channel is more complicated, and it is very difficult to obtain closed-form...
The motivation for our work was a feasibility study of the use of wireless technologies, more concretely IEEE 802.11, in industrial control systems. The considered application for configuration files upload to a system component puts requirements on the throughput of the established connection. To estimate the TCP throughput under the large range of varying conditions an analytical model has been...
In this paper, we present a real-time low-complexity user scheduling scheme for uplink multiuser multiple input multiple output (MIMO) wireless communication systems. We apply estimation of distribution algorithm (EDA) for user scheduling problem. The computational complexity of exhaustive search for user scheduling problem grows exponentially with the number of users. The proposed EDA has low computational...
This paper proposes a computational intelligence framework for network security management. The framework uses reinforcement learning and Bayesian methods to achieve cross-layer optimization in heterogeneous, multi-layer wireless and wireline networks. Metrics based on the reputation of a node are used to measure performance. OPNET simulations results indicate that routing algorithms based on the...
Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource and to defend against radio interference. In this paper, we explore methods...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.