The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tor, uses a protocol aimed at ensuring anonymity by distributing its communication over relays all over the world. This protocol designed to protect the privacy of Internet users from traffic analysis attacks launched by an adversary. The studies in the literature have shown that some attacks can be performed in the hidden service relays, or in exit nodes of services by eliminating anonimity. In this...
The evolution of conventional wireless communication networks to 5G is driven by an explosive increase in the number of wireless mobile devices and services, as well as their demand for any time and everywhere connectivity, high data rates, low latency, high energy efficiency, and improved quality of service. To address these challenges, 5G relies on key technologies, such as full duplex, D2D communications,...
In this paper, the system-level performance of nonorthogonal multiple access (NOMA) in coordinated direct and relay transmission (CDRT) is investigated. Considering a successive interference cancellation (SIC) receiver under the 3D channel model for LTE, the system-level performance of the NOMA-CDRT is compared to the NOMA in non-coordinated direct and relay transmission (nCDRT). Simulation results...
In this paper simulation studies have been conducted using Simulink/MATLAB software in order to investigate the impact of STATCOM on the positive-offset mho element loss of excitation (LOE) protection scheme in synchronous generator. The obtained results show that the operation of the positive-offset protection scheme takes more time under the integration of STATCOM in the transmission line. Moreover,...
This paper considers a relayed broadcast in IEEE 802.11 wireless local area (WLAN) networks. In the relayed broadcast, a source node intends to deliver data frames to many nodes beyond its coverage and all the nodes except the source node attempt to relay the received data frames in a contention-based and distributed manner. This traffic dissemination scheme, referred to as flooding, has several problems...
This paper describes two concepts of automatic systems for accuracy testing of current transformers. Advantages and disadvantages of both concepts are discussed. The concept of multi channel testing is used for developing of the measuring device for current transformer accuracy testing for factory FMT Zajecar. The short description of the device is presented as well as the results of its testing.
In this work, information security of a cooperative wireless communication system over three-phase amplify-and-forward (AF) two-way relaying channels is investigated. A relay power allocation scheme is proposed to improve secrecy capacity of the system. We first derive the secrecy rate expression for the basic scenario which consists of one source, one destination, one single relay, and an eavesdropper...
Employing traditional wireless two-hop relaying is very easy for eavesdropper to overhear message due to the broadcasting nature of transmission. However, relays, which are equipped with caching capabilities to store popular content, can serve the destination directly without fetching messages from source. In order to improve physical layer security, the design of hybrid cache placement becomes more...
The recent spread of mobile networks has paved the way for building a pervasive social networking (PSN) environment, which enables people to access social networking services (SNS) anytime and from anywhere. There have been extensive studies on MANETs (Mobile Ad-hoc NETworks), which use mobile terminals for relaying information. While the feasibility of using them as emergency networks in the aftermath...
In this paper, we investigate the performance of a generic relay system for small cells. The main features include the selection decode-and-forward (DF) scheme, Rician and Rayleigh fading, single or repeated transmissions in direct link, and maximal-ratio combining at destination. We are able to derive a set of closed-form expressions for the end-to-end performance. Based on these formulas, we define...
Although a number of asynchronous physical-layer network coding (PNC) schemes have been proposed, synchronous PNC may still be preferred for its simplicity. In this paper we propose a new symbol-level synchronization scheme which reduces the misalignment to less than one hardware clock cycle period. In addition, we prototype the proposed scheme on the Universal Software Radio Peripheral (USRP) platform...
This paper addresses the replacement of enhancement mode Si IGBTs with depletion mode SiC vertical junction field effect transistors (VJFETs) in a commercial motor drive in current production. A Yaskawa A1000 CIMR-AU4A0088FAA motor drive was analyzed and found to have reliability and safety features that can be exploited to introduce normally on SiC transistors with no loss in safety or reliability...
Physical layer security is becoming a promising technology to face the security challenges of diversified and rapidly-growing wireless applications. In this paper, we propose a three-hop secure Orthogonal Frequency Division Multiplexing (OFDM) transmission protocol for the wireless networks with untrusted relays. In the proposed protocol, instead of exploiting the degree of freedom over spatial domain...
In this paper, we study the problem of secret key generation with one-way communication, where in addition to the rate limited public channel, which can be observed by both Bob and Eve, we add a secure channel, which only connects Alice and Bob. In this model, we do not pose any constraints on the sources, i.e. Bob is not degraded to or less noisy than Eve. We propose an achievability scheme, and...
We propose an underlay decode-and-forward cognitive (UDFC) scheme under joint effects of hardware impairments at secondary users and interference constraints at multi primary receivers. In this scheme, the transmit powers of a source node and relays are constrained by interference thresholds of primary receivers in which the best relay is selected has the highest decoding capacity from the source...
A novel on-board battery charger for electric vehicle (EV) application based on open-winding permanent magnet synchronous machine is presented in this paper. The innovative charger reutilizes the currently existing components of EV drivetrain system, which has the net effect of saving cost, volume and weight. The topology integrates the conventional common dc-link converter with the windings of the...
Due to the low speed of underwater acoustic propagation and the adverse energy supply of underwater facility, it is a challenging task to reduce the end-to-end delay and the system energy consumption. In this paper, an improved scheme is proposed based on multi-hop coordinated transmission for underwater acoustic cooperative networks. The data packets are divided into parity groups and then transferred,...
In this paper, a vertical physical-layer network coding (VPNC) scheme based pulse amplitude modulation (PAM) for two-way relay channel (TWRC) is proposed. Different from the conventional physical layer network coding (PNC) scheme in which the relay superimposes two users' signals of the same constellation, in the proposed VPNC scheme two users transmit PAM signals with vertical constellation and the...
Educational institutions, should set a role model, in the reduction of the carbon foot print, to protect mother earth. In this paper we focus on designing a Wireless Sensor Network (WSN) based system, which can efficiently conserve the energy of class rooms and labs. We have identified temperature, light, pressure sensors to be utilized for this application. Infra Red receiver and transmitter is used...
Demand for ad-hoc networks is increasing so it is expected ad-hoc networks will exist in close proximity in the future. A contention window control method, ACWA, which improves throughput of ad-hoc network against radio interference has been recently proposed. However unfairness of throughput between ACWA and DCF might be caused. We propose a modified ACWA method (GSAR scheme) which drastically improves...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.