Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper we propose a greedy probabilistic approach for localization in Wireless Sensors Network (WSN). This topic has received much attention since the WSN are considered as the basis in the emerging area of Internet of Things (IoT). The proposed method aims at increasing the performance of the grid based Compressed Sensing (CS) localization algorithm. This latter is based on the sparse nature...
After wormhole attacks the routing mechanism of wireless sensor network (WSN) is damaged, then the hop count and distance between nodes cannot be well matched, so that the WSN becomes the anisotropic sensor network, resulting in security treats for WSN. Considering that wormhole attacks can cause the changing of node connectivity, through the theoretical analysis and derivation, the paper has proposed...
The social community in open source software developers has a complex network structure. The network structure represents the relations between the project and the engineer in the software developer's community. A project forms some teams which consist of engineers categorized into some task group. Source Forge is well known to be one of open source websites. The node and arc in the network structure...
This paper investigates the problem of relay selection in a non-reciprocal two-way relay network. To achieve full diversity, relay selection at a central node needs to gather all the instantaneous channel state information (CSI). Assume one of the source nodes is the central node, to make an accurate decision this node needs some more CSI which can not be estimated from the received signal. To solve...
This paper focuses on the performance analysis and comparison of three hard decision (HD) spectrum sensing schemes based on non-reconstruction compressed sampling. For HD based cooperative sensing, each secondary user (SU) perform compressed sampling to scan the wide spectrum and reports a local one-bit hard decision to the fusion center (FC). The difference between the proposed schemes and the traditional...
We present and analyze an Electric Vehicle (EV) charging management model for a fast charging station network in a smart grid environment. The proposed model considers a charging station network that provides service to multiple EV charging-classes. The basic feature of the proposed model is when EVs are blocked by their preferred station due to the unavailability of charging outlets, they are prompted...
In this paper, we propose a hierarchical decision fusion scheme to improve network wide detection probability for wireless sensor networks. In the proposed scheme, each sensor first makes its own local decision, and then adjusts its decision based on the decision results of its neighbors. Finally, a network wide decision fusion is applied to obtain the final decision result. Our simulation results...
This paper investigates how data mining can be applied in functional debug, which is formulated as the problem of explaining a functional simulation error based on human-understandable machine states. We present a rule discovery methodology comprising two steps. The first step selects relevant state variables for constructing the mining dataset. The second step applies rule learning to extract rules...
The circulation of video content over P2P frameworks has turned into a prominent and practical-alternative as of late because of the expanding online accessibility of the content. Furthermore, the differing qualities of end-client terminals utilized for expending content requests the provisioning of content in diverse qualities. A piece hunting algorithm for video content needs to guarantee that the...
The static frequency allocation in wireless communication became a major issue for an efficient spectrum utilization. Also some of the frequency channels are not fully utilized because of spatial and temporal variations. Hence the focus of the new spectrum management policies is dynamic spectrum access (DSA) technology based on cognitive radio (CR). Spectrum mobility is considered to be the next big...
This article proposes a new analytical method for the determination of traffic characteristics in multi-stage switching networks with multiservice traffic sources and implemented reservation mechanisms. The method proposed in the article provides a set of well-defined actions which can be performed to determine the point-to-group blocking probability in switching networks with resource reservation...
In order to improve spectrum utilization efficiency of Cognitive Radio (CR) systems, it is important for Secondary User (SU) to get knowledge about Primary User(PU)'s behavior when SU exploits opportunity to access spectrum. Radio Environment Database has recently been proposed to provide information about PU. Traditional advanced spectrum database constructed based on spectrum sensing method assumes...
This paper conducts a simulation analysis of probability reception in detecting radio signal levels in an indoor environment. Femtocell simulations were performed that considered fourth generation (4G) networks, operating at 2.6 GHz (LTE-4G), and WiMAX, at 3.5 GHz. Two indoor scenarios were chosen for this study and simulated signals with and without and interference. The Padè approximant model was...
Aiming at the problem that the fault tolerant performance of existing blind recognition methods of RS (Reed-Solomon) code based on matrix transformation is not ideal enough, a new approach is proposed in this paper to simplify the procedure of obtaining primitive polynomial and improve the performance. Moreover, the method of probability statistic is exploited to increase the recognition probability...
In this paper, the problem of distributed multiuser Opportunistic Spectrum Access is studied based on Partially Observable Markov Decision Process (POMDP), where the channels are partially observed by secondary users (SUs) constrained by hardware and energy. Considering the similarity of spectrum environment, the decision of every secondary user may be the same, which leads to collisions. Comparing...
Group paging is one of the mechanisms proposed to resolve the radio access network (RAN) overload problem resulted from simultaneous channel access from huge machine devices [1]. This paper presents a consecutive group paging to enhance the performance of group paging. In consecutive group paging, the base station reserves multiple paging cycles to page the same group of users consecutively such that...
Microblog has already been one of the most popular communication channels on the Internet, and also has become the third part of the public opinion source in China. This paper describes the behavior of browsing messages in microblog to calculate the probability of a message to be browsed after releasing and proposed an epidemic model to explain how a rumor gets spread among followers with the influence...
In this paper a new mathematical model, describing the behavior of simplified Constrained Priority Countdown Freezing (CPCF) protocol, is introduced. The CPCF protocol sets constrains on DCF countdown mechanism and thus requires different mathematical model from those found in the literature. For this reason, the two-dimensional Markov chain analytical model is developed in order to accurately quantify...
Recently many prominent web sites face so called Distributed Denial of Service Attacks (DDoS). DDoS attacks are a virulent, relatively new type of attack on the availability of Internet services and resources. To avoid denigration most of the commercial sites do not expose that they were attacked that is the biggest challenges of the researchers. Network congestion caused by DDoS attack can be managed...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.