The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reversible logic; transforms logic signal in a way that allows the original input signals to be recovered from the produced outputs, has attracted great attention because of its application in diverse areas such as quantum computing, low power computing, nanotechnology, DNA computing, quantum dot cellular automata, optical computing. In this paper, we design low power binary comparators using reversible...
In this paper, we apply statistical mechanics methods to the problem of detection of multiple primary wireless sources by a wireless sensor network. We assume that the location of the primary sources is known, but that the channel connecting them to the sensors is random. The sensor network tries to detect which sources are emitting by employing a belief propagation algorithm. We use the Replica approach...
This paper proposes online independent vector analysis (IVA) based on an auxiliary-function approach for real-time blind speech separation. A batch auxiliary-function approach is naturally extended with autoregressive approximation of an auxiliary variable. Experimental evaluations show that the proposed online algorithm works in real time and attains relatively high signal-to-interference ratios...
Most non-sinusoidal power theories have been developed from theoretical techniques, as well as relying on hypothetical and experimental networks to highlight the advantages of each. The drawback of the power theories is that no single one has been universally accepted as a benchmark for other developments. This paper will however show this weakness by means of evaluating two power theories in the...
Dynamic deployment aims at enhancing coverage in wireless sensor networks by redistributing sensor nodes after initial random deployment. In this paper, a harmony search based dynamic deployment (HS-DD) technique is proposed that aims at maximizing both network coverage and connectivity. Furthermore, the performance of the proposed algorithm and a number of the HS-variants in dynamic deployment is...
This work proposes a distributed power allocation scheme for maximizing the energy efficiency in the uplink of non-cooperative small-cell networks based on orthogonal frequency-division multiple-access technology. This is achieved by modeling user terminals as rational agents that engage in a non-cooperative game in which every terminal selects the power loading so as to maximize its own utility (the...
Mobile Ad Hoc Networks (MANET) are widely used in tactical scenarios because they can be deployed rapidly in hostile areas and the distributed nature of their operations makes them robust to nodes failures. However, distributed control involves new vulnerabilities that might be critical in electronic warfare scenarios. In this paper we focus on black hole attacks which introduce in the network fake...
In this work, several techniques for the optimization of expressions in a novel quaternary algebra are discussed thoroughly. This quaternary algebra, which can be used to implement any quaternary logic function, is closely related to Boolean algebra. A set of quaternary operators are defined and two ways to express any quaternary function mathematically are described. Finally, we have discussed several...
The use of small cells has been proposed to increase system capacity by installation of base stations close to user location. Proximity of the base station with the user equipment also implies lesser power requirement for transmitting the same information. Thus one may expect improvement in energy efficiency. But installing a large number of base stations can also lead to an increase in the total...
The optimum performance of a closed loop transmission scheme depends upon perfect feedback information at the transmitter. The perfect feedback requires unlimited resources in the reverse communication link. However, the feedback resources are limited in a practical system. Therefore, there is a trade off between the feedback load and the performance of transmission scheme. In this work, we evaluate...
Rapid advances in wireless ad hoc networks lead to increase their applications in real life. Since wireless ad hoc networks have no centralized infrastructure and management, they are vulnerable to several security threats. Malicious packet dropping is a serious attack against these networks. In this attack, an adversary node tries to drop all or partial received packets instead of forwarding them...
This paper presents a comparison between fractional order controllers and integer order controllers. The well-known PID is the integer order controller chosen whereas the generalized PID and the CRONE (“Commande Robuste d'Ordre Non Entier” which stands for fractional order robust controller) are the fractional order controllers studied. Another big difference between these controllers is that the...
In this paper, it is shown that Local Zernike Moments which is used in object and face recognition applications succesfully, can also used for face-pair matching problem. In this study, instead of using feature vectors produced by LZM directly, we focussed on reducing the dimensions of feature vectors and increasing the performance. In the light of experimental results, a new method called L2ML-YZM...
The most widely used in the field of visual object recognition descriptive features are shape based features. Identify objects in the image, contour and region shape descriptors based on two main topics to be examined. In order to describe objects with lesser number of descriptors, linear or cubic curves are fitted to the contours of the objects. The end points of these finite length curves are usually...
This paper considers a problem where multiple users make repeated decisions based on their own observed events. The events and decisions at each time step determine the values of a utility function and a collection of penalty functions. The goal is to make distributed decisions over time to maximize time average utility subject to time average constraints on the penalties. An example is a collection...
The paper investigates the balance between Quality of Service (QoS) and power consumption for a traffic queue. Automatic adaptation to the power of the packet processing engine is sought through a heuristics and an optimal control strategy. The study allows to track the behavior of the system over time, thus avoiding the optimization of the steady state behavior of the system, which is hardly applicable...
A robust transmit beamforming scheme is proposed for green cognitive radio networks in presence of incorrect steering vector estimations. The beamformer is designed using a stochastic optimization approach. The proposed beamforming scheme achieves three objectives: a) Probability for large-than-a-threshold for secondary user's received power in the steering direction is maximized; b) Probabilities...
The introduction of coherent optics and wavelength division multiplexing (WDM) in telecommunication networks has led to unprecedented gains in backbone capacity. The increase in optical layer capacity inadvertently exacerbates the problem of traffic loss due to optical component failures. IP networks are designed over optical backbone networks, where each IP link traverses a multihop optical lightpath...
We provide an improved bound for the expectation of the stationary delay under the maximum weight scheduling (MWS) policy in one-hop wireless networks. In the model, the interference of the links is characterized by an interference graph G=(V, E). For a vector μ ∊ R|V|+, let χf (G, μ) be the weighted fractional coloring number for the graph G under the weight vector μ. For an arrival rate vector λ...
Auctions provide a platform for licensed spectrum users to trade their underutilized spectrum with unlicensed users. Existing spectrum auctions either do not apply to the scenarios where multiple sellers and buyers both make offers, or assume the knowledge of the users' valuation distribution for maximizing the profit of the auction. To fill this void, we design PROMISE, a framework for spectrum double...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.