The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While the importance of protecting the confidentiality of sensitive cybernetic communications is widely recognized, the importance of ensuring the trustworthiness of information that is public yet critical is perhaps less obvious. Critical non-confidential messages must be issued by a trusted authoritative source in order to serve as the basis for operational decisions, but while existing authentication...
This paper proposes an efficient mechanism that mitigates crosstalk faults in Network-on-Chips (NoCs). This is done by using a Packet Manipulating mechanism called PAM for reliable data transfer of NoCs. PAM investigates the transitions of a packet to minimize the forbidden transition patterns appearing during the flit traversal in NoCs. To do this, the content of a packet is manipulated using three...
The sliding window protocol (SWP) is a useful protocol in network communications. It can ensure a correct data transfer over unreliable channels where frames may be duplicated, lost, or re-ordered. This paper presents an incremental formal modeling of the SWP using Event-B method. We model the protocol step by step by using refinement, a technique of Event-B. The first step will be the modeling of...
Small cells are low power nodes, which have lower transmit power than the macro eNodeB. They are regarded as one of the important solutions in long term evolution advanced (LTE-A) to deal with the dramatically increased mobile data traffic. Small cells deployments in LTE-A release 12 with 4 small cells in a cluster suffer from stronger inter-cell interference than heterogeneous network (HetNet) in...
Communications through networks, at present, involves the transfer of information in different amounts and times for each type of service. In a telephone conversation a small loss of information can be tolerated, since in this case, is more important the rate with which the data reaches the receiver. When it is required to transfer sensitive information such as banking data, longer times of arrival...
Wireless networks are becoming popular because of their ease of access and connectivity, especially the Ad hoc network, which can be setup in a minute and supports mobility. The ad hoc network is at very early stage, but evolving fast. Mobile Ad hoc Network (MANET) is a kind of ad hoc network consists of mobile nodes connected through wireless technology. It is open, decentralized, low powered and...
We consider a cache-enabled K-user broadcast erasure packet channel in which a server with a library of N files wishes to deliver a requested file to each user who is equipped with a cache of a finite memory M. Assuming that the transmitter has state feedback and user caches can be filled during off-peak hours reliably by decentralized cache placement, we characterize the optimal rate region as a...
Consider a channel where authorized transmitter Jack sends packets to authorized receiver Steve according to a Poisson process with rate λ packets per second for a time period T. Suppose that covert transmitter Alice wishes to communicate information to covert receiver Bob on the same channel without being detected by a watchful adversary Willie. We consider two scenarios. In the first scenario, we...
In an erasure adversarial wiretap channel (eAWTP-channel), the adversary can select a fraction ρr of the codeword to read, and a fraction ρe of the codeword to erase. The model can be seen as an extension of the wiretap II model where the adversary not only selects its view of the transmitted word, but also can erase a fraction of the codeword. eAWTP codes provide security and reliability for communication...
The arrival of mission critical applications in the context of vehicular, medical and industrial wireless communications calls for reliability constraints never seen before in cellular systems. Enhanced Inter-Cell Interference Coordination (eICIC) has been widely investigated in the context of LTE-A Heterogeneous Networks, but always with load balancing and resource partitioning purposes. Given the...
In this paper, we propose a reliable dual-radio based DSRC channel assignment scheme and a new application- level based receiver-oriented repetition (AROR) scheme for one-hop event-driven emergency message broadcast in vehicular ad hoc networks (VANETs). The new scheme takes advantage of DSRC dual-radio devices to provide preemptive access for one-hop event-driven safety services without conflicts...
This paper1 examines five strategies for upset protection in Gold sequence generators used to maintain signal acquisition in GPS receivers. This work is motivated by the increased prevalence of single-event upsets in ultra low-power GPS receivers. If any upset occurs in the Linear Feedback Shift Register (LFSR) modules, then the corresponding satellite signal must be re-acquired, resulting in high...
Fifth generation of cellular systems is expected to widely enable machine-type communications (MTC). The envisioned applications and services for MTC have diverse requirements which are not fully supported with current wireless systems. Ultra-reliable communications (URC) with low-latency is an essential feature for mission-critical applications, such as industrial automation, public safety, and vehicular...
This paper, utilizing correlation analysis and path analysis methods, researches the impact path of negative Internet word related to the mouth on brand equity and quality through cognitive trust concept by regarding universal consumers as study principal body. This research aims to further promote the IWOM research system in China. The empirical conclusions unveil some relationship: (1) the cognitive...
Multimedia services distribution is very dependent on the quality of the communications link. Due to the nature of the related services, these are usually very sensitive to packet loss, delay and jitter, and hence service quality is immediately worsen in harsh scenarios. This paper proposes an OSI-Layer2 cooperative link layer scheme (known as GalaReS) that remarkably improves the multimedia content...
With the ever-increasing popularity of online reviews, understanding what makes an online review helpful has attracted increasingly more attention from both academics and practitioners. Using Elaboration Likelihood Model as the theoretical framework, this study aims to investigate the effects of specific information cues derived from the review message (difference with average rating and review title...
One of the key issues of security is fast and accurate analyses of different threats in above ground and underground structures of different applications. Among the most dangerous threats, that may end with fatal and destructive results are fires and explosions. Modern threat identification systems must be quick-acting and reliable. The development of contemporary detection devices is oriented to...
We consider a 5G small cell model where the cells are deployed in a way to cover users in the neighbor cells in order to introduce cell active-sleep control, so-called inter-cell power management (IPM). Using a Markov decision process (MDP), one can obtain an optimal policy for IPM, but with limited scalability. This paper proposes a modular IPM strategy which is a suboptimal policy to group only...
In this paper, a wiretap channel where the transmitter and receiver communicate through a discrete memoryless channel, and the eavesdropper (Eve) has perfect access to a fixed fraction of transmitted symbols (of its choosing) is considered. An outer bound for the rate-equivocation region of the channel, for all such fractions, is derived. An achievable scheme, which provides an inner bound for the...
Deploying direct device-to-device (D2D) links is considered an enabler for V2X applications, with intra-cell interference and stringent latency and reliability requirements as challenging issues.We investigate the radio resource management problem for D2D-based safety-critical V2X communications. Firstly, we analyze and transform the V2X latency and reliability requirements into mathematical forms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.