The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider the problem of finding the maximum routing throughput between any pair of nodes in an arbitrary multirate wireless mesh network (WMN) using multiple paths. Multipath routing is an efficient technique to maximize routing throughput in WMN, however maximizing multipath routing throughput is a NP-complete problem due to the shared medium for electromagnetic wave transmission...
The authors have proposed a fair solution to optimal rate adaptation. The problem has been described in terms of the objective function, decision variables and constraints. Furthermore, using this problem definition, a rate adaptation heuristic was developed and divided into two sub- problems; part one requires finding the optimal rate allocation within the network, part two continues by finding a...
Improving Quality of Service (QoS) in wireless networks is important and necessary for mobile users. We have previously proposed Comfort Route (CR) Navigation, which navigates users to their destinations using high QoS communication areas, such as Wi-Fi APs, rather than the geographical Shortest Route (SR). In this paper, we employ an analytical model to estimate the CR gain in a theoretical manner...
In this paper, a new admission control scheme is presented based on the proportional admission control scheme of the IEEE802.11aa to solve the problems in the 802.11 WLANS. Quality of service (QoS) and throughput are the most significant questions in the 802.11 WLANS especially when the bandwidth is scare. In the Overlapping Basic Service Set (OBSS), we need to face many problems such as the high...
The Turbo-decoding Message-passing (TDMP) algorithm of Low-Density Parity-Check (LDPC) codes has a faster convergence speed, lower hardware implementation complexity, and less storage units than the Belief-Passing (BP) algorithms. However, because of the integer quantization operations for initial information, restriction of storage units will cause the problem of decoding information overflowing...
Newton-Raphson and Goldschmidt algorithms can be sped up by using variable latency hardware architectures for rounding division, square root and their reciprocals. A new approach based on a rounding method with remainder estimate calculated concurrently with the algorithm was proposed in [5]. This paper presents an study of the hardware implementation of this approach and shows that does not suppose...
Backpressure Routing is a cross-layer control algorithm that makes decisions on routing and resource allocation in mobile ad hoc networks using network state information like queue backlog values and current available channel rates. While it is desirable because of its provable performance guarantees, including providing optimal throughput, the real world problem of implementing backpressure routing...
Cryptographic hash functions have many security based applications, particularly in message authentication codes (MACs), digital signatures and data integrity. Secure Hash Algorithm-3 (SHA-3) is a new cryptographic hash algorithm that was selected on 2nd Oct '12 after a five year public contest organized by the National Institute of Standards and Technology (NIST), USA. This paper provides a unique...
This paper is devoted to modeling and analysis of multi-product manufacturing systems with asynchronous exponential machines and finite non-dedicated buffers. In such systems, each machine may process different types of products with different speeds, and buffers are shared for all products. Analytical methods to evaluate the system performance are developed. Formulas are derived to calculate line...
The small cell network based Heterogeneous Network (HetNet) is featured as the promising way to meet the higher capacity improvement requirements for future. But how to effectively solve the upcoming heavy load and low Energy Efficiency (EE) problem in densely deployment scenario are still the key challenges for the small cell HetNet. In order to solve above problems, we implement the offloading strategy...
In a Wi-Fi Direct network, a single battery-powered mobile device called group owner (GO) helps other mobile devices communicate each other without relying on a pre-existing infrastructure such as base stations. Hence, the Wi-Fi Direct defines two power saving schemes for the energy efficiency of GO, called opportunistic power save (OPS) and notice of absence (NoA). However, the Wi-Fi Direct specification...
Auto white balancing is the process of keeping the color of objects constant automatically under different illumination conditions by calculating a number of parameters from the image data. These parameters are used to change the image pixel values to keep the color constant. This paper discusses the Lam's auto white balance algorithm and presents a novel, high-performance and cost-effective implementation...
Along with the development of high-speed railway, higher and higher technical requirements for the mobile communication system in it are raised. Communication Based Train Control (CBTC) will be based on mobile communication, of which the key problem is how to support high reliability of data transmission in order to improve utilization of tracks and enhance train's safety. The applications of LDPC...
QoS prediction is critical to Web service selection and recommendation. This paper proposes a collaborative approach to quality-of-service (QoS) prediction of web services on unbalanced data distribution by utilizing the past usage history of service users. It avoids expensive and time-consuming web service invocations. There existed several methods which search top-k similar users or services in...
Leveraging on recent TV white space communications developments in regulations,standards initiatives and technology, this paper considers a suitable next generation network comprising of two primary users (PUs) that compete to offer a service to a group of secondary users (SUs) in the form of mesh routers that belong to different entrepreneurs participating in a non-cooperative TV white space trading...
Energy harvesting (EH) technology has become a promising alternative to solve the problem of the energy-limited wireless systems. As such, in this paper, we consider optimization of a single-user wireless communication system, where an EH transmitter operates in harvest-use-store (HUS) mode with the non-ideal rechargeable battery. With the storage efficiency and causality constraints, our key design...
The choice of relay nodes significantly affects the performance of wireless cooperative networks. Previous research mostly focused on dedicating one relay node to a source node in the network. However, fairness can be improved by sharing each relay node among more than one source node. This paper first defines the shared relay assignment for (max-min) fairness (SRAF) problem, and formalizes it using...
We propose a new framework for optimizing the target secrecy rate for SISOME wiretap channels when the instantaneous capacity of the eavesdropper's channel is not available at the transmitter. In our framework we introduce the effective secrecy throughput, a new optimization metric that implicitly captures the two key features of wiretap channels, namely, reliability and secrecy. We derive target...
IEEE 802.15.4 Medium Access Control (MAC) layer does not include the Request-To-Send/Clear-To-Send (RTS/CTS) handshake mechanism, in order to overcome the hidden node problem that affects Wireless Sensor Networks (WSNs). In this paper we propose and analyse the use of RTS/CTS in IEEE 802.15.4 for the nonbeacon-enable mode. The proposed solution shows that by considering the RTS/CTS mechanism combined...
In this paper, we present a transformation that takes a cyclo-static dataflow (CSDF) graph and produces an equivalent multi-rate synchronous dataflow (MRSDF) graph. This fills a gap in existing analysis techniques for synchronous dataflow graphs, transformations into equivalent homogeneous synchronous dataflow (HSDF) graphs exist, but these suffer from an exponential increase in the graph's size....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.