Hindawi Publishing

Displaying 281-320 of 1569 results

  • White Papers // Apr 2013

    A Privacy-Preserving Reauthentication Scheme for Mobile Wireless Sensor Networks

    The Mobile Wireless Sensor Network (MWSN) is a new style WSN with mobile sinks or sensors in the network. MWSN has advantages over static WSN in the aspect of better energy efficiency, improved coverage, and superior channel capacity. However, mobile nodes also bring some security problems. For example, it is...

    Provided By Hindawi Publishing

  • White Papers // Apr 2013

    APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks

    EPCglobal network is used to share product data between trading partners, which was proposed by EPCglobal. In this paper, the authors make the first attempt to solve those two security risks together without relying cryptography. They propose a scheme, namely, APP (Authenticate ONS and Protect EPC Privacy), to guarantee the...

    Provided By Hindawi Publishing

  • White Papers // Apr 2013

    Design Example of Useful Memory Latency for Developing a Hazard Preventive Pipeline High-Performance Embedded-Microprocessor

    The existence of structural, control, and data hazards presents a major challenge in designing an advanced pipeline/superscalar microprocessor. An efficient memory hierarchy cache-RAM-disk design greatly enhances the microprocessor's performance. However, there are complex relationships among the memory hierarchy and the functional units in the microprocessor. Most past architectural design simulations...

    Provided By Hindawi Publishing

  • White Papers // Apr 2013

    New Trends in Secure Routing Protocols for Wireless Sensor Networks

    Recently, Wireless Sensor Networks (WSNs) have been deployed into a variety of applications including homeland security, military systems, and health care. Sensor nodes deployed in such networks are subject to several attacks such as sinkhole and select forwarding, wormhole, Hello flood, and replication attacks. Therefore, developing secure and energy-efficient routing...

    Provided By Hindawi Publishing

  • White Papers // Apr 2013

    Integrated Protocols to Ensure Security Services in Wireless Sensor Networks

    Security in current/next generation Wireless Sensor Network (WSN) is challenging, due to its special characteristics and the scarcity of energy, and processing power. Thus, many security methods are trying to solve the problem of security in wireless sensor networks. Many of these methods use symmetric cryptography, and others use asymmetric...

    Provided By Hindawi Publishing

  • White Papers // Apr 2013

    Data Storage Scheme Supporting for Multidimensional Query

    The query and storage of data is very important in Wireless Sensor Networks (WSN). It is mainly used to solve how to effectively manage the distributed data in the monitored area with extremely limited resources. Recent advances in technology have made the number of the sensing modules in one sensor...

    Provided By Hindawi Publishing

  • White Papers // Apr 2013

    A Distributed Pseudonym Management Scheme in VANETs

    Security and privacy have been important issues in VANETs. Anonymity is an effective way to achieve privacy protection, and it sometimes requires to be disclosed for determining traffic liability. In most pseudonymschemes, an authority is aware of a vehicle's secret, and its compromise will result in the leakage of a...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    Robust Data Compression for Irregular Wireless Sensor Networks Using Logical Mapping

    The authors propose RIDA, novel robust information-driven data compression architecture for distributed wireless sensor networks. The key idea is to determine the data correlation among a group of sensors based on the data values to significantly improve compression performance rather than relying solely on spatial data correlation. A logical mapping...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks

    The communication between cell phones and sensor networks involves strong user authentication protocols to ensure the data and network security. Generally, in order to obtain the relevant information, cell phones interact with sensor networks via gateways. This unique ability is used to provide better authentication and security protocols that can...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    Immune Embedded Linux Core System with Multiple Sensors

    The security of the embedded Linux core system is more important than before because this system is becoming more useful to solve the security problem of the computer system than the Windows operating system. It is firstly necessary to identify the normal state of the embedded Linux core system with...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks

    One concerned issue in the routing protocol for Wireless Sensor Networks (WSNs) is how to provide with as much security to some special applications as possible. Another is how to make full use of the severely limited resource presented by WSNs. The existing routing protocols in the recent literatures focus...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey

    Advancement in technology has made it possible to develop tiny low-cost sensor nodes with off-the-shelf hardware. Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained sensor nodes which are commonly not tamper proof. As a result, Wireless Sensor Networks (WSNs) are prone to a wide...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    Cloud Computing Platform for an Online Model Library System

    The rapid developing of digital content industry calls for online model libraries. For the efficiency, user experience, and reliability merits of the model library, this paper designs a web 3D model library system based on a cloud computing platform. Taking into account complex models, which cause difficulties in real-time 3D...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    A Secure and Efficient Data Aggregation Framework in Vehicular Sensing Networks

    Vehicular ad hoc networks support a wide range of promising applications including vehicular sensing networks, which enable vehicles to cooperatively collect and transmit the aggregated traffic data for the purpose of traffic monitoring. The reported literatures mainly focus on how to achieve the data aggregation in dynamic vehicular environment, while...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    Large-Scale CFD Parallel Computing Dealing with Massive Mesh

    In order to run CFD codes more efficiently on large scales, the parallel computing has to be employed. For example, in industrial scales, it usually uses tens of thousands of mesh cells to capture the details of complex geometries. How to distribute these mesh cells among the multiprocessors for obtaining...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    Efficient Heuristic Based on Clustering Approach for OLSR

    Due to the dynamic nature of Mobile Ad hoc NETwork (MANET), the Quality-of-Service (QoS) requires several improvements. The present paper comes within the framework of research to optimize QoS in MANET. In this paper, the authors propose a novel version of OLSR based on the clustering approach which is inspired...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    User authentication in Wireless Sensor Networks (WSNs) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrained environments is a paramount security concern. To overcome the...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    GPU-Based Cloud Service for Smith-Waterman Algorithm Using Frequency Distance Filtration Scheme

    As the conventional means of analyzing the similarity between a query sequence and database sequences, the Smith-Waterman algorithm is feasible for a database search owing to its high sensitivity. However, this algorithm is still quite time consuming. CUDA programming can improve computations efficiently by using the computational power of massive...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    A Review of IEEE 802.15.6 MAC, PHY, and Security Specifications

    IEEE 802.15.6 is the first international Wireless Body Area Network (WBAN) standard that supports communications in the vicinity of or inside a human body to serve a variety of medical and nonmedical applications. The standard defines a Medium Access Control (MAC) layer that supports several Physical (PHY) layers. In this...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    The Novel Authentication Scheme Based on Theory of Quadratic Residues for Wireless Sensor Networks

    Being one of the main technologies for Internet of Things (IoT), wireless sensor network is absolutely critical and plays an increasingly important role in the development of Internet of Things (IoT). Wireless sensor network is mobile network composed of sensor nodes with limited resources, like computation capability, energy, memory storage,...

    Provided By Hindawi Publishing

  • White Papers // Mar 2013

    A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks

    Wireless sensor networks are a modern and advanced technology whose applications are fast developing in recent years. Despite being a fascinating topic with various visions of a more intelligent world, there still exist security issues to be resolved in order to make WSNs fully adoptable. Due to the resource constraints...

    Provided By Hindawi Publishing

  • White Papers // Feb 2013

    B3: Fuzzy-Based Data Center Load Optimization in Cloud Computing

    Cloud computing started a new era in getting variety of information puddles through various internet connections by any connective devices. It provides pay and use method for grasping the services by the clients. Data center is a sophisticated high definition server, which runs applications virtually in cloud computing. It moves...

    Provided By Hindawi Publishing

  • White Papers // Feb 2013

    Feature Extraction from 3D Point Cloud Data Based on Discrete Curves

    Reliable feature extraction from 3D point cloud data is an important problem in many application domains, such as reverse engineering, object recognition, industrial inspection, and autonomous navigation. In this paper, a novel method is proposed for extracting the geometric features from 3D point cloud data based on discrete curves. The...

    Provided By Hindawi Publishing

  • White Papers // Feb 2013

    A Retroactive-Burst Framework for Automated Intrusion Response System

    In this paper, the authors present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of responses are applied without any feedback...

    Provided By Hindawi Publishing

  • White Papers // Feb 2013

    Privacy and Security in Wireless Sensor Networks: Protocols, Algorithms, and Efficient Architectures

    In the last years, Wireless Sensor Networks (WSNs) experienced a rapid growth with a huge interest from both academia and industry. Besides communication services, their applications include environmental monitoring, surveillance, logistics and process control in industrial scenarios, local and home area networks for health, assistance of elderly and disabled people,...

    Provided By Hindawi Publishing

  • White Papers // Feb 2013

    Streaming Support for Data Intensive Cloud-Based Sequence Analysis

    Cloud computing provides a promising solution to the genomics data deluge problem resulting from the advent of Next-Generation Sequencing (NGS) technology. Based on the concepts of \"Resources-on-demand\" and \"Pay-as-you-go\", scientists with no or limited infrastructure can have access to scalable and cost-effective computational resources. However, the large size of NGS...

    Provided By Hindawi Publishing

  • White Papers // Feb 2013

    A Novel Algorithm for Intrusion Detection Based on RASL Model Checking

    The Interval Temporal Logic (ITL) Model Checking (MC) technique enhances the power of Intrusion Detection Systems (IDSs) to detect concurrent attacks due to the strong expressive power of ITL. However, an ITL formula suffers from difficulty in the description of the time constraints between different actions in the same attack....

    Provided By Hindawi Publishing

  • White Papers // Feb 2013

    BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are based on the technology of sensor; wireless communication, tiny embedded devices, and distributed computing. Localization is the key supporting technology for Wireless Sensor Networks (WSNs). Security and accuracy are the premise of the localization application. Real-world applications of wireless sensor networks are often subject to...

    Provided By Hindawi Publishing

  • White Papers // Feb 2013

    Area Optimized FPGA-Based Implementation of The Sobel Compass Edge Detector

    In this paper, the authors present a new FPGA resource optimized hardware architecture for real-time edge detection using the sobel compass operator. The architecture uses a single processing element to compute the gradient for all directions. This greatly economizes on the FPGA resources' usages (more than 40% reduction) while maintaining...

    Provided By Hindawi Publishing

  • White Papers // Feb 2013

    A Cross-Layer Security Scheme of Web-Services-Based Communications for IEEE 1451 Sensor and Actuator Networks

    IEEE 1451 standard has been proposed to provide a common communication interface and transducer electric data sheet format for wired and wireless distributed applications in smart transducers (sensors and actuators). Currently, a unified Web service for IEEE 1451 smart transducers is a must. However, ensuring the security of web-services-based communications...

    Provided By Hindawi Publishing

  • White Papers // Jan 2013

    A High-Speed and Low-Energy-Consumption Processor for SVD-MIMO-OFDM Systems

    A processor design for Singular Value Decomposition (SVD) and compression/decompression of feedback matrices, which are mandatory operations for SVD Multiple-Input Multiple-Output Orthogonal Frequency-Division Multiplexing (MIMO-OFDM) systems, is proposed and evaluated. SVD-MIMO is a transmission method for suppressing multistream interference and improving communication quality by beamforming. An Application Specific Instruction-set Processor...

    Provided By Hindawi Publishing

  • White Papers // Jan 2013

    A Multipath Routing Approach for Secure and Reliable Data Delivery in Wireless Sensor Networks

    Advances in wireless sensor networks have enabled a wide range of application across many fields. Many of these applications have high Quality of Service (QoS) requirements in terms of security and reliability of data transmission. The severe resource constraints and challenging deployment environments of Wireless Sensor Networks (WSNs) pose challenges...

    Provided By Hindawi Publishing

  • White Papers // Jan 2013

    An Anchor-Free Localization Scheme with Kalman Filtering in ZigBee Sensor Network

    A localization scheme for wireless sensor networks is proposed and its performances are investigated in this paper. The proposed scheme is an anchor-free scheme, in which no geometrical information of sensor nodes is required for their localization. Thus, only local interaction among sensor nodes is used to estimate their locations....

    Provided By Hindawi Publishing

  • White Papers // Jan 2013

    QoE-Based Performance Evaluation for Adaptive Media Playout Systems

    To improve the playout quality of video streaming services, several Adaptive Media Playout (AMP) mechanisms were proposed in literature. However, all performance evaluations and comparisons for AMPs were made in terms of Quality of Service (QoS) metrics. As one knows, there may exist a trade-off between QoS metrics, such as...

    Provided By Hindawi Publishing

  • White Papers // Jan 2013

    Comparative Study of Antenna Designs for RF Energy Harvesting

    In the last few years, several antenna designs of rectenna that meet various objectives have been proposed for use in RF energy harvesting. Among various antennas, microstrip patch antennas are widely used because of their low profile, lightweight, and planar structure. Conventional patch antennas are rectangular or circular in shape,...

    Provided By Hindawi Publishing

  • White Papers // Jan 2013

    Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    The authors apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication, session key agreement, can quickly check the validity of the input password, and...

    Provided By Hindawi Publishing

  • White Papers // Jan 2013

    Limits on Estimating Autocorrelation Matrices from Mobile MIMO Measurements

    On mobile radio links, data samples collected at successive time intervals and at closely spaced frequencies are correlated, so long data records are required to acquire sufficient independent samples for analysis. Statistical analysis of long data records is not reliable because the channel statistics remain wide-sense stationary only over short...

    Provided By Hindawi Publishing

  • White Papers // Jan 2013

    A Multibeam Antenna Array Based on Printed Rotman Lens

    In modern microwave applications, it is often desired to integrate radar and communication functions such as active/passive target acquisition, combat identification, weapons guidance, secure point-to-point communications, and active protection into a single complete system. Antennas capable of supporting multiple simultaneous beams that can be scanned over a wide range are...

    Provided By Hindawi Publishing

  • White Papers // Jan 2013

    Client-Driven Joint Cache Management and Rate Adaptation for Dynamic Adaptive Streaming Over HTTP

    Due to the fact that proxy-driven proxy cache management and the client-driven streaming solution of Dynamic Adaptive Streaming over HTTP (DASH) are two independent processes, some difficulties and challenges arise in media data management at the proxy cache and rate adaptation at the DASH client. This paper presents a novel...

    Provided By Hindawi Publishing

  • White Papers // Jan 2013

    A Bilayer Resource Model for Cloud Manufacturing Services

    Cloud manufacturing and Cloud service is currently one of the main directions of development in the manufacturing industry. Under the Cloud manufacturing environment, the characteristics of publishing, updating, searching, and accessing manufacturing resources are massive, complex, heterogeneous, and so forth. A bi-layer manufacturing resource model with separation of Cloud end...

    Provided By Hindawi Publishing

  • White Papers // Dec 2009

    Performance Analysis of "WBC Over DVB-H" Link Layer

    This paper presents two novel smart cross-layer error-control coding schemes for improving the error protection of service advertisements that are broadcast to mobile terminals on Wireless Billboard Channels (WBCs) established over a Digital Video Broadcast-Handheld (DVB-H) infrastructure. These are the Smart Section Erasure (SSE) and Smart Transport Stream Erasure (STSE)...

    Provided By Hindawi Publishing

  • White Papers // Sep 2010

    Modeling On-Body DTN Packet Routing Delay in the Presence of Postural Disconnections

    This paper presents a stochastic modeling framework for store-and-forward packet routing in Wireless Body Area Networks (WBAN) with postural partitioning. A prototype WBANs has been constructed for experimentally characterizing and capturing on-body topology disconnections in the presence of ultrashort range radio links, unpredictable RF attenuation, and human postural mobility. Delay...

    Provided By Hindawi Publishing

  • White Papers // Sep 2011

    Capacity-Preserved, Energy-Enhanced Hybrid Topology Management Scheme in Wireless Sensor Networks for Hazardous Applications

    A wireless sensor network is composed of large number of sensor nodes and they are densely deployed in the field to monitor the environment, collect the data and route it to a sink. The main constraint is that the nodes in such a network have a battery of limited stored...

    Provided By Hindawi Publishing

  • White Papers // Jul 2010

    Efficient Uplink Modeling for Dynamic System-Level Simulations of Cellular and Mobile Networks

    A novel theoretical framework for uplink simulations is proposed. It allows investigations which have to cover a very long (real-) time and which at the same time require a certain level of accuracy in terms of radio resource management, quality of service, and mobility. This is of particular importance for...

    Provided By Hindawi Publishing

  • White Papers // Jan 2010

    Joint Power Control, Base Station Assignment, and Channel Assignment in Cognitive Femtocell Networks

    Cognitive radio and femtocells are recent technology breakthroughs that aim to achieve throughput improvement by means of spectrum management and interference mitigation, respectively. However, these technologies are limited by the former's susceptibility to interference and the latter's dependence on bandwidth availability. In this paper, the authors overcome these limitations by...

    Provided By Hindawi Publishing

  • White Papers // Mar 2010

    Interference Mitigation Between Ultra-Wideband Sensor Network and Other Legal Systems

    Ultra-WideBand Impulse Radio (UWB-IR) sensor network has intensive military and commercial applications. However, the interference between UWB and other existed networks should be casually investigated. In this paper, the authors consider interference mitigation in UWB sensors in the context of Cognitive Radio (CR). Firstly, the authors suggest a general state...

    Provided By Hindawi Publishing

  • White Papers // Nov 2010

    Space Alignment for Cognitive Transmission in MIMO Uplink Channels

    This paper investigates a new transmission technique for cognitive access in Multiple-Input Multiple-Output (MIMO) uplink channels with Waterfilling Power Allocation- (WPA-) based primary transmission. The proposed technique allows a cognitive node to access the common destination simultaneously with the primary node, without affecting the MIMO primary performance. By using an...

    Provided By Hindawi Publishing

  • White Papers // Jun 2010

    Modelling and Implementation of QoS in Wireless Sensor Networks: A Multiconstrained Traffic Engineering Model

    This paper revisits the problem of Quality of Service (QoS) provisioning to assess the relevance of using multipath routing to improve the reliability and packet delivery in wireless sensor networks while maintaining lower power consumption levels. Building upon a previous benchmark, the authors propose a traffic engineering model that relies...

    Provided By Hindawi Publishing

  • White Papers // Oct 2010

    Wireless Healthcare Monitoring with RFID-Enhanced Video Sensor Networks

    In pervasive healthcare systems, WSNs provide rich contextual information and alerting mechanisms against odd conditions with continuous monitoring. Furthermore, they minimize the need for caregivers and help the chronically ill and elderly to survive an independent life. In this paper, the authors propose an outdoor monitoring environment and evaluate the...

    Provided By Hindawi Publishing

  • White Papers // Dec 2010

    Performance of Some Metaheuristic Algorithms for Multiuser Detection in TTCM-Assisted Rank-Deficient SDMA-OFDM System

    The authors propose two novel and computationally efficient metaheuristic algorithms based on Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO) principles for Multiuser Detection (MUD) in Turbo Trellis Coded modulation- (TTCM-) based Space Division Multiple Access (SDMA) Orthogonal Frequency Division Multiplexing (OFDM) system. Unlike gradient descent methods, both ABC...

    Provided By Hindawi Publishing

  • White Papers // Sep 2010

    Coexistence Mechanism for Colocated HDR/LDR WPANs Air Interfaces

    This paper addresses the issues of interference management among Low Data Rate (LDR) and High Data Rate (HDR) WPAN air interfaces that are located in close-proximity (up to 10 cm) and eventually on the same multimode device. After showing the noticeable performance degradation in terms of Bit Error Rate (BER)...

    Provided By Hindawi Publishing

  • White Papers // Sep 2009

    Range-Based Localization for UWB Sensor Networks in Realistic Environments

    The Non-Line Of Sight (NLOS) problem is the major drawback for accurate localization within Ultra-WideBand (UWB) sensor networks. In this paper, a comprehensive overview of the existing methods for localization in distributed UWB sensor networks under NLOS conditions is given and a new method is proposed. This method handles the...

    Provided By Hindawi Publishing

  • White Papers // Nov 2010

    A Novel Method for Improving Fairness over Multiaccess Channels

    It is known that the Orthogonal Multiple Access (OMA) guarantees for homogeneous networks, where all users have almost the same received power, a higher degree of fairness (in rate) than that provided by Successive Interference Cancellation (SIC). The situation changes in heterogeneous networks, where the received powers are very disparate,...

    Provided By Hindawi Publishing

  • White Papers // Feb 2010

    Time Reversal UWB Communication System: A Novel Modulation Scheme with Experimental Validation

    A new modulation scheme is proposed for a Time Reversal (TR) Ultra Wide-Band (UWB) communication system. The new modulation scheme uses the Binary Pulse Amplitude Modulation (BPAM) and adds a new level of modulation to increase the data rate of a TR UWB communication system. Multiple data bits can be...

    Provided By Hindawi Publishing

  • White Papers // Sep 2010

    Opportunistic Data Collection in Sparse Wireless Sensor Networks

    Opportunistic Wireless Sensor Networks (WSNs) have recently been proposed as solutions for many remote monitoring problems. Many such problems, including environmental monitoring, involve large deployment scenarios with lower-than-average node density, as well as a long time scale and limited budgets. Traditional approaches designed for conventional situations, and thus not optimized...

    Provided By Hindawi Publishing

  • White Papers // Jul 2010

    Datacollection in Event-Driven Wireless Sensor Networks with Mobile Sinks

    The authors present a two-tier distributed hash table-based scheme for data-collection in event-driven wireless sensor networks. The proposed method leverages mobile sinks to significantly extend the lifetime of the sensor network. They propose localized algorithms using a distributed geographic hash-table mechanism that adds load balancing capabilities to the data-collection process....

    Provided By Hindawi Publishing

  • White Papers // Jun 2010

    Superimposed Training-Based Joint CFO and Channel Estimation for CP-OFDM Modulated Two-Way Relay Networks

    Joint Carrier Frequency Offset (CFO) and channel estimation is considered for Two-Way Relay Networks (TWRNs). Existing estimators provide only the convolved channel parameters and the mixed CFO values. In contrast, estimators using a superimposed training strategy are developed for the individual frequency and channel parameters. Depending on the number of...

    Provided By Hindawi Publishing

  • White Papers // Jan 2010

    Implementation and Evaluation of Multichannel Multi-Interface Routing Mechanism with QoS-Consideration for Ad-Hoc Networks

    To accommodate real-time multimedia application while satisfying application-level QoS requirements in a wireless ad-hoc network, the authors need QoS control mechanisms. They proposed a new routing mechanism for a wireless ad-hoc network composed of nodes equipped with multiple network interfaces. By embedding information about channel usage in control messages of...

    Provided By Hindawi Publishing

  • White Papers // Jun 2010

    Impact of Base Station Cooperation on Cell Planning

    Base Station Cooperation (BSC) has been identified as a key radio access technology for next-generation cellular networks such as LTE-Advanced. BSC impacts cell planning, which is the methodical selection of Base Station (BS) sites, and BS equipment configuration for cost-effective cellular networks. In this paper, the impact of BSC on...

    Provided By Hindawi Publishing

  • White Papers // Dec 2009

    Testing Applications in MANET Environments through Emulation

    Mobile Ad Hoc Network solution testing is typically done using simulation. The simulated code is generally a simplified version of the real code, and thus code porting to actual operating systems lacks a strong validation. In this paper, the authors present Castadiva, a test-bed architecture that allows validating software solutions...

    Provided By Hindawi Publishing

  • White Papers // Mar 2011

    A New Design of Access Control in Wireless Sensor Networks

    Nodes in a sensor network may be lost because of power exhaustion or malicious attacks. To extend the span of sensor network, new nodes deployment is necessary. To prevent malicious nodes from joining the sensor networks, access control is a designed requirement for controlling sensor node deployment. Based on Elliptic...

    Provided By Hindawi Publishing

  • White Papers // Nov 2010

    Novel Precoded Relay-Assisted Algorithm for Cellular Systems

    Cooperative schemes are promising solutions for cellular wireless systems to improve system fairness, extend coverage and increase capacity. The use of relays is of significant interest to allow radio access in situations where a direct path is not available or has poor quality. A data pre-coded relay-assisted scheme is proposed...

    Provided By Hindawi Publishing

  • White Papers // Jul 2010

    On the Evaluation of MB-OFDM UWB Interference Effects on a WiMAX Receiver

    The European Commission has recently adopted specific power spectral density masks for Ultra Wide-Band (UWB) devices, with detect and avoid capabilities, for coexistence with licensed standards. Under these regulations, a novel approach for analyzing the UWB interference effects on the WiMAX down-link is provided in this paper by means of...

    Provided By Hindawi Publishing

  • White Papers // Jul 2010

    A Novel Quantize-and-Forward Cooperative System: Channel Estimation and M-PSK Detection Performance

    A method to improve the reliability of data transmission between two terminals without using multiple antennas is cooperative communication, where spatial diversity is introduced by the presence of a relay terminal. The Quantize and Forward (QF) protocol is suitable to implement in resource constraint relays, because of its low complexity....

    Provided By Hindawi Publishing

  • White Papers // Jun 2010

    Enhancing PMIPv6 for Better Handover Performance Among Heterogeneous Wireless Networks in a Micromobility Domain

    This paper analyzes the reduction of handover delay in a network-based localized mobility management framework assisted by IEEE 802.21 MIH services. It compares the Handover signaling Procedures with Host-based localized MIPv6 (HMIPv6), with network-based localized MIPv6 (PMIPv6), and with PMIPv6 assisted by IEEE 802.21 to show how much handover delay...

    Provided By Hindawi Publishing

  • White Papers // Oct 2009

    GRAdient Cost Establishment (GRACE) for an Energy-Aware Routing in Wireless Sensor Networks

    In Wireless Sensor Network (WSN), the nodes have limitations in terms of energy-constraint, unreliable links, and frequent topology change. In this paper, the authors propose an energy-aware routing protocol that outperforms the existing ones with an enhanced network lifetime and more reliable data delivery. Major issues in the design of...

    Provided By Hindawi Publishing

  • White Papers // Nov 2009

    Physical Layer Security Game: Interaction between Source

    Physical layer security is an emerging security area that achieves perfect secrecy data transmission between intended network nodes, while malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. The authors investigate the interaction...

    Provided By Hindawi Publishing

  • White Papers // Nov 2010

    MAC Layer Jamming Mitigation Using a Game Augmented by Intervention

    MAC layer jamming is a common attack on wireless networks, which is easy to launch by the attacker and which is very effective in disrupting the service provided by the network. Most of the current MAC protocols for wireless networks, for example, IEEE 802.11, do not provide sufficient protection against...

    Provided By Hindawi Publishing

  • White Papers // Oct 2009

    Achievable Rates and Resource Allocation Strategies for Imperfectly Known Fading Relay Channels

    Achievable rates and resource allocation strategies for imperfectly known fading relay channels are studied. It is assumed that communication starts with the network training phase in which the receivers estimate the fading coefficients. Achievable rate expressions for amplify-and-forward and decode-and-forward relaying schemes with different degrees of cooperation are obtained. The...

    Provided By Hindawi Publishing

  • White Papers // Jun 2010

    MIMO Network Coding-Based PHY/MAC Protocol for Replacement of CSMA/CA in Efficient Two-Way Multihop Relay Networks

    Backbone wireless mesh networks have attracted much of attention due to their wide-range applications. The use of CSMA/CA based MAC protocols in mesh networks, however, leads to an inefficient resource utilization, and to high latency. Several alternative protocols including directional MAC, multichannel MAC only provide marginal improvement. Recently, a cross-layer...

    Provided By Hindawi Publishing

  • White Papers // Sep 2009

    QoS Differentiated and Fair Packet Scheduling in Broadband Wireless Access Networks

    This paper studies the packet scheduling problem in Broadband Wireless Access (BWA) networks. The key difficulties of the BWA scheduling problem lie in the high variability of wireless channel capacity and the unknown model of packet arrival process. It is difficult for traditional heuristic scheduling algorithms to handle the situation...

    Provided By Hindawi Publishing

  • White Papers // Mar 2010

    Group-Orthogonal Code-Division Multiplex: A Physical-Layer Enhancement for IEEE 802.11n Networks

    The new standard for Wireless Local Area Networks (WLANs), named IEEE 802.11n, has been recently released. This new norm builds upon and remains compatible with the previous WLANs standards IEEE 802.11a/g while it is able to achieve transmission rates of up to 600 Mbps. These increased data rates are mainly...

    Provided By Hindawi Publishing

  • White Papers // Sep 2011

    A Probability Collectives Approach With a Feasibility-Based Rule for Constrained Optimization

    This paper demonstrates an attempt to incorporate a simple and generic constraint handling technique to the Probability Collectives (PC) approach for solving constrained optimization problems. The approach of PC optimizes any complex system by decomposing it into smaller subsystems and further treats them in a distributed and decentralized way. These...

    Provided By Hindawi Publishing

  • White Papers // Aug 2011

    pSum-SaDE: A Modified p-Median Problem and Self-Adaptive Differential Evolution Algorithm for Text Summarization

    Extractive multidocument summarization is modeled as a modified p-median problem. The problem is formulated with taking into account four basic requirements, namely, relevance, information coverage, diversity, and length limit that should satisfy summaries. To solve the optimization problem a self-adaptive differential evolution algorithm is created. Differential evolution has been proven...

    Provided By Hindawi Publishing

  • White Papers // Sep 2011

    Classification of Textual E-Mail Spam Using Data Mining Techniques

    A new method for clustering of spam messages collected in bases of anti-spam system is offered. The genetic algorithm is developed for solving clustering problems. The objective function is a maximization of similarity between messages in clusters, which is defined by k-nearest neighbor algorithm. Application of genetic algorithm for solving...

    Provided By Hindawi Publishing

  • White Papers // Aug 2011

    Prediction of Surface Roughness in End Milling Process Using Intelligent Systems: A Comparative Study

    A study is presented to model surface roughness in end milling process. Three types of intelligent networks have been considered. They are Radial Basis Function Neural networks (RBFNs), Adaptive NeuroFuzzy Inference Systems (ANFISs), and Genetically evolved Fuzzy Inference Systems (G-FISs). The machining parameters, namely, the spindle speed, feed rate, and...

    Provided By Hindawi Publishing

  • White Papers // Aug 2011

    Evolutionary Computation and Its Applications in Neural and Fuzzy Systems

    Neural networks and fuzzy systems are two soft-computing paradigms for system modelling. Adapting a neural or fuzzy system requires to solve two optimization problems: structural optimization and parametric optimization. Structural optimization is a discrete optimization problem which is very hard to solve using conventional optimization techniques. Parametric optimization can be...

    Provided By Hindawi Publishing

  • White Papers // Jul 2011

    Design of Fixed and Ladder Mutation Factor-Based Clonal Selection Algorithm for Solving Unimodal and Multimodal Functions

    Clonal Selection Algorithms (CSAs) is a special class of Immune Algorithms (IA), inspired by the clonal selection principle of the human immune system. To improve the algorithm's ability to perform better, this CSA has been modified by implementing two new concepts called fixed mutation factor and ladder mutation factor. Fixed...

    Provided By Hindawi Publishing

  • White Papers // Apr 2011

    Contingency-Constrained Optimal Power Flow Using Simplex-Based Chaotic-PSO Algorithm

    This paper proposes solving Contingency-Constrained Optimal Power Flow (CC-OPF) by a Simplex-based Chaotic Particle Swarm Optimization (SCPSO). The associated objective of CC-OPF with the considered valve-point loading effects of generators is to minimize the total generation cost, to reduce transmission loss, and to improve the bus-voltage profile under normal or...

    Provided By Hindawi Publishing

  • White Papers // May 2011

    Null Steering in Failed Antenna Arrays

    Antenna array pattern nulling is desirable in order to suppress the interfering signals. But in large antenna arrays, there is always a possibility of failure of some elements, which may degrade the radiation pattern with an increase in Side Lobe Level (SLL) and removal of the nulls from desired position....

    Provided By Hindawi Publishing