Institute of Electrical and Electronics Engineers

Displaying 1-40 of 8831 results

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2013

    Constrained Pricing for Cloud Resource Allocation

    Constrained pricing in a cloud computing environment is addressed using game theory. The objective of the model and the game is to enable cloud providers to maximize their revenue while satisfying users by maximizing their utilities. The user's net utility is modeled as a function of resource demand with a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Advancements in Cloud Computing for Logistics

    The emergence of new cloud computing services is steadily increasing. More and more companies realize the benefits and opportunities of using IT-resources with unlimited scalability and on-demand services at pay per use conditions over the Internet, as opposed to \"Classical\" on-premise installation and operation. A recent survey of webhosting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    IT Security Threats in Cloud Computing Sourcing Model

    New information technologies have been developing now-a-days at an amazing speed, affecting the functioning of organizations significantly. Due to the development of new technologies, especially mobile ones, borders in the functioning of modern organizations diminish and models of running business change. Almost all organizations are involved in some way in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Hardware Security Strategies Exploiting Nanoelectronic Circuits

    Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are Physical Unclonable Functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    The Security Onion Cloud Client: Network Security Monitoring for the Cloud

    With \"Cloud\" servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don't have the ability to tap the network traffic flowing to and from the servers - To solve this problem,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    On the Quality of Service of Cloud Gaming Systems

    Cloud gaming, i.e., real-time game playing via thin clients, relieves users from being forced to upgrade their computers and resolve the incompatibility issues between games and computers. As a result, cloud gaming is generating a great deal of interests among entrepreneurs, venture capitalists, general public's, and researchers. However, given the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Design and Implementation of Digital Signatures

    Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks

    A Wireless Sensor Network (WSN) commonly requires lower level security for public information gathering, whilst a Body Sensor Network (BSN) must be secured with strong authenticity to protect personal health information. In this paper, some practical problems with the Message Authentication Codes (MACs), which were proposed in the popular security...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    On Service Migration in the Cloud to Facilitate Mobile Accesses

    Using service migration in clouds to satisfy a sequence of mobile batch-request demands is a popular solution to enhanced QoS and cost effectiveness. As the origins of the mobile accesses are frequently changed over time, moving services closer to client locations not only reduces the service access latency but also...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach

    In this paper, the authors propose a service-aware approach to enhance survivability in virtualized data centers. The idea is to create and maintain a Survivable Virtual Infrastructure (SVI) for each service or tenant, which includes Virtual Machines (VMs) hosting the corresponding application and their backup VMs. A fundamental problem is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Near Field Authentication for Smart Devices

    Near Field Communication (NFC) systems provide a good location-limited channel so that many security systems can use it to force the participants to stay close to each other. Unfortunately, only a small number of smart devices in the market are equipped with NFC chips that are essential for NFC systems....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Data On-Boarding in Federated Storage Clouds

    One of the main obstacles hindering wider adoption of storage cloud services is vendor lock-in, a situation in which large amounts of data that are placed in one storage system cannot be migrated to another vendor, e.g., due to time and cost considerations. In this paper, the authors present an...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Cloud Computing : The Dark side

    The Rapid growth of data has turned out to be a very unstable for the cloud vendors. Such bulky data is very difficult to handle and protect from malicious hackers. Lack of security is the major problem to overcome in wide adoption of cloud computing and networking. The amount of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Review of Agent Oriented Technology in Cloud Node Application

    Cloud computing provides virtualized resources and scalable infrastructure in the form of services over the Internet. It is a model for enabling demand network access to a shared pool of computing resources. Cloud infrastructure is implemented on virtual machines which are remotely located. Any user who wants to access his...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Synchronous Physical-Layer Network Coding: A Feasibility Study

    Recently, Physical-layer Network Coding (PNC) attracts much attention due to its ability to improve throughput in relay-aided communications. However, the implementation of PNC is still a work in progress, and synchronization is a significant and difficult issue. This paper investigates the feasibility of synchronous PNC with M-ary Quadrature Amplitude Modulation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Enabling DUI Systems in Handheld Devices Using Cloud

    Application distribution among Mobile devices through cloud. Cloud computing support for energy saving, privacy, security, data protection, and fast exchange of data over the internet currently, application can't scale over multiple Cloud Computing Service Providers. Since there is no interoperability between Cloud Computing Service Providers due to device interoperability it's...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    The Second-Order Coding Rate of the MIMO Rayleigh Block-Fading Channel

    The authors study the second-order coding rate of the Multiple-Input Multiple-Output (MIMO) Rayleigh block-fading channel via statistical bounds from information spectrum methods and Gaussian tools from random matrix theory. A Gaussian approximation is then used to establish an upper bound on the error probability for arbitrary code rates which is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Business and IT Alignment with SEAM for Enterprise Architecture

    To align an IT system with an organization's needs, it is necessary to understand the organization's position within its environment as well as its internal configuration. In SEAM for Enterprise Architecture the organization is considered as a hierarchy of systems that span from business down to IT. The alignment process...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Auditing for Distributed Storage Systems

    In this paper, the authors bridge the gap between these two currently disconnected bodies of work. They propose NC-Audit, a novel remote data integrity checking scheme, designed specifically for network coding-based distributed storage systems. NC-Audit combines, for the first time, the following desired properties: efficient checking of data integrity, efficient...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS

    Distributed control algorithms (e.g., consensus algorithms) are vulnerable to the misbehaving agent compromised by cyber attacks in the Distributed Networked Control Systems (DNCS). In this paper, the authors continue their work on a proposed secure distributed control methodology that is capable of performing a secure consensus computation in D-NCS in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    TCP and Network Coding Equilibrium and Dynamic Properties

    In this paper, the authors analyze the impact on the TCP-Reno congestion control mechanism of a Network Coding (NC) layer inserted in the TCP/IP stack. A multi-source multi-link model is considered to study the equilibrium and dynamic properties of the TCP-NC protocol with RED as active queue management mechanism. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Achieving Maximum Energy-Efficiency in Multi-Relay OFDMA Cellular Networks: A Fractional Programming Approach

    In this paper, the joint power and subcarrier allocation problem is solved in the context of maximizing the Energy-Efficiency (EE) of a multi-user, multi-relay Orthogonal Frequency Division Multiple Access (OFDMA) cellular network, where the objective function is formulated as the ratio of the Spectral-Efficiency (SE) over the total power dissipation....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Guest Editors' Introduction: Special Issue on Cloud Computing

    Cloud is a novel computing paradigm that builds on the foundations of distributed computing, grid computing, networking, virtualization, service orientation, and marketoriented computing. Cloud provides flexible resource allocation on demand with the promise of realizing elastic, Internet-accessible computing on a pay-as-you-go basis. Cloud services include infrastructure such as computing and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Communication over Finite-Chain-Ring Matrix Channels

    Though network coding is traditionally performed over finite fields, recent work on nested-lattice-based network coding suggests that, by allowing network coding over finite chain rings, more efficient physical-layer network coding schemes can be constructed. This paper considers the problem of communication over the finite-chain-ring matrix channel Y = AX +...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Denial Attacks in Cloud Computing

    Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end-recipients. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagram. The authors are aimed at implement the denial...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    A Novel Approach for Preventing Hackers in Data Communication

    In the electronic communication system the user authentication is an important issue to be considered for the information security. The concept of username with password is an efficient method of maintaining shared secret information between a user and a remote system. Any communication through the internet passes across an unsecured...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    The Role of Cloud Computing in Mobile

    The mobile cloud computing approach has emerged as a promising way to address the new challenges in the application development and implementation of resources sharing or distributed computing. The capabilities of mobile devices have been improving quickly than computers. Many researchers focus on the area of mobile computing and cloud...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel Underlay TV Spectrum Sharing Scheme Based On Polarization Adaption for TD-LTE System

    Spectrum opportunities in time, space and power domain are exploited by secondary users in traditional Cognitive Radio studies. While spectrum opportunities in polarization domain, namely simultaneous utilization of spectrum between primary and secondary system with polarization signal characteristics, is exploited inadequately. With the merits of polarization mismatch, primary system lies...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Opportunistic and Efficient Resource Block Allocation Algorithms for LTE Uplink Networks

    In this paper, the authors propose two new Resource Block (RB) allocation algorithms for the LTE uplink. They take into account the RB adjacency constraint and update the allocation metric. Two different heuristics are proposed: an Opportunistic and Efficient RB allocation Algorithm (OEA) and a Quality of Service based Opportunistic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel UHF RFID Dual-Band Tag Antenna with Inductively Coupled Feed Structure

    A dual-band tag antenna for UHF RFID systems is proposed. The tag antenna is composed of a zigzag main body and a zigzag loop, which is an inductively coupled feed structure antenna. The proposed structure is simple, which is not only easy to adjust the matching impedance but also to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Dynamic Resource Allocation for Machine-Type Communications in LTE/LTE-A with Contention-Based Access

    In this paper, the authors propose a dynamic resource allocation method to enable efficient and low-latency Machine Type Communications (MTC) in LTE/LTE-A with the Contention Based random Access (CBA) scheme. In the proposed method, they firstly estimate the probabilities of events caused by a CBA transmission and then calculate the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Reliable Throughput for Two-way Relay Systems by Network Coding

    The throughput of wireless network can be improved by wireless network coding, without adding additional resources. However, most of the previous work focuses on the AWGN channel. In fact, the signal is subject to severe fading over wireless channel. The network coding reliable throughput of two-way system under Rayleigh fading...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding Based Reliable Broadcast Protocol in Multi-Channel Multi-Radio Wireless Mesh Networks

    Multi-Channel Multi-Radio (MCMR) Wireless Mesh Networks (WMNs) have emerged as a new paradigm in multi-hop wireless networks. In a typical MCMR WMNs, each node has multiple radios with multiple available channels on each radio, which allows nodes to have simultaneous transmissions and receptions. Therefore, network performance is improved. As a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Group-Wise Channel Sensing and Resource Pre-Allocation for LTE D2D on ISM Band

    Device-To-Device communication has been regarded as a promising technology to improve the cellular system efficiency, which allows mobile devices communicate directly with each other on the licensed frequency resources under the control of a base station (or eNB). However, the benefits of D2D using license exempt bands, such as ISM...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Contention-Vector Based Hybrid Scheduling Algorithm for Wireless Networks

    A good scheduling algorithm in wireless networks is the key for the efficient use of wireless medium. This paper presents a hybrid scheduling algorithm, called Contention-Vector based Hybrid Scheduling (CVHS) algorithm, for wireless networks wherein stations can sense each other. Examples of such wireless networks include Wireless LANs and small...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding with Remix Qualification for Multicasting in Delay-Tolerant Networks

    In delay-tolerant networks where connectivity between nodes is intermittent, replication-based delivery mechanisms are often employed to deliver messages in a store-carry-forward manner instead of end-to-end delivery techniques that are mainly used in traditional computer networks and Mobile Ad-hoc NETworks. However, multicasting with replication-based methodologies can induce considerable message traffic and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Wideband MIMO Channel Capacity Analysis Based on Indoor Channel Measurement

    Based on the channel measurement in a typical indoor environment, wideband Multi-Input Multi-Output (MIMO) channel capacity analysis result is reported in this paper. A series of Non Line-Of-Sight (NLOS) and LOS measurement positions are planned for capacity comparison in different propagation conditions. For fixed received Signal-to-Noise Ratio (SNR), slight average...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Interference-Aware Graph Based Resource Sharing for Device-to-Device Communications Underlaying Cellular Networks

    Device-To-Device (D2D) communications underlaying cellular networks have recently been considered as a promising means to improve the resource utilization of the cellular network and the user throughput between devices in proximity to each other. In this paper, the authors investigate the resource sharing problem to optimize the system performance in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    A Multiple Home Agent Deployment Scheme to Enhance Service Availability for MIPv6

    In MIPv6, the Home Agent (HA) is the key entity to ensure a Mobile Node's (MN) reachability. A single HA on the home link will become a performance bottleneck and single point of failure. This paper proposes a Multiple HA Deployment Scheme (MHADS) comprising a dynamic load balancing mechanism based...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Analysis of Web Response Time in Asymmetrical Wireless Network

    In this paper, the authors show how the asymmetry characteristics of wireless network strongly affects the web response time of user. It is found that uplink delay degrades web performance because additional bytes overhead and time overhead are introduced. On the other hand, the study also shows that reduction of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Advanced LT Codes in Satellite Data Broadcasting System

    The optimal degree distribution algorithm of LT codes of digital fountain was proposed, and its drawbacks in realization were mentioned. On the basis of optimal degree distribution, a practical suboptimal degree distribution algorithm was put forward. Through simulation, with respect to the channel efficiency in satellite data broadcasting system, advanced...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Automated Negotiation for Web Services

    Negotiation is a crucial stage of Web Services interaction lifecycle, aiming at establishing a formal contract between a service provider and a consumer, to specify agreed terms on the service, particularly terms on non-functional aspects. This paper introduces a formal negotiation model for Web Services. The model employs fuzzy truth...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Robotic Router Formation - A Bit Error Rate Approach

    In this paper, the authors consider the problem of robotic router formation, where a node needs to maintain its connectivity to a fixed station by using a number of mobile routers. While most literature on this topic optimizes the formation of the routers by maximizing the Fiedler eigen-value of the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Multi-Target Tracking in Distributed Active Sensor Networks

    In this paper, the authors consider the problem of tracking multiple targets using Distributed Active Sensing Networks (DASNs). The particle filter technique is adopted to estimate the trajectories of targets moving in the DASNs. They propose a novel joint measurement method, which allows the estimation of the states of targets...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Extremum Tracking in Sensor Fields With Spatio-Temporal Correlation

    Physical phenomena such as temperature, humidity, and wind velocity often exhibit both spatial and temporal correlation. The authors consider the problem of tracking the extremum value of a spatio-temporally correlated field using a wireless sensor network. Determining the extremum at the fusion center after making all sensor nodes transmitting their...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Multiple Visual-Targets Tracking in Decentralized Wireless Camera Sensor Networks

    To track 3-dimensional multiple visual-targets states, the authors develop the decentralized Wireless Camera Sensor Network (WCSN) and the corresponding data fusion scheme. In their proposed scheme, each activated camera sensor-node obtains the local encoded 2-dimensional observation of the visual-targets' states and sends it to the global fusion center. This global...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Localization in Wireless Sensor Networks Based on Ad Hoc Routing and Evolutionary Computation

    The authors propose evolutionary computation to estimate positions of nodes within a sensor network. The approach uses signal strength measurements between nodes and given positions for a subset of these nodes (anchor nodes). The signal strength measurements and routing requests take place simultaneously. A data collecting unit (sink node) receives...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Ferromagnetic Target Detection and Localization With a Wireless Sensor Network

    This paper attempts to address challenges of using magnetic sensors for target detection, localization and tracking with a Wireless Sensor Network (WSN). A WSN comprised of magnetic sensors was constructed to investigate the modeling, detection, and localization of ferrous targets. The system was established as a centralized tree-based wireless network...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Trust Establishment in Cooperative Wireless Networks

    In cooperative wireless networks, relay nodes are used to improve the channel capacity of the system. However, the presence of malicious relays in the network may severely degrade the performance of the system. More specifically, there exists a possibility that a node refuses to cooperate when it is selected for...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Distributed Combined Authentication and Intrusion Detection With Data Fusion in High Security Mobile Ad-Hoc Networks

    This paper studies distributed, combined authentication and intrusion detection with data fusion in Mobile Ad-hoc NETworks (MANETs). Multimodal biometrics are deployed to work with Intrusion Detection Systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each device in the network has measurement and estimation errors, more than one...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Effect of On/Off Misbehavior on Overhearing Based Cooperation Scheme for MANET

    Misbehaving nodes, including malicious and selfish ones, will disturb the cooperation among all wireless nodes in a Mobile Ad hoc NETwork (MANET). Overhearing and reputation based cooperation schemes have been used to detect and isolate the misbehaving nodes as well as to force them to cooperate. These schemes worked well...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Anonymity Under Flow Insertion: A Game Theoretic Approach

    The problem of anonymous wireless networking is considered when an adversary is capable of controlling a subset of routes in the network. For a desired Quality-of-Service (QoS), as measured by network throughput, the problem of maximizing anonymity is studied from a game-theoretic perspective. Anonymity is quantified using conditional entropy of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    GDS-B: A Protocol to Support HAIPE Peer Discovery Server Communication

    HAIPE devices provide encrypted tunneling and transporting services for Internet Protocol (IP) datagrams through an unsecured network on behalf of secure Plain Text (PT) enclaves. Traditionally, secure tunnels were established by manually configuring the local HAIPE with information for peer enclaves. When a large number of enclaves are involved, automation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    XO: XMPP Overlay Service for Distributed Chat

    This paper discusses the adaptation of group-oriented messaging and chat technology for operation in serverless, multicast-capable mobile wireless architectures. The main goals are to allow group messaging and chat sessions to fragment/coalesce, operate through disrupted TCP conditions, and improve bandwidth utilization when multicast is available. In addition, the solution demonstrates...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Distributed Geolocation Mapping in a Mobile Tactical Environment Using Service Overlay Over MANET

    This paper evaluates the efficacy of a distributed location mapping application running over a Service Overlay Network (SON) in a MANET wireless environment. In the application, an application-layer routing protocol facilitates data forwarding from mobile nodes to a Command Centre. The performance of the location mapping application is evaluated by...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Digital IF for MILSATCOM Terminals

    A compelling case has been made for transitioning MILitary SATellite COMmunications (MILSATCOM) terminal architectures from conventional analog IF (Intermediate Frequency) formats to newer more capable digital IF (Intermediate Format) systems. Digital IF has been shown to offer clear and substantial advantages in all aspects of MILSATCOM terminal activity and operations,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    SDRPHY - XML Description for SDR Physical Layer

    Software defined radio hardware has matured to a point where wide deployment is called for. Unfortunately, the standardization efforts have not yet achieved maturity. Military users are not reaping the benefits of SDR due to excessively complex software development and tight coupling between hardware and software. This paper proposes a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Advanced Model-Based Software Engineering Technologies for Software Defined Radio Configuration

    Model based technologies can be used to reduce the cost of development and maintenance software intensive systems and to enable additional capabilities such as load time configuration and run time adaptation. Such systems include complex communications systems based on software defined radios that have adaptive or cognitive capabilities. Advanced methodologies...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    The Enhanced Bandwidth Reservation Algorithm for Distributed UWB Networks

    This paper describes an Enhanced Bandwidth Reservation Algorithm (EBRA) which introduces a new metric of Allocated Counter (AC) for considering multiple reservations in the same Media Access Slot (MAS) for distributed UWB (Ultra Wide-Band) network. By considering bother call success rate and QoS (Quality-of-Service) constrain of establishing route, EBRA allows...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Service Interval Based Channel Time Allocation in Wireless UWB Networks

    WiMedia Ultra Wide-Band (UWB) MAC consists of Distributed Reservation Protocol (DRP) and Prioritized Contention Access (PCA), where DRP is used to reserve the medium for time division multiple access for isochronous and other traffic. This paper proposes an Improved Service Interval-based Medium Access Slot (MAS) Allocation (ISIMA) algorithm for MAS...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    A Novel M-Sequence Coded Transmit-Reference System for UWB Communications

    A novel Transmit-Reference (TR) signaling scheme for UWB systems is proposed in this paper, where by invoking m-sequence codes the reference and data pulses are transmitted side by side to increase the data rate. This structure enables demodulation with a conventional correlation receiver despite existing server Inter-Pulse Interference (IPI). For...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    A Group Based MAC Protocol for QoS Provisioning in Cognitive Radio Networks

    With the deployment of more wireless applications, spectrum scarcity becomes an issue in many countries. Recent reports show that the reason for this spectrum shortage is the underutilization of some spectrum resources. Fortunately, the emergence of open spectrum and dynamic spectrum assess technology in cognitive radio networks relieves this problem....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Throughput and Delay of Slotted-ALOHA Based Cognitive Packet Radio Network

    In this paper, the authors present a slotted ALOHA based multi-channel cognitive radio network opportunistically using the unused spectrum of incumbent devices and analyze its throughput and delay. Furthermore, they analyze packet capture effects of the proposed system model over Rayleigh fading. Cognitive Radios (CR; also often called spectrum agile...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Cognitive Cooperative Relaying

    In this paper, the authors propose a promising spectrum sharing scheme for the coexistent wireless systems, called cognitive cooperative relaying, which enables the secondary user to access the licensed spectrum without cognitive capability, by assistance of the cognitive relay. Three transmission strategies adopted by the cognitive relay are introduced, and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Random Periodic Spectrum Sensing With Sensing Period Optimization for Cognitive Radio Networks

    A random periodic spectrum sensing scheme is proposed for cognitive radio networks. The sensing period is extended to a general form as a random variable. A generalized Markov analytical model for sensing period optimization is presented, and the optimal sensing period to maximum rewards generated by the channel is derived....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Asymptotic Performance of Uplink Resource Allocation for OFDMA-Based Cognitive Radio Networks

    Cognitive radio and OFDMA attracts a lot of attentions in academic and industry fields. In this paper, the asymptotic performance of an uplink radio resource allocation scheme is investigated for OFDMA-based cognitive radio networks. Considering the characteristics of cognitive radio and OFDMA, in the uplink subcarrier allocation algorithm, the subcarriers...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Optimizing the Second-Price Auction Algorithm in a Dynamic Cognitive Radio Network

    The authors adopt the second-price auction mechanisms to solve the channel allocation as well as the out-band sensing assignment problems in cognitive radio. They introduce a cheating-proof operating method by realizing the pricing scheme in a real time format. To adapt to the dynamic environment, they also study the optimization...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Joint Admission and Power Control for Cognitive Radio Cellular Networks

    In Cognitive radio Cellular networks (CogCell), the Secondary Users (SUs) can be admitted to the Base Station (BS) provided that the interferences to the Primary Users (PUs) are no higher than the pre-defined thresholds. In addition, different SUs may make different payments and require different Quality of Service (QoS). In...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    A Complex BPF With on Chip Auto-Tuning Architecture for Wireless Receivers

    In low Intermediate Frequency (IF) wireless receivers, such as GPS and Bluetooth systems, complex filters are often required to reject image signal and adjacent interferers. Although the passive complex filter can also reject the image signal, the active complex filter is preferred. The passive one cannot attenuate the adjacent interferers...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Ka Band Spatial Power-Combining Amplifier Structures

    Power-combining technique is one of the most important ways to realize solid-state sources and amplifiers at millimeter-wave frequencies. RF power levels that currently cannot be achieved by a single MMIC device. In order to achieve enough output power level, high-efficiency power combiners with broad bandwidth and good thermal property are...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Design of an Overmoded MW-Class Terahertz Backward Wave Oscillator

    Results of the theoretical and numerical simulation studies of a mega watt, large diameter terahertz backward wave oscillator are presented in this paper. The device consists of a large cross-section (overmoded), Slow Wave Structure (SWS) with a unique profile of wall radius specifically designed to support surface wave and to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    A Low Power Baseband Chain for CMMB Application

    This paper presents experimental results of an analog baseband circuit for China Multimedia Mobile Broadcasting (CMMB) direct conversion receiver in 0.35um SiGe BiCMOS process. It is the first baseband of CMMB RFIC reported so far. A 8th-order chebyshev Low Pass Filter (LPF) with calibration system is used in the analog...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    A Low Spurious and Small Step Frequency Synthesizer Based on PLL-DDS-PLL Architecture

    Nowadays, frequency synthesizers are widely used in modern communication systems. There are many frequency synthesis technologies, such as Direct analogy Synthesis (DS), the DDS, the PLL and the mixture of the former technologies, etc. The DS has advantages of fast hopping time and high output frequency but it also has...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    A 2.469-2.69GHz AlGaN/GaN HEMT Power Amplifier for IEEE 802.16e WiMAX Applications

    WiMAX, with the whole name Worldwide Interoperability of Microwave Access, is a new broadband wireless access technique which is based on IEEE 802.16 standard. The basic object of WiMAX is that, under the environment of Metropolitan Area Network it makes the wireless devices from different manufacturers connect together. The standards...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Design and Analysis of a Highly Integrated CMOS Power Amplifier for RFID Reader

    In order to implement a fully-integrated on-chip CMOS Power Amplifier (PA) for RFID reader, inductors are implemented by bonding wires in the output stage of PA. Comparing with the on-chip inductors in CMOS process, the merit of the bondwire inductor is its high quality factor, leading a higher output power...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Design Consideration of an Multimode, Powercontrollable Transmitter for UHF Mobile RFID Reader

    Aiming at the expansive application of RFID technology, design considerations are expatiated to a highly-integrated, multimode, power-controllable transmitter in mobile UHF RFID reader with CMOS process. The transmitter consists of digital section, a baseband circuit, an up-conversion mixer and a gain-variable power amplifier. Multiple data modes can be generated. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Hybrid Performance Enhance Proxy Method to Improving TCP Performance in MMR

    Relay technology can improve the coverage and capacity of wireless system, but it causes long transmission delay and network congestion. In addition, the movement of MS or RS, and radio resource contention can result in wireless path broken or connection broken. Traditional TCP can not differentiate the packet loss reasons...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Fairness-Optimal Initial Shaping Rate for HSDPA Transport Network Congestion Control

    In the HSDPA (High-Speed Downlink Packet Access) Iub Transport Network (TN) which connects the Radio Network Controller with base stations (Node Bs), congestion control is needed. Because of the TN's often narrow resources, fairness of resource sharing is an important issue. Basic Additive Increase Multiplicative Decrease (AIMD) congestion control guarantees...

    Provided By Institute of Electrical and Electronics Engineers