Institute of Electrical and Electronics Engineers

Displaying 1-40 of 9808 results

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2013

    Constrained Pricing for Cloud Resource Allocation

    Constrained pricing in a cloud computing environment is addressed using game theory. The objective of the model and the game is to enable cloud providers to maximize their revenue while satisfying users by maximizing their utilities. The user's net utility is modeled as a function of resource demand with a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Advancements in Cloud Computing for Logistics

    The emergence of new cloud computing services is steadily increasing. More and more companies realize the benefits and opportunities of using IT-resources with unlimited scalability and on-demand services at pay per use conditions over the Internet, as opposed to \"Classical\" on-premise installation and operation. A recent survey of webhosting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    IT Security Threats in Cloud Computing Sourcing Model

    New information technologies have been developing now-a-days at an amazing speed, affecting the functioning of organizations significantly. Due to the development of new technologies, especially mobile ones, borders in the functioning of modern organizations diminish and models of running business change. Almost all organizations are involved in some way in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Hardware Security Strategies Exploiting Nanoelectronic Circuits

    Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are Physical Unclonable Functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    The Security Onion Cloud Client: Network Security Monitoring for the Cloud

    With \"Cloud\" servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don't have the ability to tap the network traffic flowing to and from the servers - To solve this problem,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    On the Quality of Service of Cloud Gaming Systems

    Cloud gaming, i.e., real-time game playing via thin clients, relieves users from being forced to upgrade their computers and resolve the incompatibility issues between games and computers. As a result, cloud gaming is generating a great deal of interests among entrepreneurs, venture capitalists, general public's, and researchers. However, given the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Design and Implementation of Digital Signatures

    Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks

    A Wireless Sensor Network (WSN) commonly requires lower level security for public information gathering, whilst a Body Sensor Network (BSN) must be secured with strong authenticity to protect personal health information. In this paper, some practical problems with the Message Authentication Codes (MACs), which were proposed in the popular security...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    On Service Migration in the Cloud to Facilitate Mobile Accesses

    Using service migration in clouds to satisfy a sequence of mobile batch-request demands is a popular solution to enhanced QoS and cost effectiveness. As the origins of the mobile accesses are frequently changed over time, moving services closer to client locations not only reduces the service access latency but also...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach

    In this paper, the authors propose a service-aware approach to enhance survivability in virtualized data centers. The idea is to create and maintain a Survivable Virtual Infrastructure (SVI) for each service or tenant, which includes Virtual Machines (VMs) hosting the corresponding application and their backup VMs. A fundamental problem is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Near Field Authentication for Smart Devices

    Near Field Communication (NFC) systems provide a good location-limited channel so that many security systems can use it to force the participants to stay close to each other. Unfortunately, only a small number of smart devices in the market are equipped with NFC chips that are essential for NFC systems....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Data On-Boarding in Federated Storage Clouds

    One of the main obstacles hindering wider adoption of storage cloud services is vendor lock-in, a situation in which large amounts of data that are placed in one storage system cannot be migrated to another vendor, e.g., due to time and cost considerations. In this paper, the authors present an...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Cloud Computing : The Dark side

    The Rapid growth of data has turned out to be a very unstable for the cloud vendors. Such bulky data is very difficult to handle and protect from malicious hackers. Lack of security is the major problem to overcome in wide adoption of cloud computing and networking. The amount of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Review of Agent Oriented Technology in Cloud Node Application

    Cloud computing provides virtualized resources and scalable infrastructure in the form of services over the Internet. It is a model for enabling demand network access to a shared pool of computing resources. Cloud infrastructure is implemented on virtual machines which are remotely located. Any user who wants to access his...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Synchronous Physical-Layer Network Coding: A Feasibility Study

    Recently, Physical-layer Network Coding (PNC) attracts much attention due to its ability to improve throughput in relay-aided communications. However, the implementation of PNC is still a work in progress, and synchronization is a significant and difficult issue. This paper investigates the feasibility of synchronous PNC with M-ary Quadrature Amplitude Modulation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Enabling DUI Systems in Handheld Devices Using Cloud

    Application distribution among Mobile devices through cloud. Cloud computing support for energy saving, privacy, security, data protection, and fast exchange of data over the internet currently, application can't scale over multiple Cloud Computing Service Providers. Since there is no interoperability between Cloud Computing Service Providers due to device interoperability it's...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Business and IT Alignment with SEAM for Enterprise Architecture

    To align an IT system with an organization's needs, it is necessary to understand the organization's position within its environment as well as its internal configuration. In SEAM for Enterprise Architecture the organization is considered as a hierarchy of systems that span from business down to IT. The alignment process...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    The Second-Order Coding Rate of the MIMO Rayleigh Block-Fading Channel

    The authors study the second-order coding rate of the Multiple-Input Multiple-Output (MIMO) Rayleigh block-fading channel via statistical bounds from information spectrum methods and Gaussian tools from random matrix theory. A Gaussian approximation is then used to establish an upper bound on the error probability for arbitrary code rates which is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Auditing for Distributed Storage Systems

    In this paper, the authors bridge the gap between these two currently disconnected bodies of work. They propose NC-Audit, a novel remote data integrity checking scheme, designed specifically for network coding-based distributed storage systems. NC-Audit combines, for the first time, the following desired properties: efficient checking of data integrity, efficient...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS

    Distributed control algorithms (e.g., consensus algorithms) are vulnerable to the misbehaving agent compromised by cyber attacks in the Distributed Networked Control Systems (DNCS). In this paper, the authors continue their work on a proposed secure distributed control methodology that is capable of performing a secure consensus computation in D-NCS in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    TCP and Network Coding Equilibrium and Dynamic Properties

    In this paper, the authors analyze the impact on the TCP-Reno congestion control mechanism of a Network Coding (NC) layer inserted in the TCP/IP stack. A multi-source multi-link model is considered to study the equilibrium and dynamic properties of the TCP-NC protocol with RED as active queue management mechanism. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Achieving Maximum Energy-Efficiency in Multi-Relay OFDMA Cellular Networks: A Fractional Programming Approach

    In this paper, the joint power and subcarrier allocation problem is solved in the context of maximizing the Energy-Efficiency (EE) of a multi-user, multi-relay Orthogonal Frequency Division Multiple Access (OFDMA) cellular network, where the objective function is formulated as the ratio of the Spectral-Efficiency (SE) over the total power dissipation....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Guest Editors' Introduction: Special Issue on Cloud Computing

    Cloud is a novel computing paradigm that builds on the foundations of distributed computing, grid computing, networking, virtualization, service orientation, and marketoriented computing. Cloud provides flexible resource allocation on demand with the promise of realizing elastic, Internet-accessible computing on a pay-as-you-go basis. Cloud services include infrastructure such as computing and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Communication over Finite-Chain-Ring Matrix Channels

    Though network coding is traditionally performed over finite fields, recent work on nested-lattice-based network coding suggests that, by allowing network coding over finite chain rings, more efficient physical-layer network coding schemes can be constructed. This paper considers the problem of communication over the finite-chain-ring matrix channel Y = AX +...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Denial Attacks in Cloud Computing

    Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end-recipients. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagram. The authors are aimed at implement the denial...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    A Novel Approach for Preventing Hackers in Data Communication

    In the electronic communication system the user authentication is an important issue to be considered for the information security. The concept of username with password is an efficient method of maintaining shared secret information between a user and a remote system. Any communication through the internet passes across an unsecured...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    The Role of Cloud Computing in Mobile

    The mobile cloud computing approach has emerged as a promising way to address the new challenges in the application development and implementation of resources sharing or distributed computing. The capabilities of mobile devices have been improving quickly than computers. Many researchers focus on the area of mobile computing and cloud...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Joint Relay Assignment and Channel Allocation for Energy-Efficient Cooperative Communications

    Cooperative Communication (CC) has been proposed to achieve spatial diversity without requiring multiple antennas on a single device. Many efforts in exploiting the benefits of CC focus on improving the performance in terms of outage probability and channel capacity. However, the energy efficiency of CC, which is critical for the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Space-Time Coded MPSK Coherent MIMO FSO Systems in Gamma-Gamma Turbulence

    Coherent free-space optical communication employing M-ary phase-shift keying is investigated for space-time coded Multiple-Input Multiple-Output (MIMO) systems over Gamma-Gamma turbulence channels. The proposed space-time coded system offers an efficient utilization of coherent free-space optical channel capacity by exploiting the degree of freedom at both the transmitter and receiver ends. Such...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Enhanced Power Management for Wi-Fi Direct

    Research presented in this paper enhances the power management schemes of Wi-Fi Direct to provide better services for a wider range of Wi-Fi Peer-To-Peer (P2P) applications. Although the Wi-Fi Direct defines two power management schemes to provide energy efficiency in P2P devices, neither is enough to meet power efficiency and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel Underlay TV Spectrum Sharing Scheme Based On Polarization Adaption for TD-LTE System

    Spectrum opportunities in time, space and power domain are exploited by secondary users in traditional Cognitive Radio studies. While spectrum opportunities in polarization domain, namely simultaneous utilization of spectrum between primary and secondary system with polarization signal characteristics, is exploited inadequately. With the merits of polarization mismatch, primary system lies...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Opportunistic and Efficient Resource Block Allocation Algorithms for LTE Uplink Networks

    In this paper, the authors propose two new Resource Block (RB) allocation algorithms for the LTE uplink. They take into account the RB adjacency constraint and update the allocation metric. Two different heuristics are proposed: an Opportunistic and Efficient RB allocation Algorithm (OEA) and a Quality of Service based Opportunistic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel UHF RFID Dual-Band Tag Antenna with Inductively Coupled Feed Structure

    A dual-band tag antenna for UHF RFID systems is proposed. The tag antenna is composed of a zigzag main body and a zigzag loop, which is an inductively coupled feed structure antenna. The proposed structure is simple, which is not only easy to adjust the matching impedance but also to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Interference-Aware Graph Based Resource Sharing for Device-to-Device Communications Underlaying Cellular Networks

    Device-To-Device (D2D) communications underlaying cellular networks have recently been considered as a promising means to improve the resource utilization of the cellular network and the user throughput between devices in proximity to each other. In this paper, the authors investigate the resource sharing problem to optimize the system performance in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Contention-Vector Based Hybrid Scheduling Algorithm for Wireless Networks

    A good scheduling algorithm in wireless networks is the key for the efficient use of wireless medium. This paper presents a hybrid scheduling algorithm, called Contention-Vector based Hybrid Scheduling (CVHS) algorithm, for wireless networks wherein stations can sense each other. Examples of such wireless networks include Wireless LANs and small...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding with Remix Qualification for Multicasting in Delay-Tolerant Networks

    In delay-tolerant networks where connectivity between nodes is intermittent, replication-based delivery mechanisms are often employed to deliver messages in a store-carry-forward manner instead of end-to-end delivery techniques that are mainly used in traditional computer networks and Mobile Ad-hoc NETworks. However, multicasting with replication-based methodologies can induce considerable message traffic and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Wideband MIMO Channel Capacity Analysis Based on Indoor Channel Measurement

    Based on the channel measurement in a typical indoor environment, wideband Multi-Input Multi-Output (MIMO) channel capacity analysis result is reported in this paper. A series of Non Line-Of-Sight (NLOS) and LOS measurement positions are planned for capacity comparison in different propagation conditions. For fixed received Signal-to-Noise Ratio (SNR), slight average...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Dynamic Resource Allocation for Machine-Type Communications in LTE/LTE-A with Contention-Based Access

    In this paper, the authors propose a dynamic resource allocation method to enable efficient and low-latency Machine Type Communications (MTC) in LTE/LTE-A with the Contention Based random Access (CBA) scheme. In the proposed method, they firstly estimate the probabilities of events caused by a CBA transmission and then calculate the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2012

    A (L) Slotted Rectangular Micro-Strip Multiband Patch Antenna

    In this paper, the authors present a proposed design for Rectangular micro-strip patch antenna by cutting L shaped slots in the Rectangular patch which operates at four central frequencies 1.75,2.1,2.85,3.49GHz Which is a new multi-frequency micro-strip antenna. Using proposed antenna design and micro strip feeding at proper position they find...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2010

    Weaknesses and Strengths Analysis Over Wireless Network Security Standards

    Several wireless networks security standards have been proposed and widely implemented in both business and home environments in order to protect the network from unauthorized access. However, the implementation of such standards is usually achieved by network administrators without even knowing the standards' weaknesses and strengths. The intention of this...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    On the Performance of Cooperative Systems with Blind Relays over Nakagami-m and Weibull Fading

    In this paper, the authors propose an accurate framework for the analysis of cooperative dual-hop wireless systems over fading channels, which use an Amplify and Forward (AF) relaying mechanism with fixed-gain relays. In particular, the proposed framework provides either exact results or very accurate bounds for computing the Moment Generating...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Joint Scheduling and Cooperative Sensing in Cognitive Radios: A Game Theoretic Approach

    In Cognitive Radio systems, cooperative spectrum sensing in the physical layer is highly desired to detect the Primary User accurately and to guarantee the Quality of Service (QoS) of the Primary User. Due to the energy consumption in sensing the channels, the selfish users may not be willing to contribute...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Transmit Antenna Selection Strategy in Amplify-and-Forward MIMO Relaying

    The authors compare the outage performance by applying transmit antenna selection strategies to Amplify-and-Forward protocol in the MIMO relaying scenario. Although antenna selection is a suboptimal form of beamforming, it enjoys the advantages of tractable optimization and low feedback overhead. Specifically, by combining transmit antenna selection strategies with Amplify-and-Forward protocol,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    A Pragmatic Bit and Power Allocation Algorithm for NOFDM Signalling

    In the last recent years, Multi-Carrier (MC) techniques have received an ever-increasing attention in the context of high data rate transmission over wireless frequency selective channels. In the form of Orthogonal Frequency Division Multiplexing (OFDM), MC schemes have been embedded in various standards, such as Wi-Fi WLAN IEEE 802.11 a/g/n...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    An Enhanced Load-Balancing Approach Using Detour in Ad-hoc Networks

    In this paper, the authors propose an enhanced load-balancing approach considering the on-going traffic sessions as well as new traffic sessions. In their scheme a congested node tries to escape from the congestion caused by the on-going traffic session by requesting phased detour to adjacent nodes. Like legacy load-balancing schemes,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Modulation Selection from a Battery Power Efficiency Perspective: A Case Study of PPM and OOK

    Sensor nodes in Wireless Sensor Networks (WSNs) are often expected to operate on batteries for a long period of time. Battery Power Efficiency (BPE) is therefore a critical factor dictating the lifetime of WSNs. In this paper, the authors aim to select the appropriate modulation scheme from a battery power...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    An Efficient Subcarrier and Power Allocation Algorithm for Uplink OFDMA-Based Cognitive Radio Systems

    In this paper, the authors address the subcarrier and power allocation problem in the uplink of an OFDMA system under the Cognitive Radio environment. The objective is to maximize the sum-rate of Secondary Users, without causing adverse interference to the Primary Users. They formulate the optimization problem subject to the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Optimization of Adaptive Communication Systems with Feedback Channels

    The main tendency in development of wireless Communication and data-transmission Systems (CS) is increasing the rate and the range of reliable transmission under simultaneous minimization of the sizes, energy consumption and production costs of Peripheral Transmitting Units (PTU). This task is internally contradictive: diminution of the energy consumption requires application...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    On the Effect of Combined Equalization for MC-CDMA Systems in Correlated Fading Channels

    Equalization techniques are considered in Multi Carrier-Code Division Multiple Access (MC-CDMA) systems to efficiently combine subcarriers contribution and improve the performance. In this paper, the authors analytically investigate a combined equalization technique which consists in performing both pre-equalization at the transmitter and post-equalization at the receiver, by exploiting channel knowledge...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Packet Transmission Scheduling Algorithm for Wireless Sensor Networks with Energy Limited Mobile Sink

    A transmission scheduling algorithm is proposed for Wireless Sensor Networks with energy limited mobile sinks. The algorithm is primarily based on the well known tradeoff between the expected number of data packets that are successfully received by the sink and the transmission power consumed in the system. The likelihood of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Resource Allocation Algorithms with Reduced Complexity in MIMO Multi-Hop Fading Channels

    MIMO multi-hop channel plays an important role in wireless ad hoc networks. In this paper, the authors investigate the resource allocation optimization problem in order to achieve throughput maximization with given resource constraints. They propose algorithms with low complexity to achieve maximum capacity. The main idea is to determine the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    On the Use of Control Packets for Intelligent Flooding in VANETs

    Broadcasting will be extensively used in Vehicular Ad-hoc NETworks (VANET), mainly for spreading out safety messages. A number of Intelligent Flooding Schemes (IFSs) have been recently proposed to optimize message dissemination. Some of them exploit a distributed timer-based contention mechanism in order to allow the most suitable nodes to forward...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Turbo Codes in Coded Cooperation using the Forced Symbol Method

    Recently, cooperative diversity has been introduced where single-antenna mobiles achieve uplink transmit diversity helping each other by relaying one another's messages. A variation of this principle is coded cooperation which partitions the codeword of each mobile and transmits portions of each codeword through independent fading channels. Coded cooperation framework has...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Network-Centric Joint Radio Resource Policy in heterogeneous WiMAX-UMTS Networks for Streaming and Elastic traffic

    The convergence of wireless networks is a key solution to deal with the ever-increasing need for bandwidth. In this compound radio environment, users can use concurrently diverse services through multiple RATs. In this paper, the authors consider a heterogeneous network where cells include two co-localized Radio Access Technologies (RAT): WiMAX...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Energy and Mobility Aware Clustering Technique for Multicast Routing Protocols in Wireless Ad Hoc Networks

    A number of key issues arise in the implementation of scalable multicast protocols for wireless Mobile Ad-hoc NETworks (MANETs), namely energy consumption and data delivery over unstable/mobile nodes. To improve scalability of these protocols, clustering has been proposed. Clustering allows reducing the number of mobile nodes participating in multicast routing...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    On the Scalability Problem of Highway Ad hoc Network

    Vehicular Ad-hoc NETwork in a highway is composed of high speed vehicles or nodes which induce fast topology changes in their configuration. In order to solve the connectivity and scalability problems of VANETs, the authors introduce the architecture of a Vehicular Hybrid Ad-hoc NETwork (VHANET). Using some routing protocol extensions,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Cross-Layer Optimization of Multipoint Message Broadcast in MANETs

    Multipoint-to-multipoint message broadcast is a demanding application scenario in ad-hoc networks. Adaptive management of wireless resources is necessary to support such applications in a safety critical context. In this paper, the authors study adaptation of transmission rate and power to varying densities of ad-hoc nodes. Their approach is to construct...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    A Multitaper Spectrum Based Detector for Cognitive Radio

    Fully exploiting the phase and magnitude information in received data is crucial to the detection of Cognitive Radio signals, and this is usually done in the time domain. In fact, the same set of information can also be exploited in the frequency domain in the form of power spectrum. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Rate-Optimized Power Allocation for OFDM Transmission with Multiple DF/Regenerative Relays and an Improved Protocol

    The authors consider an OFDM (Orthogonal Frequency Division Multiplexing) Point-To-Point transmission scheme improved by means of multiple relays. For each carrier, symbols sent by the source during a first time slot, may be retransmitted during a second time slot by the relays, which are assumed to be of the Decode-and-Forward...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Full Rate Orthogonal Space-Time Block Coding in OFDM Transmission Using Time Reversal

    A novel method of utilizing the Channel State Information at the Transmitter (CSIT) for Orthogonal Frequency Division Multiplexing (OFDM) systems with multiple transmit antennas is presented in this paper. Using the conventional Time Reversal (TR) technique along with a specific OFDM symbol structure, the method facilitates the application of full-rate...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Performance of Cyclostationary Features Based Spectrum Sensing Method in A Multiple Antenna Cognitive Radio System

    In this paper, spectrum sensing methods in a multiple antenna Cognitive Radio (CR) system are discussed. The authors firstly present a simplified cyclostationary features based detector for single antenna, with relatively low computation complexity compared to traditional cyclostationary feature detection method. In order to achieve better signal detection performance in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Novel Frame Structures to Improve System Capacity and Latency Performance of a Time-Division Duplex Multihop Relay Wireless Access System

    The multihop relay wireless access system is expected to eliminate dead spots by expanding Line-Of-Sight situations and to extend coverage at low cost. However, time-division duplex relay schemes that apportion the fixed length frame resources between the access and relay zones like the IEEE802.16j relay scheme suffer the problems of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Performance Comparison of Flat and Cluster-Based Hierarchical Ad Hoc Routing with Entity and Group Mobility

    Ad hoc routing protocols can be divided into flat and hierarchical routing. One typical way to build hierarchy is to group mobile nodes into clusters, thus decrease routing space and improve network performance. Mobility models also affect the performance of ad hoc routing protocols and can be divided into entity...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    An Optimal Soft Fusion Scheme for Cooperative Spectrum Sensing in Cognitive Radio Network

    In this paper, the authors propose an optimal soft fusion scheme for cooperative spectrum sensing in Cognitive Radio (CR) network. Multiple cooperative Secondary Users (SUs) simply serve as relay nodes in the network to provide space diversity for spectrum sensing. An optimal soft fusion scheme of the relayed sensing observations...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Power Loading for Multicarrier Cognitive Radio with MIMO Antennas

    The authors propose a power loading scheme for multicarrier Cognitive Radio (CR) network employing Multiple-Input Multiple-Output (MIMO) antennas. They allocate power to different transmitting antennas within different subcarriers maximizing the total system capacity while maintaining the interference to Primary User within a prescribed limit. They formulate this as a convex...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Design and Implementation of a Network-Centric Micro-Mobility Architecture

    In this paper, the authors present the design and implementation of the Mobility Plane Architecture (MPA). MPA is a network architecture that provides micro-mobility in a network-centric way, that is, the burden of supporting micro-mobility is placed on the network and not on the mobile nodes. The implementation employs RSVP-TE...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Base Station Selection Technique for MMSE Joint Transmission in Downlink Cooperative MIMO System

    Cooperative Multiple Input Multiple Output (MIMO) system is capable in mitigating Co-Channel Interference (CCI) that limits the downlink capacity of cellular network. Among the joint transmission designs for Base Station (BS) cooperation, the linear joint transmissions with per-base power constraint are preferred due to its computational simplicity and reality. However,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    A POMDP-Based Spectrum Handoff Protocol for Partially Observable Cognitive Radio Networks

    Recent studies have been conducted to indicate the ineffective usage of licensed bands due to the static spectrum allocation. In order to improve the spectrum utilization, the Cognitive Radio (CR) is therefore suggested to dynamically exploit the opportunistic primary frequency spectrums. How to provide efficient spectrum handoff has been considered...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Secure Hierarchical Data Aggregation in Wireless Sensor Networks

    Communication in Wireless Sensor Networks uses the majority of a sensor's limited energy. Using aggregation in Wireless Sensor Network reduces the overall communication cost. Security in Wireless Sensor Networks entails many different challenges. Traditional end-to-end security is not suitable for use with in-network aggregation. A corrupted sensor has access to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Integrating SIP-Based Network Mobility into IP Multimedia Subsystem

    The combination of SIP-NEMO and IMS brings benefits of power saving, low complexity and few handoff to both end users and service providers. In this paper, the authors investigate the integration of SIP-NEMO in the IMS, and propose two interworking architectures: loosely coupled and tightly coupled. They also present three...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Packet Size Optimization for Goodput and Energy Efficiency Enhancement in Slotted IEEE 802.15.4 Networks

    To address system goodput and energy efficiency enhancement, this paper studies packet size optimization for IEEE 802.15.4 networks. Taking into account of the CSMA-CA contention, protocol overhead, and channel condition, new analytical models are proposed to calculate the goodput and the energy consumption. Optimal packet sizes are derived from the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Simple Bit Allocation Algorithms with BER-Constraint for OFDM-Based Systems

    Orthogonal Frequency Division Multiplexing (OFDM) has been thoroughly investigated as an enabling technology for future broadband multimedia communication. In this paper, the authors suggest adaptive bit allocation algorithms that operate in a frequency selective fading channel environment by exploiting Channel State Information obtained through a feedback channel. The proposed algorithms...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    An Improved Receiver Architecture for Cyclic-Prefixed OFDM

    A novel Orthogonal Frequency Division Multiplexing receiver architecture to be employed with standard (e.g. Wireless LAN) transmitters is proposed. It features enhanced error-rate performance with flexible computational complexity and robustness to imperfect channel estimation. It is based on exploitation of the redundancy available in the cyclic prefix after cancellation of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    A Novel Reliability Based Routing Protocol for Power Aware Communications in Wireless Sensor Networks

    In this paper, a Rayleigh fading model based reliability-centric routing algorithm is proposed for Wireless Sensor Networks (WSNs). The proposed scheme is optimized with respect to minimal power consumption to improve longevity as well as to ensure reliable packet transmission to the Base Station (BS). Reliability is guaranteed by selecting...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Energy Savings Achievable in Connection Preserving Energy Saving Algorithms

    Energy saving is an important design consideration in Wireless Sensor Networks. In this paper, the authors analyze the energy savings that can be achieved in a sensor network where each sensor is capable of reducing its transmission power from a maximum power pm, compared with that in a sensor network...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Decentralized Intercell Interference Coordination in Uplink Cellular Networks Using Adaptive Sub-Band Exclusion

    In this paper, the authors propose an Adaptive Sub-band Exclusion (ASE) scheme as a means of Inter-Cell Interference Coordination (ICIC) technique to improve the performance of wireless cellular systems in a decentralized manner. Since ICIC is performed at each Mobile Station (MS), the proposed ASE scheme can be classified as...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Anonymous Handover Mechanism for Service Mobility in Heterogeneous Wireless Networks

    Various handover technologies for heterogeneous wireless networks have been proposed. Most of these technologies are based on mobile IP technology, which reduces the processing time of handovers, network authentication, and service authentication. However, guaranteeing continuity with real-time services and/or video-on-demand services is difficult, particularly when the processing time is reduced...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    Combating Timing Asynchronism in Relay Transmission for 3GPP LTE Uplink

    Relays are used between the source and the destination to improve network coverage and reliability in cooperative relay system. Imperfect time delay synchronization at the receiver arises because of time difference in propagation of the signals from the source and the relay to the receiver. The performance degrades due to...

    Provided By Institute of Electrical and Electronics Engineers