Nanjing University of Posts and Telecommunications

Displaying 1-23 of 23 results

  • White Papers // Mar 2013

    The Research on Joint Distributed Source Coding and Network Coding for Wireless Multicast Network

    This paper considers the problem of transmitting correlated information from multiple sources to multiple receivers, where every receiver seeks to recover all of the original sources. In order to improve the efficiency of network transmission, the authors combine interflow network coding and DIstributed Source Coding Using Syndromes (DISCUS). Furthermore, for...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Feb 2013

    A Density-Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks

    Clustering is an efficient method adopted in various routing algorithms for wireless sensor networks. In this paper, the authors propose a Density-based Energy-efficient Clustering Algorithm (DECA). In DECA, they define the density of each node and regard it as an important evaluation metric. Together with nodes' residual energy under consideration,...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Jan 2013

    An Energy Balanced Algorithm of LEACH Protocol in WSN

    In Wireless Sensor Networks (WSNs), due to the limitation of nodes' energy, energy efficiency is an important factor should be considered when the protocols are designing. As a typical representative of hierarchical routing protocols, LEACH Protocol plays an important role. In response to the uneven energy distribution that is caused...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Oct 2012

    Short Signature From Factoring Assumption in the Standard Model

    Digital signatures are one of the most important fundamental cryptographic primitives, which can be used to construct complex cryptographic protocols. However, most practical signatures can only be proved secure in random oracles, while signatures in standard model are often considered as less efficient or based on the stronger assumptions, such...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Sep 2012

    Public Auditing for Ensuring Cloud Data Storage Security with Zero Knowledge Privacy

    In cloud storage service, clients upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of clients' stored data, Cloud Server (CS) must prove to a verifier that it is actually storing all of the client's data unchanged. And, enabling public auditability for...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Jul 2012

    Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy

    Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system. Backward privacy means the adversary cannot trace the tag later even if he reveals the internal states of the tag sometimes before. In this paper, the...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Jun 2012

    Security Analysis of RAPP: An RFID Authentication Protocol Based on Permutation

    One of the key problems in Radio Frequency IDentification(RFID) is security and privacy. Many RFID authentication protocols have been proposed to preserve security and privacy of the system. Nevertheless, most of these protocols are analyzed and it is shown that they cannot provide security against some RFID attacks. RAPP is...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Jun 2012

    Limit and Dynamics of Information Entropy in Transmission

    This paper presents a theoretical explanation and test results that an amount of information would not increase infinitely in transmission via the mathematical model of the matter for deciphering original works of information entropy and the principle of thermodynamic entropy. The rate formula with energy is derived via retrieval speed...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Feb 2012

    A Novel Support Vector Machine Awareness Model Based on Genetic Algorithm Optimization for Peer-to-Peer Network Traffic

    In this paper, the authors proposed a Support Vector Machine (SVM) awareness model based on Genetic Algorithm (GA) Optimization for Peer-To-Peer (P2P) network traffic. On the basis of traffic feature, they created a traffic awareness model which introduced SVM as well as utilized GA to optimize the required feature samples,...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Aug 2011

    On-Line Multi-Energy Optimization With Hybrid MAC Mechanism in Clustered Wireless Sensor Networks

    Energy consumption remains one of the main challenges in WSN applications. To prolong the network lifetime, this paper researches the effect of battery energy renewing in Wireless Sensor Networks (WSNs) from energy scavenging among sensors and battery recovery effect through appropriate idle time. On these bases, the authors propose a...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Jun 2011

    Wavelet-Analysis Based File-Sharing P2P Traffic Prediction Algorithm

    The increasing P2P network traffic on the Internet has leaded to the problem of network congestion. In the consequence of the diversification of the P2P business and protocol, research on the management of P2P traffic has many problems to resolve. Prediction of the P2P traffic is the kernel problem in...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Mar 2011

    Encrypted Internet Traffic Classification Method Based on Host Behavior

    Accurate network traffic classification plays important roles in many areas such as traffic engineering, QoS and intrusion detection etc. Encrypted Peer-To-Peer (P2P) applications have dramatically grown in popularity over the past few years, and now constitute a significant share of the total traffic in many networks. To solve the drawback...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Jan 2011

    Conditions on Blind Source Separability of Linear FIR-MIMO Systems With Binary Inputs

    In this paper, the authors investigate the blind source separability of linear FIR-MIMO systems. The concept of semi-reversibility of a system is presented. It is shown that for a semi-reversible system, if the input signals belong to a binary alphabet, then the source data can be blindly separated. One sufficient...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Dec 2010

    A Novel VideoTransmission Evaluation Framework Based on TCP-Friendly Congestion Control Mechanism

    TFRC protocol is suitable for video transmission in a wire network, and quality assessment is also essential in a video transmission system. In this paper, a real-time video transmission system based on TFRC protocol is proposed, and the evaluation model about the system is improved in the framework of Evalvid....

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Nov 2010

    A* Algorithm Based Optimization for Cloud Storage

    Cloud Storage provides users with storage space and make user friendly and timely acquire data, which is foundation of all kinds of cloud applications. However, there is lack of deep studies on how to optimize cloud storage aiming at improvement of data access performance. In this paper, mathematical description for...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Nov 2010

    Subcarrier and Power Allocation in OFDM-Based Cognitive Radio Systems

    For CR systems, where primary and CR users coexist in adjacent bands, it is important to keep the interference introduced to the Primary User (PU) band within a tolerable range. In this paper, the authors investigate the subcarrier and power allocation problem in CR systems, where primary and CR users...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Oct 2010

    A Fast Neighbor Discovery Algorithm for Cognitive Radio Ad Hoc Networks

    Cognitive Radio (CR) is a revolution in wireless communication and CR Ad Hoc Network (CRAHN) is under extensive research recently. In CRAHN, no control network infrastructure can be utilized and CR users have to attain the first hand information for networking. Neighbor discovery is a fundamental work for cooperation among...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Sep 2010

    The Design of Two-Dimension Iterative Decoder for Network Coded Cooperation

    Combining network code with Cyclic Redundancy Check (CRC), a two-dimension iterative decoder is proposed for network coded cooperation. The decoder organizes the network code as a row decoder, and CRC as a column decoder. The Log-Likelihood Ratios (LLR) of received signal is used as soft information for iterations. The performances...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Sep 2010

    A Study on Secure Data Storage Strategy in Cloud Computing

    Based on fundamental theories of k equations in algebra, n congruence surplus principle in elementary number theory, and the Abhishek's online data storage algorithm, this paper proposes a secure data storage strategy in cloud computing. The strategy splits data d into k sections using the data splitting algorithm, ensures high...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Mar 2010

    Coverage-Guaranteed Sensor Node Deployment Strategies for Wireless Sensor Networks

    Deployment quality and cost are two conflicting aspects in wireless sensor networks. Random deployment, where the monitored field is covered by randomly and uniformly deployed sensor nodes, is an appropriate approach for large-scale network applications. However, their successful applications depend considerably on the deployment quality that uses the minimum number...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Nov 2009

    Access Control of Cloud Service Based on UCON

    Cloud computing is an emerging computing paradigm, and cloud service is also becoming increasingly relevant. Most research communities have recently embarked in the area, and research challenges in every aspect. This paper mainly discusses cloud service security. Cloud service is based on Web Services, and it will face all kinds...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Oct 2009

    Cooperative Spectrum Sensing Using Free Probability Theory

    Free probability theory, which has became a main branch of random matrix theory, is a valuable tool for describing the asymptotic behavior of multiple systems, especially for large random matrices. In this paper, using free probability theory, a new cooperative scheme for spectrum sensing is proposed, which shows how asymptotic...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Apr 2009

    An Opportunistic Cooperation Scheme in Wireless Networks: When to Cooperate With the Relay?

    In the paper, an opportunistic cooperation scheme is proposed to make an efficient use of the cooperative relay, where whether the cooperative transmission will be adopted depends on the channel quality from the source to the relay, as opposed to the deterministic cooperation regardless of the relay channel conditions. Closed-form...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Sep 2012

    Public Auditing for Ensuring Cloud Data Storage Security with Zero Knowledge Privacy

    In cloud storage service, clients upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of clients' stored data, Cloud Server (CS) must prove to a verifier that it is actually storing all of the client's data unchanged. And, enabling public auditability for...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Jul 2012

    Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy

    Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system. Backward privacy means the adversary cannot trace the tag later even if he reveals the internal states of the tag sometimes before. In this paper, the...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Jun 2012

    Security Analysis of RAPP: An RFID Authentication Protocol Based on Permutation

    One of the key problems in Radio Frequency IDentification(RFID) is security and privacy. Many RFID authentication protocols have been proposed to preserve security and privacy of the system. Nevertheless, most of these protocols are analyzed and it is shown that they cannot provide security against some RFID attacks. RAPP is...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Feb 2013

    A Density-Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks

    Clustering is an efficient method adopted in various routing algorithms for wireless sensor networks. In this paper, the authors propose a Density-based Energy-efficient Clustering Algorithm (DECA). In DECA, they define the density of each node and regard it as an important evaluation metric. Together with nodes' residual energy under consideration,...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Oct 2012

    Short Signature From Factoring Assumption in the Standard Model

    Digital signatures are one of the most important fundamental cryptographic primitives, which can be used to construct complex cryptographic protocols. However, most practical signatures can only be proved secure in random oracles, while signatures in standard model are often considered as less efficient or based on the stronger assumptions, such...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Oct 2009

    Cooperative Spectrum Sensing Using Free Probability Theory

    Free probability theory, which has became a main branch of random matrix theory, is a valuable tool for describing the asymptotic behavior of multiple systems, especially for large random matrices. In this paper, using free probability theory, a new cooperative scheme for spectrum sensing is proposed, which shows how asymptotic...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Jan 2013

    An Energy Balanced Algorithm of LEACH Protocol in WSN

    In Wireless Sensor Networks (WSNs), due to the limitation of nodes' energy, energy efficiency is an important factor should be considered when the protocols are designing. As a typical representative of hierarchical routing protocols, LEACH Protocol plays an important role. In response to the uneven energy distribution that is caused...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Mar 2013

    The Research on Joint Distributed Source Coding and Network Coding for Wireless Multicast Network

    This paper considers the problem of transmitting correlated information from multiple sources to multiple receivers, where every receiver seeks to recover all of the original sources. In order to improve the efficiency of network transmission, the authors combine interflow network coding and DIstributed Source Coding Using Syndromes (DISCUS). Furthermore, for...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Nov 2009

    Access Control of Cloud Service Based on UCON

    Cloud computing is an emerging computing paradigm, and cloud service is also becoming increasingly relevant. Most research communities have recently embarked in the area, and research challenges in every aspect. This paper mainly discusses cloud service security. Cloud service is based on Web Services, and it will face all kinds...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Sep 2010

    A Study on Secure Data Storage Strategy in Cloud Computing

    Based on fundamental theories of k equations in algebra, n congruence surplus principle in elementary number theory, and the Abhishek's online data storage algorithm, this paper proposes a secure data storage strategy in cloud computing. The strategy splits data d into k sections using the data splitting algorithm, ensures high...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Nov 2010

    A* Algorithm Based Optimization for Cloud Storage

    Cloud Storage provides users with storage space and make user friendly and timely acquire data, which is foundation of all kinds of cloud applications. However, there is lack of deep studies on how to optimize cloud storage aiming at improvement of data access performance. In this paper, mathematical description for...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Jan 2011

    Conditions on Blind Source Separability of Linear FIR-MIMO Systems With Binary Inputs

    In this paper, the authors investigate the blind source separability of linear FIR-MIMO systems. The concept of semi-reversibility of a system is presented. It is shown that for a semi-reversible system, if the input signals belong to a binary alphabet, then the source data can be blindly separated. One sufficient...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Nov 2010

    Subcarrier and Power Allocation in OFDM-Based Cognitive Radio Systems

    For CR systems, where primary and CR users coexist in adjacent bands, it is important to keep the interference introduced to the Primary User (PU) band within a tolerable range. In this paper, the authors investigate the subcarrier and power allocation problem in CR systems, where primary and CR users...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Dec 2010

    A Novel VideoTransmission Evaluation Framework Based on TCP-Friendly Congestion Control Mechanism

    TFRC protocol is suitable for video transmission in a wire network, and quality assessment is also essential in a video transmission system. In this paper, a real-time video transmission system based on TFRC protocol is proposed, and the evaluation model about the system is improved in the framework of Evalvid....

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Apr 2009

    An Opportunistic Cooperation Scheme in Wireless Networks: When to Cooperate With the Relay?

    In the paper, an opportunistic cooperation scheme is proposed to make an efficient use of the cooperative relay, where whether the cooperative transmission will be adopted depends on the channel quality from the source to the relay, as opposed to the deterministic cooperation regardless of the relay channel conditions. Closed-form...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Oct 2010

    A Fast Neighbor Discovery Algorithm for Cognitive Radio Ad Hoc Networks

    Cognitive Radio (CR) is a revolution in wireless communication and CR Ad Hoc Network (CRAHN) is under extensive research recently. In CRAHN, no control network infrastructure can be utilized and CR users have to attain the first hand information for networking. Neighbor discovery is a fundamental work for cooperation among...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Mar 2010

    Coverage-Guaranteed Sensor Node Deployment Strategies for Wireless Sensor Networks

    Deployment quality and cost are two conflicting aspects in wireless sensor networks. Random deployment, where the monitored field is covered by randomly and uniformly deployed sensor nodes, is an appropriate approach for large-scale network applications. However, their successful applications depend considerably on the deployment quality that uses the minimum number...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Sep 2010

    The Design of Two-Dimension Iterative Decoder for Network Coded Cooperation

    Combining network code with Cyclic Redundancy Check (CRC), a two-dimension iterative decoder is proposed for network coded cooperation. The decoder organizes the network code as a row decoder, and CRC as a column decoder. The Log-Likelihood Ratios (LLR) of received signal is used as soft information for iterations. The performances...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Feb 2012

    A Novel Support Vector Machine Awareness Model Based on Genetic Algorithm Optimization for Peer-to-Peer Network Traffic

    In this paper, the authors proposed a Support Vector Machine (SVM) awareness model based on Genetic Algorithm (GA) Optimization for Peer-To-Peer (P2P) network traffic. On the basis of traffic feature, they created a traffic awareness model which introduced SVM as well as utilized GA to optimize the required feature samples,...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Mar 2011

    Encrypted Internet Traffic Classification Method Based on Host Behavior

    Accurate network traffic classification plays important roles in many areas such as traffic engineering, QoS and intrusion detection etc. Encrypted Peer-To-Peer (P2P) applications have dramatically grown in popularity over the past few years, and now constitute a significant share of the total traffic in many networks. To solve the drawback...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Jun 2011

    Wavelet-Analysis Based File-Sharing P2P Traffic Prediction Algorithm

    The increasing P2P network traffic on the Internet has leaded to the problem of network congestion. In the consequence of the diversification of the P2P business and protocol, research on the management of P2P traffic has many problems to resolve. Prediction of the P2P traffic is the kernel problem in...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Aug 2011

    On-Line Multi-Energy Optimization With Hybrid MAC Mechanism in Clustered Wireless Sensor Networks

    Energy consumption remains one of the main challenges in WSN applications. To prolong the network lifetime, this paper researches the effect of battery energy renewing in Wireless Sensor Networks (WSNs) from energy scavenging among sensors and battery recovery effect through appropriate idle time. On these bases, the authors propose a...

    Provided By Nanjing University of Posts and Telecommunications

  • White Papers // Jun 2012

    Limit and Dynamics of Information Entropy in Transmission

    This paper presents a theoretical explanation and test results that an amount of information would not increase infinitely in transmission via the mathematical model of the matter for deciphering original works of information entropy and the principle of thermodynamic entropy. The rate formula with energy is derived via retrieval speed...

    Provided By Nanjing University of Posts and Telecommunications