SouthEast SAS Users Group

Displaying 1-30 of 30 results

  • White Papers // Oct 2013

    Learning Imbalanced Multi-Class Data with Optimal Dichotomy Weights

    Many real data mining tasks suffer from class-imbalance, i.e., some classes have much fewer data than the other classes, whereas the minority classes are more important. Conventional learning methods often try to pursue a high accuracy by assuming that all classes have similar sizes, leading to the fact that the...

    Provided By SouthEast SAS Users Group

  • White Papers // Aug 2013

    Greedy Routing Recovery Using Controlled Mobility in Wireless Sensor Networks

    One of the most current routing families in wireless sensor networks is geographic routing. Using nodes location, they generally apply a greedy routing that makes a sensor forward data to route to one of its neighbors in the forwarding direction of the destination. If this greedy step fails, the routing...

    Provided By SouthEast SAS Users Group

  • White Papers // Aug 2013

    Network Security Situational Awareness

    With the different sources of threats to the Networks, from the physical and human threats to the extreme diverse methods used by hackers to exploit networks and disseminate different types of malware from simple kinds of comic, propaganda, ads, and viruses to highly sophisticated with a very advanced levels of...

    Provided By SouthEast SAS Users Group

  • White Papers // Nov 2012

    Spatial Reuse Strategy in MmWave WPANs With Directional Antennas

    In this paper, the authors propose a spatial reuse strategy for millimeter-Wave (mmWave) Wireless Personal Area Networks (WPANs) with directional antennas. By this strategy, two or more transmissions can be appropriately scheduled for spatial sharing based on the BeamForming (BF) information. Moreover, they analyze the performance of this strategy with...

    Provided By SouthEast SAS Users Group

  • White Papers // Nov 2012

    Segment Training Based Individual Channel Estimation for One-Way Relay Network

    In this paper, the authors design a segment training based individual channel estimation scheme in the classical three-node amplify-and-forward One-Way Relay Network (OWRN). They investigate the underlying power allocation at the relay to minimize the Mean-Square-Error (MSE) of the individual channel estimation and to maximize the Average Effective Signal-to-Noise Ratio...

    Provided By SouthEast SAS Users Group

  • White Papers // Nov 2012

    Coordinated Multi-Cell Beamforming Scheme Using Uplink-Downlink Max-Min SINR Duality

    In this paper, a new analytical expression of the max-min SINR duality between the multi-cell downlink and the virtual uplink subject to per-BS power constraints is firstly given. Based on that, a hierarchical iterative scheme is proposed to solve the virtual uplink optimization problem. The uplink solution is then converted...

    Provided By SouthEast SAS Users Group

  • White Papers // Nov 2012

    Performance Enhanced Transmission in Device-to-Device Communications: Beamforming or Interference Cancellation?

    This paper considers Device-To-Device (D2D) communications under-laying cellular networks with a multi-antenna Base Station (BS). The BS serves its own cellular users while letting another remote terminal directly transmit signals to its nearby receiver via a D2D link. Two transmit strategies including BeamForming (BF) and Interference Cancellation (IC) are considered...

    Provided By SouthEast SAS Users Group

  • White Papers // Jun 2012

    Joint MUD Exploitation and ICI Mitigation Based Scheduling With Limited Base Station Cooperation

    In this paper, the authors propose a novel opportunistic scheduling algorithm in multi-cell cooperation scenario, i.e., joint Multi-User Diversity (MUD) exploitation and Inter-Cell Interference (ICI) Mitigation based scheduling (MEIMS). Their algorithm jointly considers the intended channel condition of the scheduled user from its serving cell and the orthogonality between that...

    Provided By SouthEast SAS Users Group

  • White Papers // Jun 2012

    An Adaptive Clustering Scheme for Mobile Ad-Hoc Networks

    While Mobile Ad-Hoc NETworks (MANET) has many characteristics that are a challenge to manage, like bandwidth and power constraints, dynamic topology, etc adaptability is a key issue in the successful operation of a MANET. Unfortunately, this feature of MANET have not been investigated and optimized in great detail in the...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    A Slepian-Wolf Coding Based Energy-Efficient Clustering Algorithm for Data Aggregation in Wireless Sensor Networks

    This paper considers the Slepian-Wolf coding based Energy Minimization Clustering (SWEMC) problem in a Wireless Sensor Network (WSN), which aims to minimize the amount of data generated within each cluster and the overall energy cost for data transmission in the network. To solve the problem, the authors propose a Slepian-Wolf...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    An Optimal Stopping Strategy for Opportunistic Broadcast Channel Access

    Opportunistic Routing with Network Coding (NCOR) has recently emerged as a promising unicast paradigm in lossy wireless multi-hop networks. By combining the multi-user diversity advantage of the broadcast links and the erasure codes property of random network coding, it raises an interesting question on the broadcast channel access control algorithm,...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Delay Quality-of-Service Driven Resource Allocation for Relay-Based Multiuser OFDMA Networks

    This paper focuses on the delay-QoS driven resource allocation problems for multiuser Orthogonal Frequency Division Multiple Access (OFDMA) relay-based networks. The authors develop an optimal strategy, with respect to the joint subchannel assignment and power control, to maximize the throughput of the systems, under both delay-QoS guarantees and average power...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Achievable Rate Analysis and Feedback Design for Multiuser Relay With Imperfect CSI

    This paper investigates a multiuser MIMO relay downlink system with imperfect channel estimation and limited feedback. Compared with the system using perfect Channel State Information (CSI), they analyze the achievable rate loss due to CSI mismatch arising from both channel estimation and CSI quantization feedback. An upper bound to the...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Linear MIMO Precoding in Multi-Antenna Wiretap Channels for Finite-Alphabet Data

    In this paper, the authors investigate the secrecy rate of finite alphabet communications over Multiple-Input, Multiple-Output, Multiple-antenna Eavesdropper (MIMOME) systems. Traditional precoder designs at the transmitter for achieving secrecy capacity (maximum secrecy rate) for MIMOME systems are developed according to the assumption of Gaussian input signals. Such designs may risk...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    A Large System Analysis of Cooperative Multicell Downlink System With Imperfect CSIT

    In this paper, the authors consider the multi-cell downlink system with multiple Base Stations (BSs) and multiple single antenna users employing the BS cooperation. The channels between BSs and users have independent spatial correlations. All BSs jointly implement the regularized zero-forcing based on imperfect channel estimation. By utilizing the large...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    On Asymptotic Capacity of Coordinated Multi-Point MIMO Channels

    In this paper, the authors investigate the asymptotic mutual information expression and the capacity-achieving input covariance matrices for the coordinated multi-point Multiple-Input Multiple-Output (MIMO) antenna channels. In particular, it is considered that the numbers of antennas at the transmitter and receiver approach to infinity with a fixed ratio. Their derivations...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Bounds and Capacity Results for the Cognitive Z Channel

    The authors study the discrete memoryless Z channel where the non-broadcasting transmitter is cognitive and knows both messages of the broadcasting transmitter. They call this the cognitive Z channel. They first propose inner and outer bounds on the capacity of the cognitive Z channel. The achievability scheme they propose consists...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    On Linear Precoding of Non-Regenerative MIMO Relays for QAM Inputs

    Recent works have established that MIMO systems optimized for Gaussian source signals may suffer unexpected performance loss when practical inputs are in fact discrete QAM sources. There is a practical need in the optimization of MIMO related systems of various networking scenarios to specifically target source signals of finite QAM...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    An Efficient Network Coding Based Multicast Retransmission Scheme for Mobile Communication Networks With Relays

    This paper proposes a network coding based retransmission scheme for multicast in a mobile communication network with relay. The proposed retransmission scheme uses Frequency Division (FD) for resource allocation in order to achieve high transmission and retransmission efficiency in the network. Meanwhile, an efficient packet selection algorithm called Weight Pick...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Robust Coordinated Downlink Beamforming for Multicell-Cognitive Radio Networks With Probabilistic Constraints

    In this paper, the authors Design DownLink (DL) beamforming vectors for a multiuser multicell Cognitive Radio (CR) network with imperfect Channel State Information (CSI) at Base Stations (BS). Specifically, they model channel estimation error as a random vector with known statistical distribution. Their objective is to minimize the total DL...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Underwater Acoustic Channel Estimation Via Complex Homotopy

    UnderWater Acoustic (UWA) channel is typically sparse. In this paper, a complex Homotopy algorithm is presented and then applied for UWA OFDM channel estimation. Two enhancements that exploit UWA channel temporal correlation for the Compressed-Sensing(CS)-based channel estimators are proposed. The first one is based on a first-order Gauss-Markov (GM) model...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Carrier Frequency Offset Estimation for Interleaved OFDMA Uplink

    In this paper, the authors develop a new Carrier Frequency Offset (CFO) estimation scheme for interleaved Orthogonal Frequency Division Multiple Access (OFDMA) transmission. They employ multi-antenna at the receiver and exploit the rank reduction approach to blindly estimate the CFOs of multiple users. The proposed scheme supports full load transmission...

    Provided By SouthEast SAS Users Group

  • White Papers // Mar 2012

    Efficient Joint Transmit and Receive Optimization for Multiuser MIMO Systems

    In this paper, the authors develop a novel joint transmit and receive design for MultiUser MIMO (MU-MIMO) systems. The proposed scheme exploits the channel temporal correlation and incorporates the Matched Filter (MF) combining vector into the beamforming design. Considering the beamforming is optimized with the outdated Channel State Information (CSI)...

    Provided By SouthEast SAS Users Group

  • White Papers // Mar 2012

    Doubly Selective Channel Estimation for Amplify-and-Forward Relay Networks

    In this paper, the estimation of doubly selective channel is considered for Amplify-and-Forward (AF) relay networks. The Complex Exponential Basis Expansion Model (CEBEM) is chosen to describe the time-varying channel, from which the infinite channel parameters are mapped onto finite ones. Since direct estimation of these coefficients encounters high computational...

    Provided By SouthEast SAS Users Group

  • White Papers // Mar 2012

    Relay Based Cooperative Spectrum Sensing in Distributed Cognitive Radio Networks

    In Cognitive Radio (CR), spectrum sensing plays a fundamental and critical role. This paper deals with the issue of spectrum sensing in a distributed CR network, and proposes a novel relay based cooperative spectrum sensing method, which makes one Secondary User (SU) with higher signal-to-noise ratio spend part of its...

    Provided By SouthEast SAS Users Group

  • White Papers // Mar 2012

    Robust Tomlinson-Harashima Precoding for Non-Regenerative Multi-Antenna Relaying Systems

    In this paper, the authors consider the robust transceiver design with Tomlinson-Harashima Precoding (THP) for multihop Amplify-and-Forward (AF) Multiple-Input Multiple-Output (MIMO) relaying systems. THP is adopted at the source to mitigate the spatial inter-symbol interference and then a joint Bayesian robust design of THP at source, linear forwarding matrices at...

    Provided By SouthEast SAS Users Group

  • White Papers // Jul 2011

    Illumination Invariant Face Recognition Based on Improved Local Binary Pattern

    Local Binary Pattern (LBP) is a kind of discriminative texture descriptor for characterization of face patterns. However, the value of LBP operator is greatly changed under non-monotonic intensity transformations. As a result, the recognition performance of LBP descriptor for face images with significant illumination variations is severely dropped. In this...

    Provided By SouthEast SAS Users Group

  • White Papers // Jul 2009

    The Secrecy Capacity of the Semi-deterministic Broadcast Channel

    In this paper, the authors study secure communications over a two-user semi-deterministic broadcast channel, i.e., one of the receivers is connected to the transmitter through a deterministic channel. They consider the case where the deterministic receiver is also the eavesdropper for the other receiver's message. They derive the secrecy capacity...

    Provided By SouthEast SAS Users Group

  • White Papers // Jul 2009

    Cryptanalysis of Two RFID Authentication Protocols

    Radio Frequency IDentification (RFID) technologies have many advantages in applications such as object tracking and monitoring, ticketing, supply-chain management, contactless payment systems. However, the RFID system may bring about various security and privacy problems. In this paper, the authors present their security analysis of the LAK protocol and the CWH...

    Provided By SouthEast SAS Users Group

  • White Papers // Jul 2006

    Multi-Block Chaining-Based Authentication Mode

    The block cipher algorithm is one of the encryption algorithms in common use. It only defines a function turning a block of plaintext into a block of cipher-text. Usually the length of message to be encrypted and authenticated is much more than a block. Thus a block cipher mode is...

    Provided By SouthEast SAS Users Group

  • White Papers // Jul 2009

    Cryptanalysis of Two RFID Authentication Protocols

    Radio Frequency IDentification (RFID) technologies have many advantages in applications such as object tracking and monitoring, ticketing, supply-chain management, contactless payment systems. However, the RFID system may bring about various security and privacy problems. In this paper, the authors present their security analysis of the LAK protocol and the CWH...

    Provided By SouthEast SAS Users Group

  • White Papers // Jul 2006

    Multi-Block Chaining-Based Authentication Mode

    The block cipher algorithm is one of the encryption algorithms in common use. It only defines a function turning a block of plaintext into a block of cipher-text. Usually the length of message to be encrypted and authenticated is much more than a block. Thus a block cipher mode is...

    Provided By SouthEast SAS Users Group

  • White Papers // Oct 2013

    Learning Imbalanced Multi-Class Data with Optimal Dichotomy Weights

    Many real data mining tasks suffer from class-imbalance, i.e., some classes have much fewer data than the other classes, whereas the minority classes are more important. Conventional learning methods often try to pursue a high accuracy by assuming that all classes have similar sizes, leading to the fact that the...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    A Slepian-Wolf Coding Based Energy-Efficient Clustering Algorithm for Data Aggregation in Wireless Sensor Networks

    This paper considers the Slepian-Wolf coding based Energy Minimization Clustering (SWEMC) problem in a Wireless Sensor Network (WSN), which aims to minimize the amount of data generated within each cluster and the overall energy cost for data transmission in the network. To solve the problem, the authors propose a Slepian-Wolf...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    An Optimal Stopping Strategy for Opportunistic Broadcast Channel Access

    Opportunistic Routing with Network Coding (NCOR) has recently emerged as a promising unicast paradigm in lossy wireless multi-hop networks. By combining the multi-user diversity advantage of the broadcast links and the erasure codes property of random network coding, it raises an interesting question on the broadcast channel access control algorithm,...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Delay Quality-of-Service Driven Resource Allocation for Relay-Based Multiuser OFDMA Networks

    This paper focuses on the delay-QoS driven resource allocation problems for multiuser Orthogonal Frequency Division Multiple Access (OFDMA) relay-based networks. The authors develop an optimal strategy, with respect to the joint subchannel assignment and power control, to maximize the throughput of the systems, under both delay-QoS guarantees and average power...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Achievable Rate Analysis and Feedback Design for Multiuser Relay With Imperfect CSI

    This paper investigates a multiuser MIMO relay downlink system with imperfect channel estimation and limited feedback. Compared with the system using perfect Channel State Information (CSI), they analyze the achievable rate loss due to CSI mismatch arising from both channel estimation and CSI quantization feedback. An upper bound to the...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Linear MIMO Precoding in Multi-Antenna Wiretap Channels for Finite-Alphabet Data

    In this paper, the authors investigate the secrecy rate of finite alphabet communications over Multiple-Input, Multiple-Output, Multiple-antenna Eavesdropper (MIMOME) systems. Traditional precoder designs at the transmitter for achieving secrecy capacity (maximum secrecy rate) for MIMOME systems are developed according to the assumption of Gaussian input signals. Such designs may risk...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    A Large System Analysis of Cooperative Multicell Downlink System With Imperfect CSIT

    In this paper, the authors consider the multi-cell downlink system with multiple Base Stations (BSs) and multiple single antenna users employing the BS cooperation. The channels between BSs and users have independent spatial correlations. All BSs jointly implement the regularized zero-forcing based on imperfect channel estimation. By utilizing the large...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    On Asymptotic Capacity of Coordinated Multi-Point MIMO Channels

    In this paper, the authors investigate the asymptotic mutual information expression and the capacity-achieving input covariance matrices for the coordinated multi-point Multiple-Input Multiple-Output (MIMO) antenna channels. In particular, it is considered that the numbers of antennas at the transmitter and receiver approach to infinity with a fixed ratio. Their derivations...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Bounds and Capacity Results for the Cognitive Z Channel

    The authors study the discrete memoryless Z channel where the non-broadcasting transmitter is cognitive and knows both messages of the broadcasting transmitter. They call this the cognitive Z channel. They first propose inner and outer bounds on the capacity of the cognitive Z channel. The achievability scheme they propose consists...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    On Linear Precoding of Non-Regenerative MIMO Relays for QAM Inputs

    Recent works have established that MIMO systems optimized for Gaussian source signals may suffer unexpected performance loss when practical inputs are in fact discrete QAM sources. There is a practical need in the optimization of MIMO related systems of various networking scenarios to specifically target source signals of finite QAM...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    An Efficient Network Coding Based Multicast Retransmission Scheme for Mobile Communication Networks With Relays

    This paper proposes a network coding based retransmission scheme for multicast in a mobile communication network with relay. The proposed retransmission scheme uses Frequency Division (FD) for resource allocation in order to achieve high transmission and retransmission efficiency in the network. Meanwhile, an efficient packet selection algorithm called Weight Pick...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Robust Coordinated Downlink Beamforming for Multicell-Cognitive Radio Networks With Probabilistic Constraints

    In this paper, the authors Design DownLink (DL) beamforming vectors for a multiuser multicell Cognitive Radio (CR) network with imperfect Channel State Information (CSI) at Base Stations (BS). Specifically, they model channel estimation error as a random vector with known statistical distribution. Their objective is to minimize the total DL...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Underwater Acoustic Channel Estimation Via Complex Homotopy

    UnderWater Acoustic (UWA) channel is typically sparse. In this paper, a complex Homotopy algorithm is presented and then applied for UWA OFDM channel estimation. Two enhancements that exploit UWA channel temporal correlation for the Compressed-Sensing(CS)-based channel estimators are proposed. The first one is based on a first-order Gauss-Markov (GM) model...

    Provided By SouthEast SAS Users Group

  • White Papers // May 2012

    Carrier Frequency Offset Estimation for Interleaved OFDMA Uplink

    In this paper, the authors develop a new Carrier Frequency Offset (CFO) estimation scheme for interleaved Orthogonal Frequency Division Multiple Access (OFDMA) transmission. They employ multi-antenna at the receiver and exploit the rank reduction approach to blindly estimate the CFOs of multiple users. The proposed scheme supports full load transmission...

    Provided By SouthEast SAS Users Group

  • White Papers // Mar 2012

    Efficient Joint Transmit and Receive Optimization for Multiuser MIMO Systems

    In this paper, the authors develop a novel joint transmit and receive design for MultiUser MIMO (MU-MIMO) systems. The proposed scheme exploits the channel temporal correlation and incorporates the Matched Filter (MF) combining vector into the beamforming design. Considering the beamforming is optimized with the outdated Channel State Information (CSI)...

    Provided By SouthEast SAS Users Group

  • White Papers // Mar 2012

    Doubly Selective Channel Estimation for Amplify-and-Forward Relay Networks

    In this paper, the estimation of doubly selective channel is considered for Amplify-and-Forward (AF) relay networks. The Complex Exponential Basis Expansion Model (CEBEM) is chosen to describe the time-varying channel, from which the infinite channel parameters are mapped onto finite ones. Since direct estimation of these coefficients encounters high computational...

    Provided By SouthEast SAS Users Group

  • White Papers // Mar 2012

    Relay Based Cooperative Spectrum Sensing in Distributed Cognitive Radio Networks

    In Cognitive Radio (CR), spectrum sensing plays a fundamental and critical role. This paper deals with the issue of spectrum sensing in a distributed CR network, and proposes a novel relay based cooperative spectrum sensing method, which makes one Secondary User (SU) with higher signal-to-noise ratio spend part of its...

    Provided By SouthEast SAS Users Group

  • White Papers // Mar 2012

    Robust Tomlinson-Harashima Precoding for Non-Regenerative Multi-Antenna Relaying Systems

    In this paper, the authors consider the robust transceiver design with Tomlinson-Harashima Precoding (THP) for multihop Amplify-and-Forward (AF) Multiple-Input Multiple-Output (MIMO) relaying systems. THP is adopted at the source to mitigate the spatial inter-symbol interference and then a joint Bayesian robust design of THP at source, linear forwarding matrices at...

    Provided By SouthEast SAS Users Group

  • White Papers // Jun 2012

    Joint MUD Exploitation and ICI Mitigation Based Scheduling With Limited Base Station Cooperation

    In this paper, the authors propose a novel opportunistic scheduling algorithm in multi-cell cooperation scenario, i.e., joint Multi-User Diversity (MUD) exploitation and Inter-Cell Interference (ICI) Mitigation based scheduling (MEIMS). Their algorithm jointly considers the intended channel condition of the scheduled user from its serving cell and the orthogonality between that...

    Provided By SouthEast SAS Users Group

  • White Papers // Nov 2012

    Spatial Reuse Strategy in MmWave WPANs With Directional Antennas

    In this paper, the authors propose a spatial reuse strategy for millimeter-Wave (mmWave) Wireless Personal Area Networks (WPANs) with directional antennas. By this strategy, two or more transmissions can be appropriately scheduled for spatial sharing based on the BeamForming (BF) information. Moreover, they analyze the performance of this strategy with...

    Provided By SouthEast SAS Users Group

  • White Papers // Nov 2012

    Segment Training Based Individual Channel Estimation for One-Way Relay Network

    In this paper, the authors design a segment training based individual channel estimation scheme in the classical three-node amplify-and-forward One-Way Relay Network (OWRN). They investigate the underlying power allocation at the relay to minimize the Mean-Square-Error (MSE) of the individual channel estimation and to maximize the Average Effective Signal-to-Noise Ratio...

    Provided By SouthEast SAS Users Group

  • White Papers // Nov 2012

    Coordinated Multi-Cell Beamforming Scheme Using Uplink-Downlink Max-Min SINR Duality

    In this paper, a new analytical expression of the max-min SINR duality between the multi-cell downlink and the virtual uplink subject to per-BS power constraints is firstly given. Based on that, a hierarchical iterative scheme is proposed to solve the virtual uplink optimization problem. The uplink solution is then converted...

    Provided By SouthEast SAS Users Group

  • White Papers // Nov 2012

    Performance Enhanced Transmission in Device-to-Device Communications: Beamforming or Interference Cancellation?

    This paper considers Device-To-Device (D2D) communications under-laying cellular networks with a multi-antenna Base Station (BS). The BS serves its own cellular users while letting another remote terminal directly transmit signals to its nearby receiver via a D2D link. Two transmit strategies including BeamForming (BF) and Interference Cancellation (IC) are considered...

    Provided By SouthEast SAS Users Group

  • White Papers // Jun 2012

    An Adaptive Clustering Scheme for Mobile Ad-Hoc Networks

    While Mobile Ad-Hoc NETworks (MANET) has many characteristics that are a challenge to manage, like bandwidth and power constraints, dynamic topology, etc adaptability is a key issue in the successful operation of a MANET. Unfortunately, this feature of MANET have not been investigated and optimized in great detail in the...

    Provided By SouthEast SAS Users Group

  • White Papers // Jul 2009

    The Secrecy Capacity of the Semi-deterministic Broadcast Channel

    In this paper, the authors study secure communications over a two-user semi-deterministic broadcast channel, i.e., one of the receivers is connected to the transmitter through a deterministic channel. They consider the case where the deterministic receiver is also the eavesdropper for the other receiver's message. They derive the secrecy capacity...

    Provided By SouthEast SAS Users Group

  • White Papers // Aug 2013

    Greedy Routing Recovery Using Controlled Mobility in Wireless Sensor Networks

    One of the most current routing families in wireless sensor networks is geographic routing. Using nodes location, they generally apply a greedy routing that makes a sensor forward data to route to one of its neighbors in the forwarding direction of the destination. If this greedy step fails, the routing...

    Provided By SouthEast SAS Users Group

  • White Papers // Jul 2011

    Illumination Invariant Face Recognition Based on Improved Local Binary Pattern

    Local Binary Pattern (LBP) is a kind of discriminative texture descriptor for characterization of face patterns. However, the value of LBP operator is greatly changed under non-monotonic intensity transformations. As a result, the recognition performance of LBP descriptor for face images with significant illumination variations is severely dropped. In this...

    Provided By SouthEast SAS Users Group

  • White Papers // Aug 2013

    Network Security Situational Awareness

    With the different sources of threats to the Networks, from the physical and human threats to the extreme diverse methods used by hackers to exploit networks and disseminate different types of malware from simple kinds of comic, propaganda, ads, and viruses to highly sophisticated with a very advanced levels of...

    Provided By SouthEast SAS Users Group