This paper focuses on a modified K-Best algorithm for a multi input and multi output communication system. In MIMO systems, the Maximum-Likelihood (ML) decoder is known as the optimum scheme in the sense of minimizing the Bit Error Rate (BER) which exponentially has increased computational complexity particularly in high-dimensional MIMO ...Download Now
Key establishment in sensor networks is a challenging problem because existing security schemes are unsuitable for use in resource constrained sensor nodes, and also because the nodes could be physically compromised by an adversary. In this paper two key establishment scheme are presented using the framework of pre-distributing a random ...Download Now
Wireless sensor networks pose new security and privacy challenges. One of the important challenges is how to bootstrap secure communications among nodes. Several key management schemes have been proposed. Key management plays an essential role in achieving security in Wireless Sensor Networks (WSN). Due to resource constraints, achieving such key ...Download Now
Routing in multi-hop wireless networks involves the indirection from a persistent name (or ID) to a locator. One of the biggest issues in routing is providing adequate connectivity while scaling the network. IEEE 802.16 employs TDMA (Time Division Multiple Access) as the access method and the policy for selecting scheduled ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?