-
361
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
Published 2014-04-01“…The user authentication scheme in ubiquitous wireless sensor networks (WSNs) is an important security mechanism that allows users to access sensors through wireless networks. Therefore, many user authentication schemes in ubiquitous WSNs have been proposed. …”
Get full text
Article -
362
Two-way relaying protocol tailored for sensor network
Published 2014-03-01“…A three-time-slot two-way relaying protocol,named as two-way selective decode-and-forward (TW-SDF) protocol,was proposed.This relaying protocol integrates network coding and the selective decode-and-forward method,and was tailored for wireless networks with simple devices,like sensor networks.Compared with the well-known physical-layer network coding protocol,the considered TW-SDF has the merits of full diversity order gain,low encoding and decoding complexity and easy-to-implement.Provided block codes,an upper bound on the block error rate of TW-SDF was derived and proved,which is valid for all hard decoders.Simulation results further verify that the upper bound is remarkably tight if BCH codes are utilized.…”
Get full text
Article -
363
Bandwidth allocation games based on network selection for video communication
Published 2015-02-01“…A bandwidth allocation game based on network selection (BAG-NS) was proposed for video communication in heterogeneous wireless networks.Firstly,according to the video characteristics of different users and current network conditions,the algorithm calculated the weights of network factors and selected the optimum network by combining analytic hierarchy process and entropy theory.Secondly,the user’s utility function with payoff and cost was designed,and a distributed iterative algorithm is used to obtain the Nash equilibrium.Then the existence and uniqueness of the Nash equilibrium are proved.Simulation results show that the proposed algorithm enables different users to reasonably distribute in different networks and takes users’ fairness and network congestion control into consideration,which increases the utilization of network resources,reduces the users’ video distortion,and improves the users’ video quality.…”
Get full text
Article -
364
Research at flat underlying network architecture of campus
Published 2014-10-01“…By systematic analysis of the status quo on the campus network,via deployment of BRAS and high-density switches,we deployed a flat network core,by deployment of accounting system through a bypass way,using IPOE access technology,combined with local forwarding wireless networking,assisted with linkage logging system,we achieved a unified user access certification,and we optimized the network boundary by integrating of global security policy,strategies for Internet traffic optimization base on application protocols and the deployment of caching system.Practice shows,flat underlying network architecture improves the network performance,meets the inherent requirements of campus network,while also improves users’ experience.Flat network architecture is feasible for campus network.…”
Get full text
Article -
365
QoS-aware enhanced proportional faire scheduling algorithm for real-time services in LTE networks
Published 2023-06-01“…The new generation of wireless networks (LTE advance and WIMAX) supports many services that consume many resources (such as VOIP, video conference …). …”
Get full text
Article -
366
Certificateless strong designated verifier multi-signature
Published 2016-06-01“…,one bilinear pairing.So,it can be applied in wireless networks of the limited computing resources and network bandwidth.…”
Get full text
Article -
367
A Zone-Based Self-Organized Handover Scheme for Heterogeneous Mobile and Ad Hoc Networks
Published 2014-06-01“…This paper proposes a handover management scheme by dividing the total coverage area of the base station (BS) or access point (AP) into three different zones (strong, average, and weak zones), respectively, on the basis of receive signal strength indication (RSSI) to provide fast vertical handover support in heterogeneous wireless networks. Furthermore, a new event is proposed and added to the IEEE 802.21: media independent handover (MIH) standard to integrate the functionality of multithreshold. …”
Get full text
Article -
368
A Multiuser Subcarrier and Power Allocation Scheme to Improve the Performance of Cell Edge Users
Published 2015-05-01“…To restrain the inter cell interference effectively and greatly enhance the performance of wireless networks especially the performance of cell edge users is one of the goals of 5G mobile communication system. …”
Get full text
Article -
369
Shaped-Pattern Reflectarray Antennas for mm-Wave Networks Using a Simple Cell Topology
Published 2022-01-01“…This work demonstrates the good performance of simple topology reflectarrays, being an interesting antenna candidate in the upcoming wireless networks.…”
Get full text
Article -
370
A survey on resource allocation in backscatter communication networks
Published 2021-09-01“…With the development of Internet of things (IoT) technology, wireless networks have the characteristics of massive user access, high power consumption, and high capacity requirements.In order to meet the transmission requirements and reduce energy consumption, backscatter communication technology was considered to be one of the most effective solutions to the above problems.In the fact of complex network scenarios, the improvement of spectrum efficiency, system capacity, and energy management has become an urgent problem of resource allocation areas in backscatter communications.For this problem, resource allocation algorithms in backscatter communications were surveyed.Firstly, the basic concept and different network architectures of backscatter communication were introduced.Then, resource allocation algorithms in backscatter communication networks were analyzed according to different network types, optimization objectives, and the number of antennas.Finally, the challenges and future research trends of resource allocation problems in backscatter communication networks were prospected.…”
Get full text
Article -
371
Cross-Layer Optimization Scheme Using Cooperative Diversity for Reliable Data Transfer in Wireless Sensor Networks
Published 2014-03-01“…Cooperative diversity has been shown to provide significant performance gains in wireless networks where communication is impeded by channel fading. …”
Get full text
Article -
372
Optimization and Modeling of Optical Emission Spatial Coverage from Underwater Multi-Faceted Optical Base Stations
Published 2024-12-01“…These advancements aim to enhance beam coverage performance while also providing technical support for achieving omnidirectional communication in underwater optical wireless networks (UOWN).…”
Get full text
Article -
373
Power control strategy with joint of multi-packet reception and fuzzy logic control
Published 2015-02-01“…In order to meet the needs of energy saving in wireless networks,a power control strategy with joint of multi-packet reception and fuzzy logic was proposed.Firstly,based on the power control with successive interference cancellation (SIC),transmission power was divided into several decodable power levels.Secondly,fuzzy logic control algorithm was adopted to select the optimal transmission power for SIC.In addition,three parameters were designed as fuzzy logic control inputs for power selection,which were the distance between transmitters and receivers,the number of neighboring nodes and the residual energy of transmitters.Simulation results show that power control strategy with joint of multi-packet reception and fuzzy logic control not only betters average network throughput than other power control strategy for SIC,but also saves more energy so that the network lifecycle would be significantly extended.…”
Get full text
Article -
374
Comparison Study of Resource Allocation Strategies for OFDM Multimedia Networks
Published 2012-01-01“…Advanced MAC scheduling schemes provide efficient support of multimedia services in multiuser OFDM wireless networks. Designed in a cross layer approach, they opportunistically consider the channel state and are well adapted to the wireless multipath fading environment. …”
Get full text
Article -
375
Asynchronous perception algorithm based on energy detection
Published 2017-03-01“…In the future heterogeneous wireless networks,since primary user (PU) and cognitive secondary user (SU) are not coordinated to be synchronous,it will result in sense timing difference between PU’s transmitter and SU’s receiver.For this asynchronous sense case,a new asynchronous sensing algorithm based on Bayesian estimation theory was proposed.A unified dynamic state space model was first proposed to describe the observable energy relationship with dynamic PU state and unknown timing difference.Then,an iterative estimation scheme was designed using stochastic finite set and the rules of maximum posterior probability.Finally,approximated estimation results were obtained by using a particle filter.The simulation results show that the proposed asynchronous scheme significantly eliminates the uncertainty of the received signal information and thus improves the spectrum sensing performance by obtaining the time difference accurately.…”
Get full text
Article -
376
Optimal Pricing of Spectrum Resources in Wireless Opportunistic Access
Published 2012-01-01“…We consider opportunistic access to spectrum resources in cognitive wireless networks. The users equipment, or the network nodes in general are able to sense the spectrum and adopt a subset of available resources (the spectrum and the power) individually and independently in a distributed manner, that is, based on their local channel quality information and not knowing the Channel State Information (CSI) of the other nodes' links in the considered network area. …”
Get full text
Article -
377
Planning Optimization of the Distributed Antenna System in High-Speed Railway Communication Network Based on Improved Cuckoo Search
Published 2018-01-01“…The network planning is a key factor that directly affects the performance of the wireless networks. Distributed antenna system (DAS) is an effective strategy for the network planning. …”
Get full text
Article -
378
An Energy-Efficient Multisite Offloading Algorithm for Mobile Devices
Published 2013-03-01“…Experimental results demonstrate that our algorithm can significantly reduce more energy consumption as well as execution time and better adapt to the unreliability of wireless networks (such as the network bandwidth changes), compared with the existing algorithms.…”
Get full text
Article -
379
On Key Evolution over Wireless Channels
Published 2015-07-01“…Noise is a powerful resource for the implementation of cryptographic primitives, especially in wireless networks. In general, a key agreement protocol is tailored to the channels and relies on the assumption that knowledge on the eavesdropper's channel is available. …”
Get full text
Article -
380
A New Technique of Removing Blind Spots to Optimize Wireless Coverage in Indoor Area
Published 2013-01-01“…Therefore, it is one of the fundamental requirements to eliminate the blind spots from the indoor area and obtain the maximum coverage while designing the wireless networks. In this regard, this paper combines ray-tracing (RT), genetic algorithm (GA), depth first search (DFS), and branch-and-bound method as a new technique that guarantees the removal of blind spots and subsequently determines the optimal wireless coverage using minimum number of transmitters. …”
Get full text
Article