[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 27, Issue 11November 2014
Publisher:
  • John Wiley and Sons Ltd.
  • Baffins Lane Chichester West Sussex PO19 1UD
  • United Kingdom
ISSN:1074-5351
EISSN:1099-1131
Reflects downloads up to 14 Dec 2024Bibliometrics
article
Issue Information

No abstract is available for this article.

article
QoS-based radio network dimensioning for LTE networks with heavy real-time traffic

Applications of video streaming and real-time gaming, which generate large amounts of real-time traffic in the network, are expected to gain considerable popularity in Long Term Evolution networks. Maintaining the QoS such as packet delay, packet loss ...

article
A radio frequency identification application for car theft prevention in parking lot management systems

Currently, there are many parking lot management systems in use; however, most of them are unsuited to the problem of car theft. For example, a thief can drive a jalopy into a parking lot, and because the gate does not have any mechanism to detect ...

article
Constructing a VANET based on cluster chains

The paper proposes a scheme on constructing a vehicular ad-hoc network based on cluster chains. In the cluster construction algorithm, the distance from a potential cluster head to its neighbor cluster associate node is used as a metric to elect a ...

article
An energy-saving-centric downlink scheduling scheme for WiMAX networks

This study proposes an energy-saving-centric downlink scheduling scheme to support efficient power utilization and to satisfy the QoS requirements. The base station considers the queue lengths of mobile stations with real-time and non-real-time ...

article
Multi-hop medium access control protocol for low energy critical infrastructure monitoring networks using wake-up radio

The IEEE 802.15.4K Task Group was formed recently to address the low energy critical infrastructure monitoring networks. The aim is to collect scheduled and event data from a large number of non-mains powered endpoints that are widely dispersed. The ...

article
A layer2 multipath solution and its performance evaluation for Data Center Ethernets

Data Center Ethernet is likely to be deployed as the communication infrastructure for future data centers, which carries multiple types of traffic with very different characteristics and handling requirements. Conventional Spanning Tree Protocol STP ...

article
Physical-layer network coding with limited feedback using orthogonal space-time block codes

This paper introduces limited feedback technique into physical-layer network coding PLNC scheme, which is the most spectrally efficient protocol in two-way relay channels, consisted of one relay and two end nodes sources. Decode-and-forward DF and ...

article
An efficient mixed mode and paired cipher text cryptographic algorithm for effective key distribution

Widely used asymmetric key or public key systems such as RSA, Rabin system, ElGamal system, and elliptical curve system are based on a single hard mathematical problem such as factoring or discrete logarithm. Even if these algorithms are very secure now,...

article
Characterization and modeling of video popularity

Popularity of videos is a key factor for the design and management of a streaming media system. In this paper, three factors representing clients' access to a media system are investigated to characterize popularity. One of the factors is the commonly ...

article
A source authentication scheme based on message recovery digital signature for multicast

The source authentication is an important issue for the multicast applications because it can let the receiver know whether the multicast message is sent from a legal source or not. However, the previously related schemes did not provide the ...

article
A novel signal separation algorithm based on compressed sensing for wideband spectrum sensing in cognitive radio networks

In cognitive radio networks, since cognitive terminals use a shared wideband frequency spectrum for data transmissions, they are susceptible to malicious denial-of-service attacks, where adversaries try to corrupt communication by actively transmitting ...

article
An optimal solution to resource allocation among soft QoS trafficin wireless network

Optimization theory and nonlinear programming method have successfully been applied into wire-lined networks e.g., the Internet in developing efficient resource allocation and congestion control schemes. The resource e.g., bandwidth allocation in a ...

article
Performance analysis of Doppler shift effects on OFDM-based and MC-CDMA-based cognitive radios

The present development of high data rate wireless applications has led to extra bandwidth demands. However, finding a new spectrum bandwidth to accommodate these applications and services is a challenging task because of the scarcity of spectrum ...

article
RA and DA satellite access schemes: a survey and some research results and challenges

This paper surveys the most popular random access RA, demand assignment DA, and hybrids schemes for satellite broadband access networks. In addition, we present some recent research results that we obtained when a reliable transmission control protocol, ...

article
Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card

Providing a suitable key agreement protocol for session initiation protocol is crucial to protecting the communication among the users over the open channel. This paper presents an efficient and flexible password authenticated key agreement protocol for ...

article
Performance analysis of cooperative network over Nakagami and Rician fading channels

This paper presents an analysis on the performance of single-relay and multiple fixed-relay cooperative network. The relay nodes operate in amplify-and-forward AF mode and transmit the signal through orthogonal channels. We consider maximal-ratio ...

article
Distributed compressed sensing in wireless local area networks

In order to improve energy efficiency in the process of gathering data and transmitting information, compressed sensing CS has been applied increasingly in wireless local area networks WLANs. In traditional usages of CS techniques in previous ...

article
A multi-cell adaptive resource allocation scheme based on potential game for ICIC in LTE-A

Intercell interference coordination in Third Generation Partnership Project long-term evolution-advanced system has received much attention both from the academia and the standardization communities. Moreover, the network architecture of long-term ...

article
Cooperative transmissions for secondary spectrum access in cognitive radios

In cognitive radio networks CRNs, the primary users PUs and secondary users SUs will interfere with each other, which may severely degrade the performances of both primary and secondary transmissions. In this paper, we propose a two-phase cognitive ...

article
Extensible optical access network enabling multistage protections and data aggregation based on tangent rings

In this paper, an extensible optical access network architecture is proposed on the basis of multiple tangent single-fiber rings. With the proposed architecture, both multistage protections and data aggregation can be realized. Optical line terminal and ...

article
A framework of data caching for improving decoding efficiency of opportunistic network coding

Throughput performance of wireless networks can be enhanced by applying network coding NC technique based on opportunistic listening. The packets sent or overheard by a network node should be locally cached for the purpose of possible future decoding. ...

article
Secure multicast routing protocols in mobile ad-hoc networks

A mobile ad-hoc network MANET is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network. Routing protocols in MANETs define how routes between source and destination nodes are established and maintained. ...

article
Dynamic connection provisioning with shared protection in IP/WDM networks

Internet protocol IP traffic connections arrive dynamically at wavelength-division multiplexing WDM network edges with low data rates compared with the wavelength capacity, availability, and quality-of-service QoS constraints. This paper introduces a ...

article
A routing protocol for mobile ad-hoc networks using the profit optimization model

Recently, wireless networks have become one of the major development trends in computer network technology. Because there is no more need of the wired transmission medium, applications have thus diversified. One such growing field of wireless networks ...

article
Analysis of MANET dynamic source routing and its performance enhancements

Since the inception of the dynamic source routing DSR protocol for mobile ad hoc networks, several enhancements have been proposed, along with other competing routing protocols. All of them provide different degrees of throughput improvement under ...

article
A novel cooperative transmission scheme based on superposition coding and partial relaying

This paper considered the single relay system and proposed a novel repetition coding decode-and-forward DF cooperative transmission scheme on the basis of superposition coding and partial relaying. In the proposed scheme, the link disparity due to the ...

article
Cryptanalysis of some user identification schemes for distributed computer networks

User identification plays an important role for access control in networks. Recently, Hsu and Chuang proposed a user identification scheme for distributed computer networks, which can also provide key agreement and user anonymity. However, Tsai pointed ...

article
Congestion control with dynamic threshold adaptation and cross-layer response for TCP Vegas over IEEE 802.11 wireless networks

Wireless technologies provide mobile access and enable rapid andcost-effective network deployment. But a wireless link is generally accompanied by high interference, transmission errors and a varying latency. The erratic packet losses usually lead to a ...

article
Second-order statistics of multiuser relay cooperation systems over Nakagami-m fading channels

To attain overall recognition of the effect of Nakagami-m channel parameters on the second-order statistics and to present a guide to the design and configuration of systems, we investigate the average level crossing rate LCR and average fading duration ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.