[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 6, Issue 1April 2013
Publisher:
  • Inderscience Publishers
  • World Trade Center Bldg, 29, route de Pre-Bois, Case Postale 896
  • Geneva 15
  • Switzerland
ISSN:1741-1084
EISSN:1741-1092
Reflects downloads up to 01 Jan 2025Bibliometrics
Skip Table Of Content Section
article
On routing protocols using mobile social networks

A Mobile Social Network MSN is defined as a mobile network that uses social relationships to determine node communication. Many wireless networks including ad hoc networks do not reflect a real world deployment because of routing implementation ...

article
Joint cooperative analog network coding and OFDM system for wireless communication networks

In wireless mobile communication networks, network coding and cooperation are the promising techniques to increase the spectrum utilisation efficiency. OFDM is also one of the most efficient modulation techniques to deal with multipath fading channel ...

article
Hybrid local search polynomial-expanded linear multiuser detector for DS/CDMA systems

This work proposes a new multiuser detector for DS/CDMA systems constituted by the polynomial Minimum Mean-Squared Error MMSE detector followed by a local search algorithm 1-adapt LS one-adaptive local search, namely the hybrid 1-adapt-LS-MuD. In ...

article
An efficient scheduling scheme based on MET for MIMO systems

An efficient multi-user scheduling scheme is proposed to increase the throughput of the system and guarantee the fairness to all the users. In each timeslot, the product factor of each user is updated by the requested data rate and the increment of the ...

article
A kind of two-stage RRT algorithm for robotic path planning

In order to solve the problem of motion planning with dynamics, RRT algorithm was proposed. But with the environment becoming complex, the tree exploration slows down significantly. In this paper, a novel two-stage motion planning is proposed. The first ...

article
Handoff self-management based on SNR in mobile communication networks

In today's high density wireless networks, delay is considered one of the main factors limiting the capacity and increasing the new call blocking probability of a cellular system. In this paper we discuss and analyse a delay scenario in cellular ...

article
Research of fracture problem of composite plate with curved crack by conformal mapping

In this paper, the fracture problem of an anisotropic composite plate with a curved crack is solved by conformal mapping method. Using the conformal mapping method, the problem with boundary conditions is transformed into boundary value problem of ...

article
A multidimensional scaling localisation algorithm based on bacterial foraging optimisation

To make up for the shortage of the dwMDSG algorithm on the positioning accuracy and convergence performance, this paper proposes a multidimensional scaling localisation algorithm based bacterial foraging optimisation. Firstly, MDS Multidimensional ...

article
An evolvable cellular automata based data encryption algorithm

This paper proposed a new data encryption algorithm based on evolvable cellular automata CA, by taking the CAs' initial state and rule as the evolution object, try to find out the cipher text which is close to the plaintext after evolution by CAs. ...

article
Video stabilisation using local salient feature in particle filter framework

A novel digital video stabilisation approach that uses salient features and particle filter for global motion estimation is proposed in this paper. In this approach, the local salient features are first gained by the improved K-means clustering method ...

article
An efficient service selection framework for pervasive environments

Pervasive computing enables the user to connect to the network and receive any service anywhere any time. The problem of satisfying the user's request as per their requirements is a vital process. There can be many service providers providing the ...

article
Attack trace generation of cryptographic protocols based on coloured Petri nets model

In this paper, we propose a practical model checking methodology for the analysis of key exchange confidentiality property and authentication property of cryptographic protocols modelled by Coloured Petri Net CPN; and propose a new attack trace ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.