Matches 1 - 50 out of 422 1 2 3 4 5 6 7 8 9 >


Match Document Document Title
312724752 Differencing multiuser detection using error feedback filter for MIMO DS-UWB system in Nakagami fading channel.  
A differencing multiuser detection (MUD) method is proposed for multiple-input multiple-output (MIMO) direct sequence (DS) ultra-wideband (UWB) system to cope with the multiple access interference...
312724751 Trust-based relay selection in relay-based networks.  
It has been demonstrated that choosing an appropriate relay node can improve the transmission rate for the system. However, such system improvement brought by the relay selection may be degraded...
312724750 Point in triangle testing based trilateration localization algorithm in wireless sensor networks.  
Localization of sensor nodes is a key technology in Wireless Sensor Networks(WSNs). Trilateration is an important position determination strategy. To further improve the localization accuracy, a...
312724749 Performance analysis of multi-hop wireless networks under different hopping strategies with spatial diversity.  
This paper derives two main end-to-end performance metrics, namely the spatial capacity density and the average end-to-end delay of the multi-hop wireless ad hoc networks with multi-antenna...
312724748 A data gathering approach for wireless sensor network with quadrotor-based mobile sink node.  
In this paper, we use a quadrotor-based mobile sink to gather sensor data from the terrestrial deployed wireless sensor network. By analyzing the flight features of the mobile sink node, we...
312724747 Energy-efficient low-delay TDMA scheduling algorithm for industrial wireless mesh networks.  
Time division multiple access (TDMA) is a widely used media access control (MAC) technique that can provide collision-free and reliable communications, save energy and bound the delay of packets....
312724746 Performance analysis of space-time coded MIMO system with discrete-rate adaptive modulation in Ricean fading channels.  
The performance of a MIMO system with adaptive modulation (AM) and space-time coding over Ricean fading channels for perfect and imperfect channel state information (CSI) is presented. The fading...
312724745 EEDARS: an energy-efficient dual-sink algorithm with role switching mechanism for event-driven wireless sensor networks.  
Energy conservation is a vital issue in wireless sensor networks. Recently, employing mobile sinks for data gathering become a pervasive trend to deal with this problem. The sink can follow...
312724744 Cooperative relaying with interference cancellation for secondary spectrum access.  
Although underlay spectrum sharing has been shown as a promising technique to promote the spectrum utilization in cognitive radio networks (CRNs), it may suffer bad secondary performance due to...
312724743 Analysis of flooding DoS attacks utilizing DNS name error queries.  
The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past decade, Denial-of-Service (DoS) attacks have targeted the DNS...
312724742 Further analyzing the Sybil attack in mitigating peer-to-peer botnets.  
Sybil attack has been proved effective in mitigating the P2P botnet, but the impacts of some important parameters were not studied, and no model to estimate the effectiveness was proposed. In this...
312724741 A privacy-aware graph-based access control system for the healthcare domain.  
The growing concern for the protection of personal information has made it critical to implement effective technologies for privacy and data management. By observing the limitations of existing...
312724740 Identity-based ring signature schemes for multiple domains.  
A separable identity-based ring signature scheme has been constructed as a fundamental cryptographic primitive for protecting user privacy. Using the separability property, ring members can be...
312724739 Constrained high accuracy stereo reconstruction method for surgical instruments positioning.  
In this paper, a high accuracy stereo reconstruction method for surgery instruments positioning is proposed. Usually, the problem of surgical instruments reconstruction is considered as a basic...
312724738 Hole-filling based on disparity map for DIBR.  
Due to sharp depth transition, big holes may be found in the novel view that is synthesized by depth-image-based rendering (DIBR). A hole-filling method based on disparity map is proposed. One...
312724737 Active learning on sparse graph for image annotation.  
Due to the semantic gap issue, the performance of automatic image annotation is still far from satisfactory. Active learning approaches provide a possible solution to cope with this problem by...
312724736 Spatio-temporal semantic features for human action recognition.  
Most approaches to human action recognition is limited due to the use of simple action datasets under controlled environments or focus on excessively localized features without sufficiently...
312724735 A rerouting-controlled ISL handover protocol for LEO satellite networks.  
In this paper, a rerouting-controlled ISL (Inter-Satellite link) handover protocol for LEO satellite networks (RCIHP) is proposed. Through topological dynamics and periodic characterization of...
312828675 Conferencing Service Interworking in peer-to-peer and IMS Networks.  
The growth of Internet technologies and the widespread use of mobile devices have been paving the way for the increasing use of conferencing services. Two types of systems have been designed...
312828674 A robust mobile video streaming in heterogeneous emerging wireless systems.  
With the rapid development of heterogeneous emerging wireless technologies and numerous types of mobile devices, the need to support robust mobile video streaming based on the seamless handover in...
312828673 Transmission power minimization with network coding for mobile terminals in cellular relay networks.  
This paper jointly investigates the bandwidth allocation, transmission strategy and relay positions for two-way transmission aware cellular networks with network coding (NC). Our goal is to...
312828672 Terminal-based dynamic clustering algorithm in multi-cell cellular system.  
A terminal-based dynamic clustering algorithm is proposed in a multi-cell scenario, where the user could select the cooperative BSs from the predetermined static base stations (BSs) set based on...
312828671 A spectrum sharing model for compatibility between IMT-advanced and digital broadcasting.  
Recently, the International Telecommunication Union allocated the 470-862 MHz band to the digital broadcasting (DB) service. Moreover, the 790-862 MHz sub-band will be allocated to the...
312828670 AC4E: an access control model for emergencies of mission-critical cyber-physical systems.  
Access control is an essential security component in protecting sensitive data and services from unauthorized access to the resources in mission-critical Cyber-Physical Systems (CPSs). CPSs are...
312828669 Minimizing sensing decision error in cognitive radio networks using evolutionary algorithms.  
Cognitive radio (CR) is envisioned as a promising paradigm of exploiting intelligence for enhancing efficiency of underutilized spectrum bands. In CR, the main concern is to reliably sense...
312828668 Research on the energy hole problem based on non-uniform node distribution for wireless sensor networks.  
Based on the current solutions to the problem of energy hole, this paper proposed a nonuniform node distribution clustering algorithm, NNDC. Firstly, we divide the network into rings, and then...
312828667 Quorum-based key management scheme in wireless sensor networks.  
To ensure the security of wireless sensor networks, it is important to have a robust key management scheme. In this paper, we propose a Quorum-based key management scheme. A specific sensor,...
312828666 Anti-spoofing method for iris recognition by combining the optical and textural features of human eye.  
In this paper, we propose a fake iris detection method that combines the optical and textural features of the human eye. To extract the optical features, we used dual Purkinje images that were...
312828665 Trustworthy mutual attestation protocol for local true Single Sign-On system: proof of concept and performance evaluation.  
In a traditional Single Sign-On (SSO) scheme, the user and the Service Providers (SPs) have given their trust to the Identity Provider (IdP) or Authentication Service Provider (ASP) for the...
312828664 Look-up table based implementations of SHA-3 finalists: JH, Keccak and Skein.  
Cryptographic hash functions are widely used in many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In response...
312828663 A new security model in P2P network based on rough set and Bayesian learner.  
A new security management model based on Rough set and Bayesian learner is proposed in the paper. The model focuses on finding out malicious nodes and getting them under control. The degree...
312828662 Reducing decoding complexity by improving motion field using Bicubic and Lanczos interpolation techniques in Wyner-Ziv video coding.  
This paper describes interpolation method of motion field in the Wyner-Ziv video coding (WZVC) based on Expectation-Maximization (EM) algorithm. In the EM algorithm, the estimated motion field...
312828661 Driver's face detection using space-time restrained adaboost method.  
Face detection is the first step of vision-based driver fatigue detection method. Traditional face detection methods have problems of high false-detection rates and long detection times. A...
312828660 Improving performance of remote TCP in cognitive radio networks.  
Recent advances in cognitive radio technology have drawn immense attention to higher layer protocols above medium access control, such as transmission control protocol (TCP). Most proposals to...
312828659 A CORDIC-Jacobi based spectrum sensing algorithm for cognitive radio.  
Reliable spectrum sensing algorithm is a fundamental component in cognitive radio. In this paper, a non-cooperative spectrum sensing algorithm which needs only one cognitive radio node named...
312828658 A novel WBAN MAC protocol with improved Energy consumption and data rate.  
Wireless Body Area Networks (WBANs) are introduced as an enabling technology in tele-health for patient monitoring. Designing an efficient Medium Access Control (MAC) protocol is the main...
312828657 A distributed trust model based on reputation management of peers for P2P VoD services.  
Peer-to-Peer (P2P) networks are becoming more and more popular in video content delivery services, such as Video on Demand (VoD). Scalability feature of P2P allows a higher number of simultaneous...
312828656 On rate-adaptive LDPC-based cross-layer SVC over bursty wireless channels.  
Recent studies have indicated that a significant improvement in wireless video throughput can be achieved by Cross Layer Design with Side-information (CLDS) protocols. In this paper, we derive...
312828655 A thin folded dipole UHF RFID tag antenna with shorting pins for metallic objects.  
A novel folded dipole type microstrip patch antenna designed for ultrahigh frequency (UHF) band radio frequency identification (RFID) tag is presented in this paper, which can be used on the...
312828654 Neighbor gradient-based multicast routing for service-oriented applications.  
With the prevalence of diverse services-oriented applications, such as IPTV systems and on-line games, the current underlying communication networks face more and more challenges on the aspects of...
312828653 Efficient channel delay estimation for OFDM systems over doubly-selective fading channels.  
In this paper, we propose an efficient channel delay estimation method for orthogonal frequency-division multiplexing (OFDM) systems, especially over doubly-selective fading channels which are...
312828652 Optimal control of two-hop routing in Dtns with time-varying selfish behavior.  
The transmission opportunities between nodes in Delay Tolerant Network (DTNs) are uncertain, and routing algorithms in DTNs often need nodes serving as relays for others to carry and forward...
312828651 A low complexity PTS technique using threshold for PAPR reduction in OFDM systems.  
Traffic classification seeks to assign packet flows to an appropriate quality of service (QoS) class based on flow statistics without the need to examine packet payloads. Classificationproceeds...
312828650 Estimation of crowd density in public areas based on neural network.  
There are nowadays strong demands for intelligent surveillance systems, which can infer or understand more complex behavior. The application of crowd density estimation methods could lead to a...
312828649 Improved resource allocation scheme in LTE femtocell systems based on fractional frequency reuse.  
Femtocells provide high quality indoor communications with low transmit power. However, when femtocells are applied in cellular systems, a co-channel interference problem between macrocells...
312508247 Identity-based authenticated multiple key agreement protocol with PKG forward security.  
Authenticated multiple key agreement protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In...
312508246 Reversible data hiding scheme based on maximum histogram gap of image blocks.  
In this paper a reversible data hiding scheme based on histogram shifting of host image blocks is presented. This method attempts to use full available capacity for data embedding by dividing the...
312508245 Real time related key attack on Hummingbird-2.  
Hummingbird is a lightweight encryption and message authentication primitive published in RISC'09 and WLC'10. In FSE'11, Markku-Juhani O.Saarinen presented a differential divide-and-conquer method...
312508244 Forensics aided steganalysis of heterogeneous bitmap images with different compression history.  
In this paper, two practical forensics aided steganalyzers (FA-steganalyzer) for heterogeneous bitmap images are constructed, which can properly handle steganalysis problems for mixed image...
312508243 Utility-based resource allocation with bipartite matching in OFDMA-based wireless systems.  
In order to efficiently utilize limited radio resources, resource allocation schemes in OFDMA-based wireless networks have gained intensive attention recently. Instead of improving the...

Matches 1 - 50 out of 422 1 2 3 4 5 6 7 8 9 >