Chaotic Interleaving for the Transmission of Compressed Video Frames with Self-Embedded Digital Signatures
This paper presents an efficient video compression and transmission scheme based on the Set Partitioning In Hierarchical Trees (SPIHT) algorithm and chaotic Baker map interleaving. The compressed video frames have self-embedded digital signatures, and ...
Performance Improvement of Proxy Mobile IPv6 for the Support of Multi-homing
Nowadays the mobile communication is developing vigorously. In the modern context this is known as the Next Generation of Communication. The Mobile Node (MN) plays a vital role in the mobile communication. There are two types of mobility management ...
The Fractional Lower Order Moments Based ESPRIT Algorithm for Noncircular Signals in Impulsive Noise Environments
By applying the covariation statistics, this paper generalizes the non-circularity to the scenario of complex isotropic symmetric alpha-stable ($$ S\alpha S $$SźS) signals. The matrices based on fractional lower order moments for the extended sensor ...
Simultaneous Power and Subchannel Allocation in Interference Limited OFDM-Based Cognitive Radio Network with Quality of Service Considerations
Despite the ever increasing demand for radio spectrum we are not able to achieve complete efficiency in utilizing the spectrum. The spectrum itself being restricted can only accommodate limited number of users. Therefore, it is very critical to ...
QoS Based IPTV Over Mobile WiMAX Networks
Owing to the inherent nature, data packets in internet protocol television (IPTV) systems face two major challenges; loss and delay. On the other hand, there is a stringent constraint of minimum speed to make possible delivery of the right number of ...
Adaptive Beaconing for Effective Inter-Vehicle Collision Avoidance System
Cooperative awareness among vehicles is required to make driving safer. Inter-vehicle communication is achieved by beaconing in the vicinity of the respective vehicles. The beaconing includes the exchange of periodic messages on each vehicle's status ...
An Intelligent Secured and Energy Efficient Routing Algorithm for MANETs
Energy consumption and security are two important aspects of Mobile Ad Hoc Networks (MANETs). In MANET, application security can be provided using trust management, key management, firewalls and intrusion detection. Moreover, it is often necessary to ...
Blind CFO Estimations Based on Subspace-Based Approaches Under Single Data Block for Interleaved OFDMA Uplink
This letter presents computationally efficient subspace-based estimators to estimate carrier frequency offset (CFO) for interleaved orthogonal frequency division multiple access (OFDMA) uplink systems. Conventional subspace-based estimators rely on ...
Energy Detection Performance Enhancement Using RLS and Wavelet De-noising Filters
The fast development in wireless communications and frequency bands assignments for every communication system limits the spectrum resources. Various techniques, for example, cognitive radio have occurred to tackle this issue by allowing unlicensed ...
Adaptive Forwarding Scheme for Bounded Time Constraint in Delay Tolerant Networks
In parallel with lots of research to improve message delivery rate in Delay Tolerant Networks (DTN), additional application specific requirements are demanded to deploy them in the real world. Among many requirements, we focus on desired delivery ratio ...
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks
Wireless sensor networks (WSNs) have been widely used in many applications recently. As an important application of the WSNs, the wireless medical sensor networks (WMSNs) could improve health-care quality and have become significant in the modern ...
A DOA-Based Spatial Information Focusing Scheme for Mobile Multi-users in A 2 × 1 MISO System
In the conventional beamforming-based transmitting scheme for a multiple-input single-output (MISO) system, many transmitting antennas are usually required. In this paper, a direction of arrival (DOA) based spatial focusing scheme for a 2 1 MISO system ...
Spatial---Temporal Aspects Integrated Probabilistic Intervals Models of Query Generation and Sink Attributes for Energy Efficient WSN
With advancement in device miniaturization and efficacy of network protocols, in a variety of civilian and military applications, wireless sensor networks (WSNs) architectures find room as viable network paradigm. Invariably, in all these WSN ...
Cooperative Spectrum Sensing with Small Sample Size in Cognitive Wireless Sensor Networks
Cooperative spectrum sensing based on Dempster---Shafer (D---S) theory has attracted a large amount of interest in cognitive wireless sensor networks. However, most of them employ energy detection (ED) in local sensing, where the classical Gaussian ...
Optimizing Spectrum Sharing in Wireless Mesh Network Using Cognitive Technology
In cognitive wireless networks, spectrum owners (primary users, PUs) may lease the unused spectrum to unlicensed users (secondary users, SUs). This spectrum is used to establish a secondary network that serves real time connections. The size of leased ...
Extracting Narrow-Band Signal from a Chaotic Background with LLVCR
In this paper, the problem of extracting a narrow-band signal in strong chaotic background is considered. A method which in simulation can extract narrow-band signal well is put forward. The proposed method is a mixed model which combines the local ...
Collaborative Synchronization Mechanism in Wireless Multimedia Sensor Networks
The synchronization problem of the wireless transmission in real-time visual surveillance applications was addressed. The distributed architecture of wireless multimedia sensor networks was adopted to obtain the key frames from multi-views synchronously,...
Enhance the Performance of EDCA Protocol by Adapting Contention Window
The real-time application is the main challenge that faces the wireless network. It must achieve the quality of service (QOS) requirements to success. IEEE802.11 standards use Enhanced Distributed Channel Access (EDCA) protocol and Distributed ...
An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey
Mobile gadgets today are swaggering computing potential and memory at par or at times even higher to that found in desktop personal computers. A wireless interconnection has turned out to be considerably more readily accessible these days. As ...
Augmented RAN with SDN Orchestration of Multi-tenant Base Stations
Network virtualization (NV) has been successfully applied in wired networks, providing abstraction of the networking equipment and simplifying the network/resource management procedures. However, more light needs to be shed on how the emerging NV ...
ACO and PSO Algorithms for Developing a New Communication Model for VANET Applications in Smart Cities
Traffic congestion is a major mobility problem, which generates enormous economic resources and causes serious problems for the most dense of cities. Intelligent transportation systems based on vehicular ad-doc network (VANET) communications will ...
1D-Bernoulli Chaos Sequences Based Collaborative-CDMA: A Novel Secure High Capacity CDMA Scheme
Collaborative multi-user transmission and detection is a contemporary technique used for the up-link of code-division multiple access (CDMA). CDMA has contributed much to the field of wireless communication and still addresses many of the capacity and ...
In-Network Data Processing Based on Compressed Sensing in WSN: A Survey
Energy conservation in resource constrained wireless sensor networks (WSNs) is an important concern. Techniques such as, energy conserving MAC protocols have been proved to be efficient to minimize the energy consumption in such networks. However, ...
Robust Power Control for OFDM-Based Cognitive Radio Networks with QoS Guarantee
Traditional power control schemes in Orthogonal Frequency Division Multiplexing based Cognitive Radio Networks (CRNs) are achieved under perfect channel state information (e.g., exact parameter information). Due to the effect of channel estimation ...
Domain Decomposition Based PIC Detectors for Massive MIMO
In this work, we investigate the use of domain decomposition techniques in developing novel block-wise PIC detectors for communication systems. Specifically, we consider the cancellation of inter-antenna-interference in the uplink of massive MIMO ...
Novel Algorithm for Tracking LEO Satellites Using Doppler Frequency Shift Technique
Communication between satellite and ground station requires the antenna to be directly towards satellite for telemetery and telecommand data exchange. Hence, role of satellite tracking is clear. There are various techniques for satellite tracking. In ...
A Combinatorial Key Predistribution Scheme for Two-Layer Hierarchical Wireless Sensor Networks
Because of comprehensive and simple structures, various types of combinatorial designs are used to construct key predistribution schemes for wireless sensor networks. However, these schemes are typically concentrated on networks, where all sensor nodes ...
Design and Analysis of an OFDM-Based Short Reference Quadrature Chaos Shift Keying Communication System
In this paper, a new non-coherent chaos-based digital communication system combined short reference Quadrature chaos shift keying with orthogonal frequency division multiplexing named (OFDM-SRQCSK) is presented. This system is an extension of short ...
Evaluation of Electromagnetic Interference in Wireless Broadband Systems
Nowadays, the electromagnetic compatibility in radio frequency communication systems attracts a great attention as the wireless spectrum becomes overcrowded. A lot of wireless systems operate in the same bands or in the adjacent frequency ones. This ...
An Improved Weighted K-Nearest Neighbor Algorithm for Indoor Positioning
The weighted K-nearest neighbor algorithm (WKNN) is widely used in indoor positioning based on Wi-Fi. However, the accuracy of this traditional algorithm using Euclidean distance is not high enough due to the ignorance of statistical regularities from ...