The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, a relay-selection scheme is proposed for underlay cognitive radio networks, with fixed and adaptive relaying power. The relay-selection and power allocation is based on the calculation of the log-likelihood ratio (LLR) value, calculated at each of the relay nodes available in the secondary network. No interference is caused to the primary network, through the satisfaction of a low power...
In this paper, two methods to improve the secrecy of cooperative transmissions using unshared jamming are investigated in which only the source and destination nodes know the jamming signals. The jamming signals are based on unique cipher keys obtained on the high layers. In the first proposed method (SJ protocol), a source combines its secrecy signal with its jamming signal using the power allocation...
The flexible spin-lock model (FSLM) unifies suspension-based and spin-based resource sharing protocols for partitioned fixed-priority preemptive scheduling based real-time multiprocessor platforms. Recent work has been done in defining the protocol for FSLM and providing a schedulability analysis without accounting for the implementation overheads. In this paper, we extend the analysis for FSLM with...
Prof. Edward Crawley has stated what an architecture is through the so-called FCF paradigm: "Architecture [..] consists of: Function, related by Concept, to Form". This definition has the merit to be simple, operative and applicable to all kind of engineered systems. However, by reviewing it thoroughly, we may expose some limitation, especially when trying to set-up a framework for architecture...
In order to succeed in updating ECU program without specific downloader, this paper designed and developed a Bootloader based on CCP protocol, which has the advantages of high flexibility, good portability. This system uses three steps– import of Bootloader, operation of the Bootloader and import of new ECU program–to realize online program upgrade for freescale chip MC9S12P64. Finally, this thesis...
This paper considers a fast fading wireless powered wiretap channel, where an energy constrained information source, powered by a dedicated power beacon, sends a secret message to a legitimate user using the artificial noise (AN) scheme in the presence of a passive eavesdropper. Based on a two-phase time division protocol, the ergodic secrecy throughput is derived. Furthermore, the optimal time-switching...
Polar codes has a better bit error rate (BER) performance than low-density parity-check (LDPC) and turbo codes with lower coding and decoding complexity. The polar-coded cooperation can provide significant enhancement of data rate and link reliability. However, simply binary coded cooperation cannot meet the requirements of spectral efficiency. In order to improve the spectral efficiency, this paper...
It is a hot topic to make full use of channel resources in the case of limited hardware resources on the Internet. Channel allocation in multi-interface multi-channel nodes can effectively solve the problem. Extending the single-interface single-channel OLSR protocol to multi-interface multi-channel OLSR protocol and distributed channel negotiation on multiinterface multi-channel OLSR protocol can...
We investigate a formal characterisation of interactional justice asa mechanism for self-organisation of institutional rules in an open system, in order to address issues of congruence, acceptability and risk. The process of interactional justice uses opinion formation over a social network with respect to a shared set of congruent values, to transform a set of individual, subjective self-assessments...
Over the past few years, Mobile Ad hoc net-works(MANETs) have gained importance in mission critical environments. Software defined radios(SDRs) have provided MANETs a platform for using Narrowband networking wave-form(NBNW) for concurrent voice and data transmissions. Traditional TDMA MAC protocols are not appropriate for such applications. In this paper we have proposed a distributed TDMA slot assignment...
In this paper we consider a spin-based multi-processor locking protocol, named the Multiprocessor resource sharing Protocol (MrsP). MrsP adopts a helping-mechanism where the preempted resource holder can migrate. The original schedulability analysis of MrsP carries considerable pessimism as it has been developed assuming limited knowledge of the resource usage for each remote task. In this paper new...
Support for exclusive access to shared (global) resources is instrumental in the context of embedded real-time multi-core systems, and mechanisms for achieving such access must be deterministic and efficient. There exist two traditional approaches for multiprocessors when a task requests a global resource that is locked by a task on a remote core: a spin-based approach, i.e. non-preemptive busy waiting...
Recently, cooperative communication has been used as a cost effective alternative to traditional MIMO systems. Even though cooperative relaying at the physical and/or MAC layer improves the performance of the network, it increases the level of interference in a multihop wireless network. In a multihop wireless adhoc network, the amount of interference created can be reduced by using power control...
Spectrum auction, as an ideal solution for the dynamic channel allocation problem, has become a research hotspot in recent years. Nevertheless, many spectrum auction schemes only focus on economic issues. They lack either a formal security guarantee of bidder privacy or certain auction properties, which may dampen potential bidders’ enthusiasm. In this paper, we first point out that a recent...
The Abstraction and Control of Traffic Engineered Networks (ACTN) defines the requirements, use cases, and an SDN-based architecture, relying on the concepts of network and service abstraction, detaching the network and service control from the underlying data plane. The architecture encompasses Physical Network Controllers (PNCs), responsible for specific technology and administrative domains, orchestrated...
Non-orthogonal multiple access (NOMA) is a promising multiple access technique for future wireless communications as it results in high spectral efciency. In this paper, we study a NOMA based dual-hop X-relay system, where a decode-and- forward relay assists the communication between the sources and the destinations. We assume that the statistical channel state information is known to the network...
Interference forwarding by a relay enhances the interference level and enables the cancellation of the interference. If the interfering source to relay link is not strong, then the relay can decode a part of the interference and forward it to the destination, and the destination can cancel only that part of the interference. It is known as partial decode-and-forward (PDF) and partial interference...
In this paper, we consider a cooperative wireless network involving two transceiver nodes whose communication is assisted by energy-constrained two-way amplify-and-forward (AF) relay nodes. The transceiver nodes can simultaneously transmit information and energy, and the relay nodes harvest the energy from the received signal and use the harvested energy to amplify and retransmit the received signal...
This paper proposes a traffic flow control system at intersections for Internet of Vehicles by combining ideas from process scheduling in Operating Systems with a ticket mechanism. The paper models an intersection as a network of mutual exclusive resources and the vehicle flows as processes that access the resources. Two graph models: Flow Intersection Network and Flow Resource Allocation Network...
We study the degraded Gaussian multiple access wiretap channel with selfish transmitters, i.e., they are each solely interested in maximizing their individual secrecy rate. The question then arises as to whether selfish transmitters can increase their individual secrecy rate by participating in a collective, i.e, multiple access, protocol instead of operating on their own. If yes, the question arises...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.