无线互联科技最新文献

筛选
英文 中文
A novel security scheme for wireless adhoc network 一种新的无线自组网安全方案
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940856
Abhijit Das, S. Basu, A. Chaudhuri
{"title":"A novel security scheme for wireless adhoc network","authors":"Abhijit Das, S. Basu, A. Chaudhuri","doi":"10.1109/WIRELESSVITAE.2011.5940856","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940856","url":null,"abstract":"Wireless adhoc network is autonomous, infrastructure less and may be mobile depending on its type of application. Secure transmission of information in wireless adhoc environment is an important concern. In this paper we propose to use shared cryptography to secure message communication in adhoc network. In this approach we divide any information into multiple shares and transmit the different shares via multiple disjoint paths between any pair of communicating nodes and if possible at different point of time. At the receiving end the original information is reconstructed by combining the shares received via different paths at different point of time. We have also proposed to keep redundancy in the number of shares to withstand loss of some shares due to loss in transmission or security attacks. Compared to other available schemes, it has minimal computational complexity. That makes it more effective in energy saving distributed environment where battery driven low end processors are used and security is also a major challenge.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"68 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73413209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Service continuity support in self-organizing IMS networks 自组织IMS网络中的服务连续性支持
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940890
C. Makaya, A. Dutta, S. Das, D. Chee, F. Lin, S. Komorita, H. Yokota, H. Schulzrinne
{"title":"Service continuity support in self-organizing IMS networks","authors":"C. Makaya, A. Dutta, S. Das, D. Chee, F. Lin, S. Komorita, H. Yokota, H. Schulzrinne","doi":"10.1109/WIRELESSVITAE.2011.5940890","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940890","url":null,"abstract":"With the increasing interest in deploying 4G/LTE networks, IMS has a potential to be deployed in a wide scale in order to support mobile Internet and value-added services over next-generation networks. Moreover, the effort to create an operator-controlled signaling infrastructure using IP-based protocols has resulted in a large number of functional components and interactions between core networks elements. Thus, the carriers are trying to explore alternative ways to deploy IMS that will allow them to manage their network in a cost effective manner while offering rich communications services. One of such approaches is self-organization of IMS (SOIMS). The self-organizing IMS can enable the IMS functional components to adapt dynamically based on the features like network load, number of users, node failures and available system resources. This paper proposes different mechanisms to handle self-organizing IMS with usage of load balancing paradigm. The proposed solution enables topology hiding, IMS nodes failure recovery, session continuity support, and IMS scalability.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"38 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79102205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Steg-OFDM blend for highly secure multi-user communication 用于高度安全的多用户通信的Steg-OFDM混合
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940918
PadmaPriya Praveen Kumar, Rengarajan Amirtharajan, K. Thenmozhi, J. Rayappan
{"title":"Steg-OFDM blend for highly secure multi-user communication","authors":"PadmaPriya Praveen Kumar, Rengarajan Amirtharajan, K. Thenmozhi, J. Rayappan","doi":"10.1109/WIRELESSVITAE.2011.5940918","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940918","url":null,"abstract":"Gone are the days when machines were the world's \"prime movers\". Today, the \"prime mover\" of the world is information, particularly, secret information. It is also a commodity whose value perishes with time. This dual-quality of power and perish-ability makes information to be the wealth, most difficult to protect on the earth. Nevertheless, in order to protect the secret information, technology has given us methods which provide security, though not a fool-proof one. Steganography is one such method which incorporates security by hiding the very existence of the secret by camouflaging it inside an image. In addition to the enormous security provided by the steganographic algorithms, if we implement some security in the very methodology of transmission and reception of an image, it would prove to be an useful venture. Such an useful venture is proposed in this paper, where four different users can transmit secret messages through a single stego image by taking advantage of the OFDM-QPSK(Orthogonal Frequency Division Multiplexing-Quadrature Phase Shift Keying) duo, thereby imparting multiple-access and improving security in an otherwise normal stego image. Comparison of BER in AWGN and Random Noise channel has also been done in order to quantify the effectiveness of the proposed technique.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82808789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
High altitude platform system(HAPS) and co-existence with fixed satellite service(FSS) in frequency range 5850–7075 MHz 高空平台系统(HAPS)和在5850-7075 MHz频率范围内与固定卫星业务(FSS)共存
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940833
Masoud Mohebbi Nia, T. Rahman
{"title":"High altitude platform system(HAPS) and co-existence with fixed satellite service(FSS) in frequency range 5850–7075 MHz","authors":"Masoud Mohebbi Nia, T. Rahman","doi":"10.1109/WIRELESSVITAE.2011.5940833","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940833","url":null,"abstract":"HAPS has cropped up as a neoteric technology in the wireless communications field in recent years. The straightforwardness with which HAPS gets along with a telephone network service provider or the Internet, has made it to a unique feature of future wireless networks. Most HAPS' criteria have been well circumscribed by the International Telecommunication Union (ITU) or subscribed to in World Radiocommunication Conferences (WRCs). This procedure will prolong to function the various frequency ranges in future, most notably in WRC-12. To curb and clarify assessment probe, it should be explicated that FSS links are sited in C-Band frequency range to condense overwhelming conceivable propagation attenuation attributable to disproportionate rain amount in tropical and subtropical regions. Consequently, FSS uplink is ranged between 5925 and 6725 MHz. Where as, HAPS gateway links' frequency range is delineated between 5850 and 7075 MHz. Hence, FSS uplink intervenes with HAPS frequency range partially. Accordingly, HAPS spectrum sharing with FSS uplink in the Frequency range 5850–7075 MHz is appraised at this juncture. HAPS spectrum implementing in alluded frequency range instigates interference renowned as Co-Channel Interference (CCI). CCI reckoning is based upon Spectrum Emission Masks (SEM), Antennas' Radiation Pattern and Clutter Loss. The co-channel frequency deployment prospects are delved at this article.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"16 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78675787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Nonlinear suppression scheme employing transmit power control for MIMO-OFDM systems 基于发射功率控制的MIMO-OFDM系统非线性抑制方案
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940929
Takuto Arai, Yunhan Wang, N. Kamiya, F. Maehara
{"title":"Nonlinear suppression scheme employing transmit power control for MIMO-OFDM systems","authors":"Takuto Arai, Yunhan Wang, N. Kamiya, F. Maehara","doi":"10.1109/WIRELESSVITAE.2011.5940929","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940929","url":null,"abstract":"This paper proposes a deterministic nonlinear distortion suppression scheme employing transmit power control for MIMO-OFDM systems. The feature of the proposed scheme is to suppress the nonlinear distortion by adjusting the transmit power level of each transmit antenna to be the maximum signal-to-noise-plus-distortion ratio (SNDR) and to perform MIMO signal detection using the appropriate transmit power levels notified to the receiver. In the proposed scheme, since the transmit power tends to be lowered to satisfy the maximum theoretical SNDR, the transmit power as well as the bit error rate (BER) can be fortunately reduced in comparison with the traditional constant power transmission scheme, which consequently leads to alleviating the out-of-band radiation. The effectiveness of the proposed scheme is demonstrated compared with the traditional scheme with constant transmit power by means of computer simulations.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"87 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81226331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework for energy efficiency analysis of wireless networks 无线网络能源效率分析框架
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940861
G. Auer, V. Giannini, M. Olsson, Manuel J. González, C. Desset
{"title":"Framework for energy efficiency analysis of wireless networks","authors":"G. Auer, V. Giannini, M. Olsson, Manuel J. González, C. Desset","doi":"10.1109/WIRELESSVITAE.2011.5940861","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940861","url":null,"abstract":"In order to quantify the energy savings in wireless networks, the power consumption of the entire system needs to be captured and an appropriate energy efficiency evaluation framework must be defined. In this paper, the necessary enhancements over existing performance evaluation frameworks are discussed, such that the energy efficiency of the entire network comprising component, node and network level contributions can be quantified. This includes a sophisticated power model for various base station (BS) types, which maps the RF output power radiated at the antenna elements to the total supply power of a BS site. The proposed evaluation framework is applied to quantify the energy efficiency of the downlink of a 3GPP LTE radio access network.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"17 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87293278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A novel intrusion detection algorithm for wireless sensor networks 一种新的无线传感器网络入侵检测算法
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940938
C. Rong, S. Eggen, Hongbing Cheng
{"title":"A novel intrusion detection algorithm for wireless sensor networks","authors":"C. Rong, S. Eggen, Hongbing Cheng","doi":"10.1109/WIRELESSVITAE.2011.5940938","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940938","url":null,"abstract":"Wireless sensor network (WSN) is an emerging important research area. Because WSNs in general and in nature are unattended and physically reachable from the outside world, they could be vulnerable to physical attacks in the form of node capture or node destruction. These forms of attacks are hard to protect against and require intelligent prevention methods. It is necessary for WSNs to have security measures in place as to prevent an intruder from inserting compromised nodes in order to decimate or disturb the network performance. In this paper we present an intrusion detection algorithm for wireless sensor networks which does not require prior knowledge of network behavior or a learning period in order to establish this knowledge. We have taken a more practical approach and constructed this algorithm with small to middle-size networks in mind, like home or office networks. The proposed algorithm is also dynamic in nature as to cope with new and unknown attack types. This algorithm is intended to protect the network and ensure reliable and accurate aggregated sensor readings. Theoretical simulation results indicate that compromised nodes can be detected with high accuracy and low false alarm probability.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"10 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72951574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Self-optimized radio resource management techniques for LTE-A local area deployments LTE-A区域部署的自优化无线电资源管理技术
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940928
C. Stocchi, N. Marchetti, N. Prasad
{"title":"Self-optimized radio resource management techniques for LTE-A local area deployments","authors":"C. Stocchi, N. Marchetti, N. Prasad","doi":"10.1109/WIRELESSVITAE.2011.5940928","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940928","url":null,"abstract":"One of the most promising solutions to improve the performance of wireless networks is the extensive deployment of small size cells, such as femtocells. The expected uncoordinated femtocells deployment makes the Inter-Cell Interference (ICI) management a very critical issue, since it is the most limiting factor in such a scenario, in particular for users in bad conditions. This paper presents a Flexible Spectrum Usage (FSU) algorithm for Local Area (LA) scenarios that aims at limiting the downlink ICI, so that to achieve high system performance while guaranteeing good performance also to users in worst conditions, thanks also to the use of a power control mechanism. This algorithm behaves in a self-optimized and self-configuring manner, allowing the base stations to react autonomously to changes in the surrounding environment and without the necessity of a preplanned spectrum assignment to the various cells.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"83 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76129048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Learning effectiveness of science experiments through cloud multimedia tutorials 云多媒体教学对科学实验学习效果的影响
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940887
Hsing-Wen Wang, Jin-Sian Ji, T. Dong, Chin-Mu Chen, Jung-Hsin Chang
{"title":"Learning effectiveness of science experiments through cloud multimedia tutorials","authors":"Hsing-Wen Wang, Jin-Sian Ji, T. Dong, Chin-Mu Chen, Jung-Hsin Chang","doi":"10.1109/WIRELESSVITAE.2011.5940887","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940887","url":null,"abstract":"We are witnessing today an exponential growth of internet technology at an accelerating pace. There are increasingly more and more open and free teaching and learning websites of competitively high quality. When computer labs and multimedia classrooms were limited in school, most instructors were only able to seldom take advantage of rare technology facilities, rendering insufficient effect of learning given the bulk of demands. The government of Taipei County dedicated to comprehensive computer lab updates of all junior high schools within its jurisdiction at the end of March, 2010, expediting full establishment of e-classrooms equipped with computers and projectors. The University is luckily among the beneficiaries, despite the working efficiency of old computers. In pursuit of understanding how to promote the learning approaches and strategies of distant learning, the research conductor attempts to look at the online tutorials of integrated application with information techniques in addition to traditional classrooms and labs. The author hopes to probe the learning effect of distant learning using the study and questionnaire survey on the base of the author's instructed class, accumulating practical experience of traditional learning using online learning tutorials. The conclusions of the study will be used as the foundation for future distant learning promotion and strategy planning.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"44 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80162400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Problem based learning in Indian engineering education: Drivers and challenges 印度工程教育中基于问题的学习:驱动因素与挑战
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940816
Vikas V. Shinde, A. Kolmos
{"title":"Problem based learning in Indian engineering education: Drivers and challenges","authors":"Vikas V. Shinde, A. Kolmos","doi":"10.1109/WIRELESSVITAE.2011.5940816","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940816","url":null,"abstract":"PBL as an education model in engineering education is successfully implemented worldwide. Also, since past few years the concept of PBL is progressing well in India. Main focus of this paper is to assess drivers for progress and challenges of PBL implementation for Indian engineering education based on past and ongoing research. Although, PBL has been accepted and successfully implemented at many places in a country, more re sea rch and sustainable efforts are required to make it acceptable and deep rooted in engineering education. Considering its positive re sults and recent developments in the educational sector, it is concluded that PBL has a major role to play to raise the quality of engineering education in India.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"146 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83112428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信