无线互联科技最新文献

筛选
英文 中文
Cyclostationary analysis method of spectrum sensing for Cognitive radio 认知无线电频谱感知的循环平稳分析方法
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940821
V. Prithiviraj, B. Sarankumar, A. Kalaiyarasan, P. Chandru, Nirbhow Jap Singh
{"title":"Cyclostationary analysis method of spectrum sensing for Cognitive radio","authors":"V. Prithiviraj, B. Sarankumar, A. Kalaiyarasan, P. Chandru, Nirbhow Jap Singh","doi":"10.1109/WIRELESSVITAE.2011.5940821","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940821","url":null,"abstract":"The most challenging problem in Cognitive radio is the detection of unused frequency bands and exploit them opportunistically for spectrum access. Cognitive radios must be able to efficiently detect the primary users even in low signal-to-noise ratio (SNR) condition and in fading environments. These difficulties can be overcome by exploiting the cyclostationary signatures exhibited by communications signal. Cyclostationary signatures are embedded in the physical properties of communications signal and they can be used to distinguish between the primary user and secondary user. In this paper, we investigate the problem of detecting vacant spectral bands using cyclostationary feature extraction method. Approaches for the detection of cyclostationary signatures are outlined and the simulation results are presented.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78133697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
An analysis, design and precautionary measure for mobile phone accidents while driving and cost-effective fatalities 分析,设计和预防措施的移动电话事故,而驾驶和成本效益的死亡
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940810
H. Shabeer, R. Banu
{"title":"An analysis, design and precautionary measure for mobile phone accidents while driving and cost-effective fatalities","authors":"H. Shabeer, R. Banu","doi":"10.1109/WIRELESSVITAE.2011.5940810","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940810","url":null,"abstract":"Usage of cell phone is increasing worldwide in recent years, with more than 652 million Subscribers in India one step behind China as of July 2010 [17]. At the same time if we consider the risk associated with usage of mobile phone while driving, India is way ahead of china. According to World Health Organization (WHO) in its first ever Global Status Report on Road Safety says, India has recorded maximum number of road accidents in the planet [16]. According to Indian National Crime Records Bureau at least 14 people dies every hour in road accidents. Various Statistics also reveal that a large portion of road accidents in India is caused due to mobile phone usage while driving. Although various measures and rules placed on mobile phone usage, still it's highly impractical to prevent this type of events. In order to overcome this serious issue, we developed an application which helps in reducing the number of mobile accident considerably and we further extend our research, by comparing the obtained results after installing this application with recent study of US National Safety Council, conducted on 2010 and we also shown how far this application helps in reducing economic losses in India.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79979990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the use of aerospace technologies to design a solar thermodynamic system for hydrogen production 利用航空航天技术设计了一种太阳能热力制氢系统
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940813
C. Stallo, M. De Sanctis, M. Ruggieri
{"title":"On the use of aerospace technologies to design a solar thermodynamic system for hydrogen production","authors":"C. Stallo, M. De Sanctis, M. Ruggieri","doi":"10.1109/WIRELESSVITAE.2011.5940813","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940813","url":null,"abstract":"There are a lot of advantages offered by the use of renewable energy in terms of minimal environmental impact compared to fossil fuels, lower costs and its great role for ensuring the sustainability of human life on planet Earth. Among all sources of renewable energy, solar energy is by far most abundant. One of the most interesting applications of this renewable source could be represented by its use for favoring the thermal dissociation of water and hence the production of hydrogen. Finally, this could be employed for example as green fuel for cars in place of fossil ones. The work focuses on possible technologies able to exploit solar energy for the dissociation of water and the production of hydrogen. The basic idea is to combine a support structure capable of achieving very high temperatures when heated by concentrated solar radiation to carry out the water decomposition via a two-step process using metal oxide redox systems. The whole process (water splitting and regeneration of the metal oxide) could be carried out in a single energy solar converter. In this scenario, the use of technologies well established and already applied to antenna subsystems design for aerospace missions would be useful in order to develop a system which is able to reach very high temperatures exploiting the solar source.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85875905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of social based mobility models for ad hoc networks 自组织网络中基于社会的移动模型的调查
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940826
Basak Oztas, Tolga Kurt, E. Anarim
{"title":"A survey of social based mobility models for ad hoc networks","authors":"Basak Oztas, Tolga Kurt, E. Anarim","doi":"10.1109/WIRELESSVITAE.2011.5940826","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940826","url":null,"abstract":"The main step of the simulation, which is modeling, should be carried out carefully to produce results which fit best to real life scenarios. One of the main parts of simulations is modeling the mobility of objects. Mobile wireless nodes represent wireless devices carried by humans in most of the cases, hence the mobility pattern strongly depends on human movements which are influenced by human decisions and social behaviors. Social based mobility modeling can be considered as the application of social network theory on the field of mobility modeling. This study aims to present a structured view of the previous work on this field and to state the open issues to steer any future work.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89223560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of secure fast roaming techniques with coexistence of 802.1x 802.1x共存的安全快速漫游技术分析
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940828
S. Laxmaiah, T. Madhu, K. Kishore
{"title":"Analysis of secure fast roaming techniques with coexistence of 802.1x","authors":"S. Laxmaiah, T. Madhu, K. Kishore","doi":"10.1109/WIRELESSVITAE.2011.5940828","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940828","url":null,"abstract":"802.11i defines the Robust Security Network Association (RSNA) establishment procedure to provide strong mutual authentications and generate fresh Transient keys (TKs) for the data confidentiality protocols. 802.11i RSNA establishment procedure consists of 802.1X, which provides high security by using dynamic Authentication and Key Management. It introduces latency due to the addition of extra messages thereby increasing the roam time. Long delays during roaming will affect the applications like Voice over IP over Wireless Local Area Network (VoWLAN) and streaming video and further will have serious impact on seamless handovers in wireless LANs. To overcome this issue, key caching techniques such as Cisco's Centralized Key Management (CCKM) and Opportunistic Key Caching (OKC) are introduced. Further with these techniques, roam time taken by the wireless clients can also be reduced.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88515910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A farewell to trust: An approach to confidentiality control in the Cloud 告别信任:云中的机密性控制方法
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940844
M. Jaatun, Åsmund Ahlmann Nyre, S. Alapnes, Gansen Zhao
{"title":"A farewell to trust: An approach to confidentiality control in the Cloud","authors":"M. Jaatun, Åsmund Ahlmann Nyre, S. Alapnes, Gansen Zhao","doi":"10.1109/WIRELESSVITAE.2011.5940844","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940844","url":null,"abstract":"This paper applies a divide-and-conquer approach to achieve confidentiality control in Cloud Computing. We sketch how a Redundant Array of Independent Net-storages (RAIN) for Cloud Computing can be designed using techniques originally intended for other purposes. The RAIN approach splits data into segments and distributes segments onto multiple providers. By keeping the relationships between the distributed segments private, the original data cannot be re-assembled. Further, with each segment small enough, each segment discloses no meaningful information to others. Hence RAIN is able to ensure the confidentiality of data stored on clouds.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87046309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Green communications and positioning by integration of adaptive and distributed beam-forming technologies in cognitive radio systems 在认知无线电系统中集成自适应和分布式波束形成技术的绿色通信和定位
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940897
X. Lian, H. Nikookar, L. Ligthart
{"title":"Green communications and positioning by integration of adaptive and distributed beam-forming technologies in cognitive radio systems","authors":"X. Lian, H. Nikookar, L. Ligthart","doi":"10.1109/WIRELESSVITAE.2011.5940897","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940897","url":null,"abstract":"Cognitive radio (CR) concepts were introduced by J. Mitola in 1999/2000. It is an approach with high potential to allow most-intensive usage of the precious natural source spectrum. CR is capable of sensing the communication environments and of adapting to its environment by adjusting the radio parameters. With beam-forming techniques, CR can direct its main beam towards CR users while creating nulls to licensed users (LU's) in up-link in order to share the same spectrum with LU's without disturbing them. Adaptive beam-forming (AB) techniques are used for interference reduction by null broadening (NB) of the beam patterns of a CR base station in down-link operations. In this way by steering those NB angular sectors towards selected regions the LU's will experience less interference. Distributed Beam-forming (DB) is a new concept to form beams by distributed wireless sensors in order to transmit signals over a long distance with less transmit power. At IRCTR of Delft University cognitive radio concepts receive broad attention in the Radio Advanced Technology and Systems (RATS) program. Several MSc's and PhD's participate in this program. In this invited paper the latest IRCTR results on AB and DB are overviewed. Furthermore, our Intelligent-WiMAX (I-WiMAX) initiative is summarized with some focus on adaptive OFDM and on applications for green communications and positioning.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87403602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Label-free detection of biomolecular interaction — DNA — Antimicrobial peptide binding 生物分子相互作用- DNA -抗菌肽结合的无标记检测
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940906
P. Fojan, K. R. Jensen, L. Gurevich
{"title":"Label-free detection of biomolecular interaction — DNA — Antimicrobial peptide binding","authors":"P. Fojan, K. R. Jensen, L. Gurevich","doi":"10.1109/WIRELESSVITAE.2011.5940906","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940906","url":null,"abstract":"Interest to biosensors employing surface or localized plamons is rapidly growing both in research and clinical application. Plasmon-based sensors offer extremely high sensitivity, only second to the optical detection techniques involving fluorescent labeling, but without the necessity to label the molecule. In particular, surface plasmon resonance (SPR) sensors have been already demonstrated suitable for food-safety control, label-free screening for various disease markers in bodily fluids, as well as for real-time continuous monitoring of drug levels in intensive care environment. We envisage such sensors to be integrated into wireless communication infrastructure for e-health and environmental monitoring applications. One of the important threats in hospital environment is multi-resistant organisms that are not affected by common antibiotics. The growth of multi-resistant infections spurred an interest in Antimicrobial peptides that are active against broad range of infections including bacteria, fungi and viruses and were shown to be capable of treating multi-resistant infection either alone or in combination with the conventional antibiotics. In this paper, we demonstrate an application of plasmon based biosensors to the study of the interaction of Antimicrobial peptide IL4 and DNA. Our results indicate high affinity binding between IL4 and DNA thereby preventing DNA replication and eventually killing the affected cell. We speculate that this is common for a large class of Antimicrobial peptides and can be a key point explaining their broad range of activity against various pathogens.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82526218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A simulation analysis of flooding attack in MANET using NS-3 基于NS-3的MANET洪水攻击仿真分析
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940916
A. Bandyopadhyay, Satyanarayana Vuppala, Prasenjit Choudhury
{"title":"A simulation analysis of flooding attack in MANET using NS-3","authors":"A. Bandyopadhyay, Satyanarayana Vuppala, Prasenjit Choudhury","doi":"10.1109/WIRELESSVITAE.2011.5940916","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940916","url":null,"abstract":"Mobile Ad hoc Network (MANET) is set up with a group of mobile wireless nodes and is devoid of any dedicated routers or base stations. The wireless nodes move around freely and mutually cooperate with each other in routing and forwarding packets without the support of any fixed infrastructure or centralized administration. The topology is highly dynamic, making the routing procedure more difficult and insecure. The wireless nodes of MANET are thus susceptible to compromise and are particularly vulnerable to denial of service (DoS) attacks launched by malicious nodes or intruders. Flooding attack is one such type of DoS attack, in which a compromised node floods the entire network by sending a large number of fake RREQs to nonexistent nodes in the network, thus resulting in network congestion. In this paper, the security of MANET AODV routing protocol is investigated by identifying the impact of flooding attack on it. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented. The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement — all increases, thus degrading the performance of MANET significantly.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79989688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Using self organizing map in wireless sensor network for designing energy efficient topologies 基于自组织映射的无线传感器网络节能拓扑设计
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940819
Chiranjib Patra, M. Chattopadhyay, Parama Bhaumik, A. G. Roy
{"title":"Using self organizing map in wireless sensor network for designing energy efficient topologies","authors":"Chiranjib Patra, M. Chattopadhyay, Parama Bhaumik, A. G. Roy","doi":"10.1109/WIRELESSVITAE.2011.5940819","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940819","url":null,"abstract":"There are many challenges involving WSN design such as the energy resources optimization, the robustness and the network coverage. We address here the problem of energy-efficient topology design. A well designed dynamic topology and efficient routing algorithms may allow a large reduction on the energy consumption. As such type of network, the sensors are connected in an ad-hoc manner, without any deterministic way. This paper is concerned with applying standard routing protocols into wireless sensor network by using topology modified by Neural Network which proves to be energy efficient as compared with unmodified topology. Neural Network has been proved to be a powerful tool in the distributed environment. Here, to capture the true distributed nature of the Wireless Sensor Network (WSN), neural network's Self organizing Feature Map (SOFM) is used.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90291951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信