On the condition of scarce spectrum resources, the cognitive radio, as the next generation of radio technology, has incomparable superiority. Cooperative spectrum sensing cognitive radio has two kinds of systems: the ...
详细信息
ISBN:
(纸本)9781424437092
On the condition of scarce spectrum resources, the cognitive radio, as the next generation of radio technology, has incomparable superiority. Cooperative spectrum sensing cognitive radio has two kinds of systems: the centralized system and the distributed system. In this paper, we propose the centralized and the distributed spectrum sensing system models based on three users. The theoretical derivation and analysis about two models are conducted. Moreover, we simulate and compare the performance of two models. Simulation results show that when the report error probability is small, the overall performance of distributed spectrum sensing is superior to a centralized spectrum sensing, but the distributed cooperative spectrum sensing in the structure is more complex.
Current Radio-Frequency Identification (RFID) technology involves two types of physical devices: tags and reader. The reader combines in a single physical device transmission (to the tags) and reception (from the tags...
详细信息
ISBN:
(纸本)9781450301824
Current Radio-Frequency Identification (RFID) technology involves two types of physical devices: tags and reader. The reader combines in a single physical device transmission (to the tags) and reception (from the tags) functions. In this paper we discuss an alternative approach, where receive functions are performed by a separate device called "RFID listener". This allows distributed tag-sensing schemes where one transmitter coexists with multiple listeners. We discuss pros and cons of both approaches and present our implementation of a passive RFID listener on GNU Radio. Our implementation is a basis for experimenting with future distributed listener-based systems, but it can be also used as a cheap and flexible protocol analyzer for currently available commercial RFID readers.
in this paper, Spatial Correlation-based distributed Compressed Sensing (SCDCS) model and algorithm are presented in Wireless Sensor Networks (WSN), where spatial correlation and joint sparse models between the sensor...
详细信息
ISBN:
(纸本)9781424437092
in this paper, Spatial Correlation-based distributed Compressed Sensing (SCDCS) model and algorithm are presented in Wireless Sensor Networks (WSN), where spatial correlation and joint sparse models between the sensor nodes can be exploited in order to compress and reconstruct sensor observations in an energy efficient manner based on coding/decoding algorithm of SCDCS. Finally, the analysis of relationship between reconstruction error and compression ratio in SCDCS is carried out in simulation. Simulation results show that SCDCS can achieve acceptable estimation accuracy in an energy efficient way.
In this paper, we present a middleware architecture for dependable mobile systems and an experimentation platform for its evaluation. T he proposed architecture includes three building blocks tailored for mobile coope...
详细信息
ISBN:
(纸本)9781424477425
In this paper, we present a middleware architecture for dependable mobile systems and an experimentation platform for its evaluation. T he proposed architecture includes three building blocks tailored for mobile cooperative applications: a Proximity Map, a Trust and Cooperation Oracle, and a Cooperative Data Backup service. To illustrate our platform, we developed a distributed Black-box application, whose aim is to record critical data while tolerating the failure of a node, and implemented a hardware evaluation platform of mobile systems for experimenting with the application. We provide here some insights on the development of the platform, focusing on wireless communication emulation via signal attenuation.
The IEEE 802.16 standard of wireless mesh networks includes various scheduling algorithms, both centralized and distributed, to determine the proper time slot that each wireless node can transmit its data. In this pap...
详细信息
ISBN:
(纸本)9781424477425
The IEEE 802.16 standard of wireless mesh networks includes various scheduling algorithms, both centralized and distributed, to determine the proper time slot that each wireless node can transmit its data. In this paper, we introduce a new scheduling scheme to improve scalability and resource utilization in wireless mesh networks where all nodes compete to gain access to the transmission time slot. In our proposed method, the transmission time of a node is modified according to the transmission status of its neighbors, resulting in a shorter holdoff time, and consequently, reducing the transmission delay and throughput. The simulation results confirm the efficiency and performance of the proposed algorithm over the IEEE 802.16-mesh standard in terms of throughput and delay.
In this paper, we propose a new detection scheme for single carrier frequency-domain equalization (SC-FDE) for relay-assisted transmission scenario over frequency selective channels. We show that, by incorporating lin...
详细信息
ISBN:
(纸本)9781424477425
In this paper, we propose a new detection scheme for single carrier frequency-domain equalization (SC-FDE) for relay-assisted transmission scenario over frequency selective channels. We show that, by incorporating linear processing techniques, our new receiver significantly outperforms the minimum mean square error (MMSE)-distributed (D)-SC-FDE receiver in terms of the error rate performance. Simulation results and complexity analysis demonstrate that our proposed receiver outperforms the conventional cooperative MMSE-SC-FDE receiver by performing close to matched filter bound (MFB), while incurring a minimal additional computational complexity.
This paper presents an enhanced distributed power control algorithm (EDPC) for ratio frequency identification (RFID) reader aiming at the existing power control algorithm (DPC) deficiencies, such as the uncertainties ...
详细信息
ISBN:
(纸本)9781424437092
This paper presents an enhanced distributed power control algorithm (EDPC) for ratio frequency identification (RFID) reader aiming at the existing power control algorithm (DPC) deficiencies, such as the uncertainties of random backoff, difficult to set up parameters. In order to improve the reader network efficiency and reliability, the proposed EDPC algorithm properly set the reader working time slot, change the reader time-slot selecting mechanism. Simulation and experiment results show that the EDPC algorithm enlarged the reader detection range and shortened detection efficiency, enhanced the whole system performance, comparing to the DAPC and PPC algorithm.
In order to improve the scheduling efficiency of IEEE 802.16 mesh mode, exactly theoretical analysis is necessary. In the IEEE 802.16 mesh mode with distributed coordinated scheduling, all nodes are peers and multi-ho...
详细信息
ISBN:
(纸本)9781424437092
In order to improve the scheduling efficiency of IEEE 802.16 mesh mode, exactly theoretical analysis is necessary. In the IEEE 802.16 mesh mode with distributed coordinated scheduling, all nodes are peers and multi-hop communication is allowed. Every node has to compete for transmission opportunities based on scheduling information in the two-hop neighborhood. In this paper, we use probability-based method to analyze the performance of network with different topology, different holdoff time and different node degree. The analysis and numerical results show how the three factors mentioned above affect the network throughput and delay.
In this paper, we propose the PBDT, a novel secret sharing scheme which outperforms current constructions in the distributed wireless network environment. In our scheme, each participant selects his secret share respe...
详细信息
ISBN:
(纸本)9781424437092
In this paper, we propose the PBDT, a novel secret sharing scheme which outperforms current constructions in the distributed wireless network environment. In our scheme, each participant selects his secret share respectively without negotiating with a central node. One secret share can extract several messages without renewing when new participants are added or old participants are deleted. And its share verification phase allows any participant to verify its authenticity and validity. PBDT proves to be practically efficient and computationally secure to resist collision attack, especially for distributed wireless networks.
In this paper, we investigate distributed relay selection in OFDM-based cooperative wireless networks. A selective Decode-and-Forward relaying strategy is adopted, in which one relay is selected to forward the entire ...
详细信息
ISBN:
(纸本)9781424437092
In this paper, we investigate distributed relay selection in OFDM-based cooperative wireless networks. A selective Decode-and-Forward relaying strategy is adopted, in which one relay is selected to forward the entire OFDM symbol. Theoretical outage performance is analyzed and evaluated first. Then six relay selection schemes based on different selection criteria are given. The outage performance of one of the schemes coincides with the theoretical value and all the schemes need only local CSI and can thus be implemented in a distributed way. Monte Carlo simulations validate our analysis and show that significant performance gain can be obtained compared to that of direct transmission.
暂无评论