In an underlay cognitive two-way Amplify-and-Forward (AF) relaying network, secondary users (SUS) and primary user (PU) can share the licensed spectrum simultaneously under the interference threshold constraint. In th...
详细信息
ISBN:
(纸本)9781629939254
In an underlay cognitive two-way Amplify-and-Forward (AF) relaying network, secondary users (SUS) and primary user (PU) can share the licensed spectrum simultaneously under the interference threshold constraint. In this paper, the joint power allocation and optimal relay selection scheme is proposed for allocating radio resource on cognitive nodes effectively. For power allocation problem, the objective function is to maximize the achieved minimum Signal to Interference plus Noise Ratio (SINR) at SUS, and the constraints include the total transmit power of cognitive nodes and PU interference threshold, the optimal power allocation algorithm and a simple distributed power allocation algorithm are proposed. Furthermore, based on these results, an optimal two-way relay selection scheme is proposed. Simulation results show that the proposed joint power allocation algorithms and relay selection scheme can achieve excellent system performance.
As networks have grown in size and complexity, the existing isolated add-on security systems of internet are confronting some serious challenges. This paper outlines the background, concept, evolution and basic proper...
详细信息
As networks have grown in size and complexity, the existing isolated add-on security systems of internet are confronting some serious challenges. This paper outlines the background, concept, evolution and basic properties of the trustworthy network, and projects the future development of the network in terms of its access control, modeling of trust relationship, quantification and decisionmaking. Then put forward a strengthen TNC to fix the deficiencies.
The traditional Poisson model in the modern data networks have been ineffective and cannot reflect the real flow trend. However, since Hosking discovers the network traffic self-similarity, self-similar models have co...
详细信息
The traditional Poisson model in the modern data networks have been ineffective and cannot reflect the real flow trend. However, since Hosking discovers the network traffic self-similarity, self-similar models have continued to emerge, this article improved FARIMA model based on time compensation. We put forward a sliding FARIMA model which fixes the time delay of FARIMA model and analyzed the model's application in the anomaly detection of network.
With the exponential growth of web services, the researches on how to accurately find the trustworthy services become increasingly important. Currently, some researchers have utilized the idea of services classificati...
详细信息
作者:
Junqing ZhangRuchuan WangYisheng QianQianyi WangCollege of Computer
Nanjing University of Posts and TelecommunicationsNanjing Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of EducationChina
The main study of traditional probability coverage problem in wirelesssensornetworks(WSNs)is aiming at twodimensional space,however,most practical applications of wirelesssensornetwork is placed in a three-dimensi...
详细信息
The main study of traditional probability coverage problem in wirelesssensornetworks(WSNs)is aiming at twodimensional space,however,most practical applications of wirelesssensornetwork is placed in a three-dimensional sensor ***,probability model is introduced for three-dimensional *** paper presents a method that using Voronoi divide to control the Scheduling of the probability model nodes in the target ***,a coverage control algorithm based on probability model(PMCCA)is *** verify the effectiveness and the practice of PMCCA algorithm by comparing PMCCA algorithm to another algorithm in simulation experiment.
To bridge the gap between limited energy supplies of the sensor nodes and the system lifetime, duty-cycle wirelesssensornetworks (WSNs) with data aggregation are studied in this paper. We proposed a load-balanced an...
详细信息
With the development of web service, more and more attention has been drawn to web service in recent years. However, the damage caused by service security problems is becoming more and more serious nowadays. This pape...
详细信息
作者:
Shao, XingWang, RuchuanXu, HeHuang, HaipingSun, LijuanCollege of Computer
Nanjing University of Posts and Telecommunications Nanjing 210003 China College of Computer
Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing 210003 China
network coding has been confirmed as a potential technology to improve performance of wireless mesh networks (WMNs) and a few network coding aware routings have been proposed. However, these mechanisms detect coding o...
详细信息
network coding has been confirmed as a potential technology to improve performance of wireless mesh networks (WMNs) and a few network coding aware routings have been proposed. However, these mechanisms detect coding opportunities through local traffic pattern checking, which hardly obtains optimal routes. This paper proposes a Genetic algorithm based Coding Aware Routing (GCAR) for wireless mesh networks, which employs genetic algorithm to optimize routes and coding opportunities. In addition, the key ingredients in GCAR, e.g., chromosome representation, genetic operation of crossover and mutation, fitness function considering coding opportunity and interference, are carefully designed. Through simulations on a randomly generated wireless mesh network, GCAR is shown to find optimal routes within a short time, and achieve more improvements than the previously proposed methods on route setup time, throughput and load balancing.
wirelesssensornetworks(WSN) are mainly characterized by a potentially large number of distributed sensor nodes which collectively transmit information about sensed events to the *** this paper,we present a Distribut...
详细信息
wirelesssensornetworks(WSN) are mainly characterized by a potentially large number of distributed sensor nodes which collectively transmit information about sensed events to the *** this paper,we present a Distributed Wavelet Basis Generation(DWBG) algorithm performing at the sink to obtain the distributed wavelet basis in *** on this basis,a Wavelet Transform-based Distributed Compressed Sensing(WTDCS) algorithm is proposed to compress and reconstruct the sensed data with spatial ***,we make a detailed analysis of relationship between reconstruction performance and WTDCS algorithm parameters such as the compression ratio,the channel Signal-to-Noise Ratio(SNR),the observation noise power and the correlation decay parameter by *** simulation results show that WTDCS can achieve high performance in terms of energy and reconstruction accuracy,as compared to the conventional distributed wavelet transform algorithm.
Since the existence of characteristics of heterogeneity, limited energy, complexity and so forth, it turns into a research hot spot on the security mechanism of wirelesssensornetworks (WSN), especially the problems ...
详细信息
暂无评论