Search
Now showing items 471-480 of 1032
Power control and group proportional fairness for frequency domain resource allocation in L-SC-FDMA based LTE uplink
(
Kluwer Academic Publishers
, 2015 , Article)
Resource allocation in Long Term Evaluation (LTE) uplink is challenging because of two reasons: (1) it requires contiguous resource block allocation and (2) high complexity due to per user based power allocation among ...
The inapproximability of illuminating polygons by α-floodlights
(
Queen's University, Ontario, Canada
, 2015 , Conference Paper)
We consider variants of the art gallery problem where guard visibility is limited to a certain angular aperture-. We show that the problem is NP-hard even when guards can be located in the interior of the polygon. We then ...
Ambient Intelligence - Software and Applications: 6th International Symposium on Ambient Intelligence (ISAmI 2015)
(
Springer Verlag
, 2015 , Conference Paper)
[No abstract available]
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Estimating the number of sources: An efficient maximization approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that ...
Secret key generation based on AoA estimation for low SNR conditions
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
On spectrum sharing between energy harvesting cognitive radio users and primary users
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests ...
Optimum power and rate allocation in cluster based video sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In a wireless video sensor network (WVSN), each video sensor node consumes a significant amount of power on video compression in addition to the required power for communication. Therefore, the power optimization is a more ...
Buffer-aided relaying improves both throughput and end-to-end delay
(
Springer International Publishing
, 2015 , Article)
Buffer-aided relaying has recently attracted a lot of attention due to the improvement in the system throughput. However, a side effect usually deemed is that buffering at relay nodes results in the increase of packet ...