Search
Now showing items 51-60 of 223
The inapproximability of illuminating polygons by α-floodlights
(
Queen's University, Ontario, Canada
, 2015 , Conference Paper)
We consider variants of the art gallery problem where guard visibility is limited to a certain angular aperture-. We show that the problem is NP-hard even when guards can be located in the interior of the polygon. We then ...
Ambient Intelligence - Software and Applications: 6th International Symposium on Ambient Intelligence (ISAmI 2015)
(
Springer Verlag
, 2015 , Conference Paper)
[No abstract available]
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Estimating the number of sources: An efficient maximization approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that ...
Secret key generation based on AoA estimation for low SNR conditions
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
On spectrum sharing between energy harvesting cognitive radio users and primary users
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests ...
Optimum power and rate allocation in cluster based video sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In a wireless video sensor network (WVSN), each video sensor node consumes a significant amount of power on video compression in addition to the required power for communication. Therefore, the power optimization is a more ...
Interference-based optimal power-efficient access scheme for cognitive radio networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper, we propose a new optimization-based access strategy of multi-packet reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum. We devise an analytical model that ...
Solar reactor efficiency analysis for alternative fuel production via ferrite based two-step thermochemical splitting of water and CO2
(
AIChE
, 2015 , Conference Paper)
In this paper computational thermodynamic modeling of solar syngas production via ferrite based (Fe3 O4 /FeO) thermochemical H2O and/or CO2 splitting cycle. This two-step cycle involves solar thermal reduction of Fe3O4 ...