• 제목/요약/키워드: JCN

검색결과 281건 처리시간 0.016초

Maximum Likelihood and Signal-Selective TDOA Estimation for Noncircular Signals

  • Wen, Fei;Wan, Qun
    • Journal of Communications and Networks
    • /
    • 제15권3호
    • /
    • pp.245-251
    • /
    • 2013
  • This paper addresses the issue of time-difference-of-arrival (TDOA) estimation for complex noncircular signals. First, under the wide-sense stationary assumption, we derive the maximum likelihood (ML) estimator and the Cramer-Rao lower bound for Gaussian noncircular signals in Gaussian circular noise. The ML estimator uses the second-order statistics information of a noncircular signal more comprehensively when compared with the cross-correlation (CC) and the conjugate CC estimators. Further, we present a scheme to modify the traditional signal-selective TDOA methods for noncircular signals on the basis of the cyclostationarity of man-made signals. This scheme simultaneously exploits the information contained in both the cyclic cross-correlation (CCC) and the conjugate CCC of a noncircular signal.

Reference State Tracking in Distributed Leader-Following Wireless Sensor Networks with Limited Errors

  • Mou, Jinping;Wang, Jie
    • Journal of Communications and Networks
    • /
    • 제17권6호
    • /
    • pp.602-608
    • /
    • 2015
  • In this paper, the limited error tracking problem is investigated for distributed leader-following wireless sensor networks (LFWSNs), where all sensors share data by the local communications, follower sensors are influenced by leader sensors directly or indirectly, but not vice versa, all sensor nodes track a reference state that is determined by the states of all leader sensors, and tracking errors are limited. In a LFWSN, the communicating graph is mainly expressed by some complete subgraphs; if we fix subgraphs that are composed of all leaders while all nodes in complete subgraphs of followers run on the sleeping-awaking method, then the fixed leaders and varying followers topology is obtained, and the switching topology is expressed by a Markov chain. It is supposed that the measurements of all sensors are corrupted by additive noises. Accordingly, the limited error tracking protocol is proposed. Based on the theory of asymptotic boundedness in mean square, it is shown that LFWSN keeps the limited error tracking under the designed protocol.

Performance Optimization of Parallel Algorithms

  • Hudik, Martin;Hodon, Michal
    • Journal of Communications and Networks
    • /
    • 제16권4호
    • /
    • pp.436-446
    • /
    • 2014
  • The high intensity of research and modeling in fields of mathematics, physics, biology and chemistry requires new computing resources. For the big computational complexity of such tasks computing time is large and costly. The most efficient way to increase efficiency is to adopt parallel principles. Purpose of this paper is to present the issue of parallel computing with emphasis on the analysis of parallel systems, the impact of communication delays on their efficiency and on overall execution time. Paper focuses is on finite algorithms for solving systems of linear equations, namely the matrix manipulation (Gauss elimination method, GEM). Algorithms are designed for architectures with shared memory (open multiprocessing, openMP), distributed-memory (message passing interface, MPI) and for their combination (MPI + openMP). The properties of the algorithms were analytically determined and they were experimentally verified. The conclusions are drawn for theory and practice.

Distributed Database Design using Evolutionary Algorithms

  • Tosun, Umut
    • Journal of Communications and Networks
    • /
    • 제16권4호
    • /
    • pp.430-435
    • /
    • 2014
  • The performance of a distributed database system depends particularly on the site-allocation of the fragments. Queries access different fragments among the sites, and an originating site exists for each query. A data allocation algorithm should distribute the fragments to minimize the transfer and settlement costs of executing the query plans. The primary cost for a data allocation algorithm is the cost of the data transmission across the network. The data allocation problem in a distributed database is NP-complete, and scalable evolutionary algorithms were developed to minimize the execution costs of the query plans. In this paper, quadratic assignment problem heuristics were designed and implemented for the data allocation problem. The proposed algorithms find near-optimal solutions for the data allocation problem. In addition to the fast ant colony, robust tabu search, and genetic algorithm solutions to this problem, we propose a fast and scalable hybrid genetic multi-start tabu search algorithm that outperforms the other well-known heuristics in terms of execution time and solution quality.

The TOR Data Communication System

  • Haraty, Ramzi A.;Zantout, Bassam
    • Journal of Communications and Networks
    • /
    • 제16권4호
    • /
    • pp.415-420
    • /
    • 2014
  • Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity - the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.

Clustering and Communications Scheduling in WSNs using Mixed Integer Linear Programming

  • Avril, Francois;Bernard, Thibault;Bui, Alain;Sohier, Devan
    • Journal of Communications and Networks
    • /
    • 제16권4호
    • /
    • pp.421-429
    • /
    • 2014
  • We consider the problem of scheduling communications in wireless sensor networks (WSNs) to ensure battery preservation through the use of the sleeping mode of sensors.We propose a communication protocol for 1-hop WSNs and extend it to multi-hop WSNs through the use of a 1-hop clustering algorithm.We propose to schedule communications in each cluster in a virtual communication ring so as to avoid collisions. Since clusters are cliques, only one sensor can speak or listen in a cluster at a time, and all sensors need to speak in each of their clusters at least once to realize the communication protocol. We model this situation as a mathematical program.

Formal Modeling and Verification of an Enhanced Variant of the IEEE 802.11 CSMA/CA Protocol

  • Hammal, Youcef;Ben-Othman, Jalel;Mokdad, Lynda;Abdelli, Abdelkrim
    • Journal of Communications and Networks
    • /
    • 제16권4호
    • /
    • pp.385-396
    • /
    • 2014
  • In this paper, we present a formal method for modeling and checking an enhanced version of the carrier sense multiple access with collision avoidance protocol related to the IEEE 802.11 MAC layer, which has been proposed as the standard protocol for wireless local area networks. We deal mainly with the distributed coordination function (DCF) procedure of this protocol throughout a sequence of transformation steps. First, we use the unified modeling language state machines to thoroughly capture the behavior of wireless stations implementing a DCF, and then translate them into the input language of the UPPAAL model checking tool, which is a network of communicating timed automata. Finally, we proceed by checking of some of the safety and liveness properties, such as deadlock-freedom, using this tool.

ID-based Sensor Node Authentication for Multi-Layer Sensor Networks

  • Sung, Soonhwa;Ryou, Jaecheol
    • Journal of Communications and Networks
    • /
    • 제16권4호
    • /
    • pp.363-370
    • /
    • 2014
  • Despite several years of intense research, the security and cryptography in wireless sensor networks still have a number of ongoing problems. This paper describes how identification (ID)-based node authentication can be used to solve the key agreement problem in a three-layer interaction. The scheme uses a novel security mechanism that considers the characteristics, architecture, and vulnerability of the sensors, and provides an ID-based node authentication that does not require expensive certificates. The scheme describes the routing process using a simple ID suitable for low power and ID exposure, and proposes an ID-based node authentication. This method achieves low-cost communications with an efficient protocol. Results from this study demonstrates that it improves routing performance under different node densities, and reduces the computational cost of key encryption and decryption.

A Label Graph Based Verifiable Secret Sharing Scheme for General Access Structures

  • Hsu, Ching-Fang;Zeng, Bing;Cheng, Qi
    • Journal of Communications and Networks
    • /
    • 제15권4호
    • /
    • pp.407-410
    • /
    • 2013
  • Secret sharing is that a dealer distributes a piece of information (called a share) about a secret to each participant such that authorized subsets of participants can reconstruct the secret but unauthorized subsets of participants cannot determine the secret. In this paper, an access structure can be represented by a label graph G, where a vertex denotes a participant and a complete subgraph of G corresponds to a minimal authorized subset. The vertices of G are labeled into distinct vectors uniquely determined by the maximum prohibited structure. Based on such a label graph, a verifiable secret sharing scheme realizing general access structures is proposed. A major advantage of this scheme is that it applies to any access structure, rather than only structures representable as previous graphs, i.e., the access structures of rank two. Furthermore, verifiability of the proposed scheme can resist possible internal attack performed by malicious participants, who want to obtain additional shares or provide a fake share to other participants.

Before/After Precoding Massive MIMO Systems for Cloud Radio Access Networks

  • Park, Sangkyu;Chae, Chan-Byoung;Bahk, Saewoong
    • Journal of Communications and Networks
    • /
    • 제15권4호
    • /
    • pp.398-406
    • /
    • 2013
  • In this paper, we investigate two types of in-phase and quadrature-phase (IQ) data transfer methods for cloud multiple-input multiple-output (MIMO) network operation. They are termed "after-precoding" and "before-precoding". We formulate a cloud massive MIMO operation problem that aims at selecting the best IQ data transfer method and transmission strategy (beamforming technique, the number of concurrently receiving users, the number of used antennas for transmission) to maximize the ergodic sum-rate under a limited capacity of the digital unit-radio unit link. Based on our proposed solution, the optimal numbers of users and antennas are simultaneously chosen. Numerical results confirm that the sum-rate gain is greater when adaptive "after/before-precoding" method is available than when only conventional "after-precoding" IQ-data transfer is available.