Results 41 to 50 of about 71,366 (205)
A Network Coding Approach to Loss Tomography [PDF]
Network tomography aims at inferring internal network characteristics based on measurements at the edge of the network. In loss tomography, in particular, the characteristic of interest is the loss rate of individual links and multicast and/or unicast ...
Fragouli, Christina +3 more
core +3 more sources
In this paper, we investigate the application of signal‐to‐leakage‐plus‐noise ratio (SLNR) beamforming to low Earth orbit non‐terrestrial networks. The SLNR criterion aims at maximizing the received desired signal power for each user while minimizing the overall interference power caused by each user to all other co‐channel receivers. We show that such
M. Rabih Dakkak +3 more
wiley +1 more source
Scheduling of Multicast and Unicast Services under Limited Feedback by using Rateless Codes
Many opportunistic scheduling techniques are impractical because they require accurate channel state information (CSI) at the transmitter. In this paper, we investigate the scheduling of unicast and multicast services in a downlink network with a very ...
Kim, Kyu-Han +3 more
core +1 more source
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley +1 more source
A performance model of multicast communication in wormhole-routed networks on-chip [PDF]
Collective communication operations form a part of overall traffic in most applications running on platforms employing direct interconnection networks. This paper presents a novel analytical model to compute communication latency of multicast as a widely
Moadeli, Mahmoud, Vanderbauwhede, Wim
core +1 more source
Quantum Key Distribution Networks Design: Overview and Challenges
This paper explores the potential of using established QKD network design techniques in the context of quantum key distribution, which is based on the principles of quantum mechanics. ABSTRACT Quantum cryptography has increasingly attracted interest from both industry and academia for its potential in real‐world applications.
Pankaj Kumar +2 more
wiley +1 more source
A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK [PDF]
Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN).
A. Suruliandi, T. Sampradeepraj
doaj
Joint 2‐D LFM Modulation and Mismatched Filter Design in Dual‐Function Radar‐Communication System
This paper proposes a joint 2‐D LFM modulation and mismatched filtering design for military‐grade dual‐function radar‐communication systems. The novel scheme modulates data onto both the initial frequency and chirp rate of LFM pulses, boosting data rates whilst preserving the constant‐envelope property critical for high‐power transmission.
Kehao Wang +5 more
wiley +1 more source
On the Capacity Bounds of Undirected Networks
In this work we improve on the bounds presented by Li&Li for network coding gain in the undirected case. A tightened bound for the undirected multicast problem with three terminals is derived.
Al-Bashabsheh, Ali, Yongacoglu, Abbas
core +1 more source
A Systematic Review of VANET Routing Protocols for Intelligent Transport Systems (ITSs)
The swift improvement of wireless communication technology has aided the creation of vehicular ad hoc networks (VANETs) as a revolutionary option for the realization of intelligent transportation systems (ITSs). VANETs facilitate seamless communication between vehicles and infrastructure (V2I) and among the vehicles themselves (V2V). These networks can
Roopa Tirumalasetti +4 more
wiley +1 more source

