Browsing Scientific Publications in Information and Communication Technology by Issue Date
Now showing items 81-100 of 689
-
A Multi-Relay Cooperative Automatic Repeat Request Protocol in Wireless Networks
(Journal article; Peer reviewed, 2010)This paper proposes a Multi-relay Cooperative Automatic Repeat ReQuest protocol (MC-ARQ) for IEEE 802.11 based wireless networks. The proposed distributed relay selection scheme not only selects the best relays but also ... -
Privacy Violation Classification of Snort Ruleset
(Journal article; Peer reviewed, 2010)It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand and quantify the privacy-invasiveness of network monitoring services. The objective in this paper is to classify ... -
Secure Group Communication Using Fractional Public Keys
(Chapter; Peer reviewed, 2010)In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement scheme that is based on fractional public keys. Shared group keys are computed ... -
Performance Analysis of M-Ary PSK Modulation Schemes over Multiple Double Rayleigh Fading Channels with EGC in Cooperative Networks
(Peer reviewed; Chapter, 2010)This article studies the performance of M-ary phase shift keying (PSK) modulation schemes over mobile-to-mobile (M2M) fading channels with equal gain combining (EGC) in cooperative networks. The frequency-nonselective M2M ... -
On the Statistical Analysis of the Channel Capacity of Double Rayleigh Channels with Equal Gain Combining in V2V Communication Systems
(Journal article; Peer reviewed, 2010)In this article, we present a detailed study on the statistical properties of the channel capacity of vehicle-to-vehicle (V2V) fading channels with equal gain combining (EGC). Assuming perfect channel state information ... -
A co-writing development approach to wikis: Pedagogical issues and implications
(Journal article; Peer reviewed, 2011)Wikis are promoted as collaborative writing tools that allow students to transform a text into a collective document by information sharing and group reflection. However, despite the promising collaborative capabilities ... -
The bayesian pursuit algorithm: A new family of estimator learning automata
(Lecture Notes in Computer Science;6704, Chapter; Peer reviewed, 2011)The fastest Learning Automata (LA) algorithms currently available come from the family of estimator algorithms. The Pursuit algorithm (PST), a pioneering scheme in the estimator family, obtains its superior learning speed ... -
Fifth generation networking principles for a service driven future Internet architecture
(Journal article; Peer reviewed, 2011)The vision of all-IP networks where IP forms the simple common layer understandable across the whole network has undeniable advantages. However, such simplicity comes as a major hurdle to flexibility and functionality to ... -
Power allocation in multi-channel cognitive radio networks with channel assembling
(Chapter; Peer reviewed, 2011)Consider power allocation for Secondary User (SU) packet transmissions over multiple channels with variable Primary User (PU) arrival rates in cognitive radio networks. Two problems are studied in this paper: The first one ... -
Optimization of the relay selection scheme in cooperative retransmission networks
(Chapter; Peer reviewed, 2011)Cooperative MAC protocol design has attracted much attention recently thanks to the development of relaying techniques. In single-relay C-ARQ, the relay selection scheme cannot work efficiently in a dense network, due to ... -
A geometrical three-ring-based model for MIMO mobile-to-mobile fading channels in cooperative networks
(Journal article; Peer reviewed, 2011)This paper deals with the modeling and analysis of narrowband multiple-input multiple-output (MIMO) mobile-to-mobile (M2M) fading channels in relay-based cooperative networks. In the transmission links from the source ... -
Anomaly detection in dynamic systems using weak estimators
(Journal article; Peer reviewed, 2011)Anomaly detection involves identifying observations that deviate from the normal behavior of a system. One of the ways to achieve this is by identifying the phenomena that characterize “normal” observations. Subsequently, based ... -
Generalized Bayesian pursuit: A novel scheme for multi-armed Bernoulli bandit problems
(IFIP Advances in Information and Communication Technology;364, Chapter; Peer reviewed, 2011)In the last decades, a myriad of approaches to the multi-armed bandit problem have appeared in several different fields. The current top performing algorithms from the field of Learning Automata reside in the Pursuit family, ... -
New super-orthogonal space-time trellis codes using differential M-PSK for noncoherent mobile communication systems with two transmit antennas
(Journal article; Peer reviewed, 2011)In this paper, we develop super-orthogonal space-time trellis codes (SOSTTCs) using differential binary phase-shift keying, quadriphase-shift keying and eight-phase shift keying for noncoherent communication systems with ... -
Imposing tree-based topologies onto self organizing maps
(Journal article; Peer reviewed, 2011)The beauty of the Kohonen map is that it has the property of organizing the codebook vectors, which represent the data points, both with respect to the underlying distribution and topologically. This topology is traditionally ... -
Service selection in stochastic environments: a learning-automaton based solution
(Journal article; Peer reviewed, 2011)In this paper, we propose a novel solution to the problem of identifying services of high quality. The reported solutions to this problem have, in one way or the other, resorted to using so-called “Reputation Systems” ... -
An optimal energy efficient cooperative retransmission MAC scheme in wireless networks
(Chapter; Peer reviewed, 2011)While the benefits of cooperative diversity have been well studied in the literature, cooperative MAC protocol design has also attracted much attention recently. In the single-relay Cooperative Automatic Repeat reQuest ... -
A user-centric approach for personalized service provisioning in pervasive environments
(Journal article; Peer reviewed, 2011)The vision of pervasive environments is being realized more than ever with the proliferation of services and computing resources located in our surrounding environments. Identifying those services that deserve the attention ... -
A system-level power saving approach for cellular networks with microcells/picocells
(Chapter; Peer reviewed, 2011)Network power consumption reduction has recently become an active research topic. In this paper, we propose a novel approach to save power consumption of a three-cell microcellular network. When the traffic load in the ... -
On the analysis of a new Markov chain which has applications in AI and machine learning
(Chapter; Peer reviewed, 2011)In this paper, we consider the analysis of a fascinating Random Walk (RW) that contains interleaving random steps and random "jumps". The characterizing aspect of such a chain is that every step is paired with its counterpart ...