about.jpg

Filter by

Novel permutation measures for image encryption algorithms

This paper proposes two measures for the evaluation of permutation techniques used in image encryption. First, a general mathematical framework for describing the permutation phase used in image encryption is presented. Using this framework, six different permutation techniques, based on chaotic and non-chaotic generators, are described. The two new measures are, then, introduced to evaluate the

Circuit Theory and Applications
Software and Communications

Proactive cognitive networks with predictable demand

In this paper we characterize the proactive diversity gain of a cognitive network with predictable primary and secondary requests. Network performance is analyzed under two proposed proactive service policies that preserve higher priority for the primary user. The first policy preserves the primary diversity bound as if there is no secondary user in the network, whereas the second policy boosts

Software and Communications

A hybrid TDMA-MAC cooperative relaying scheme: Stability and delay analysis

We consider a cooperative relaying system with any number of source terminals, one shared relay, and a common destination. We assume a slotted time division multiple access (TDMA) framework in which each source terminal is allocated a fraction of the time. We propose a novel hybrid cooperative scheme for the described network. In contrast to former works which assume that the relay only transmits

Software and Communications

A novel framework for scalable video streaming over multi-channel multi-radio wireless mesh networks

In this paper, we study the problem of scalable videos multicast streaming over multi-channel multi-radio wireless mesh networks over a contention-based MAC, with the objective of maximizing the overall received videos quality. We propose a three-stage heuristic framework solution for the complex joint channel assignment, video quality selection and multicast routing problem. That framework is

Software and Communications

Achievable degrees of freedom on K-user MIMO multi-way relay channel with common and private messages

This paper investigates the achievable total degrees of freedom (DoF) of the MIMO multi-way relay channel that consists of K users, where each user is equipped with M antennas, and a decode-and-forward relay equipped with N antennas. In this channel, each user wants to convey K - 1 private messages to the other users in addition to a common message to all of them. Due to the absence of direct

Software and Communications

On optimizing cooperative cognitive user performance under primary QoS constraints

We study the problem of optimizing the performance of cognitive radio users with opportunistic real-Time applications subject to primary users quality-of-service (QoS) constraints. Two constrained optimization problems are formulated; the first problem is maximizing the secondary user throughput while the second problem is minimizing the secondary user average delay, subject to a common constraint

Software and Communications

Achievable degrees of freedom of the K-user MISO broadcast Channel with alternating CSIT via interference creation-resurrection

Channel state information at the transmitter affects the degrees of freedom of the wireless networks. In this paper, we analyze the DoF for the K-user multiple-input single-output (MISO) broadcast channel (BC) with synergistic alternating channel state information at the transmitter (CSIT). Specifically, the CSIT of each user alternates between three states, namely, perfect CSIT (P), delayed CSIT

Software and Communications

Using network coding to achieve the capacity of deterministic relay networks with relay messages

In this paper, we derive the capacity of the deterministic relay networks with relay messages. We consider a network that consists of five nodes, four of which can only communicate via the fifth one. However, the fifth node is not merely a relay as it may exchange private messages with the other network nodes. First, we develop an upper bound on the capacity region based on the notion of a single

Software and Communications

On the coexistence of a primary user with an energy harvesting secondary user: A case of cognitive cooperation

In this paper, we consider a cognitive scenario where an energy harvesting secondary user shares the spectrum with a primary user. The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues: a queue for storing its

Software and Communications

A proper throughput-leakage balance for downlink cellular networks

A novel transmission scheme is developed for the downlink frame of cellular networks. Each base station (BS) aims at iteratively balancing the throughput at the mobile stations (MSs) of its cell with the interference it causes at the MSs of the neighboring cells, requiring negligible coordination between the BSs. A simplified version of the scheme that neither requires iterations nor cooperation

Software and Communications