Zobrazeno 1 - 10
of 242
pro vyhledávání: '"Bahram Honary"'
Autor:
Yuhang Yang, Bahram Honary
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 8 (2012)
Externí odkaz:
https://doaj.org/article/f4078473bfb748dea8bddb2cc749e213
Publikováno v:
National Academy Science Letters. 44:113-116
A simple approach of using the multipath model for a power-line channel is proposed. A complex network is decomposed into several point-to-point components, and the transfer function for each individual component is computed. The product of these ind
Publikováno v:
IET Image Processing. 9:395-404
Impulsive noise is one of the major challenges for reliable transmission over power lines. Interleavers provide higher protection against the impulsive noise by dispersing information across the channel and spreading the burst of errors over multiple
Publikováno v:
IET Networks. 3:284-292
Low-power medium access control (MAC) protocols used for communication of energy constraint wireless embedded devices do not cope well with situations where transmission channels are highly erroneous. Existing MAC protocols discard corrupted messages
Publikováno v:
IEEE Systems Journal. 10:290-292
The eight papers in this special issue focus on cognitive inspired networked applications. Cognition is emerging as a new and promising methodology with the development of cognitive-inspired computing, ubiquitous networks, and systems, which has the
Publikováno v:
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY. 11:2457-2475
The concept of Public key cryptosystems based on error correcting codes was invented by McEliece in 1978. In 1991 Gabidulin, Paramonov and Tretjakov proposed a new mversion of the McEliece cryptosystem (GPT) based on maximum rank distance codes inste
Publikováno v:
Problems of Information Transmission. 49:179-191
We consider a communication network with random network coding which can be attacked by adversaries of two types. One of them can wiretap original packets outgoing from source to destination. The other can insert its own packets into information flow
Publikováno v:
Arabian Journal for Science and Engineering. 38:2315-2325
The work in this paper can be broadly divided into three distinct parts. In first part of this work, a deterministic channel model is developed using the art of computer game technology. The developed system can compute the impulse response of an ind
Publikováno v:
IET Wireless Sensor Systems. 2:377-384
Embedded computer systems equipped with wireless communication transceivers are nowadays used in a vast number of application scenarios. Energy consumption is important in many of these scenarios, as systems are battery operated and long maintenance-
Publikováno v:
Designs, Codes and Cryptography. 70:231-239
GPT public key cryptosystem was proposed by Gabidulin, Paramonov and Tretjakov in 1991. This cryptosystem is based on rank error correcting codes. The main advantage of using rank codes in cryptography is that, it has smaller key size as compared to