2,552 research outputs found
Relationships among Interpolation Bases of Wavelet Spaces and Approximation Spaces
A multiresolution analysis is a nested chain of related approximation
spaces.This nesting in turn implies relationships among interpolation bases in
the approximation spaces and their derived wavelet spaces. Using these
relationships, a necessary and sufficient condition is given for existence of
interpolation wavelets, via analysis of the corresponding scaling functions. It
is also shown that any interpolation function for an approximation space plays
the role of a special type of scaling function (an interpolation scaling
function) when the corresponding family of approximation spaces forms a
multiresolution analysis. Based on these interpolation scaling functions, a new
algorithm is proposed for constructing corresponding interpolation wavelets
(when they exist in a multiresolution analysis). In simulations, our theorems
are tested for several typical wavelet spaces, demonstrating our theorems for
existence of interpolation wavelets and for constructing them in a general
multiresolution analysis
Dynamic Power Splitting Policies for AF Relay Networks with Wireless Energy Harvesting
Wireless energy harvesting (WEH) provides an exciting way to supply energy
for relay nodes to forward information for the source-destination pairs. In
this paper, we investigate the problem on how the relay node dynamically
adjusts the power splitting ratio of information transmission (IT) and energy
harvesting (EH) in order to achieve the optimal outage performance. According
to the knowledge of channel state information (CSI) at the relay, optimal
dynamic power splitting policy with full CSI and partial CSI are both provided.
Finally, through simulations, the proposed power splitting policies can improve
the outage performances and the policy with full CSI achieves the best
performance. It is also shown that the policy with partial CSI can approach the
policy with full CSI closely and incurs far less system overhead.Comment: accepted by IEEE ICC 2015 - Workshop on Green Communications and
Networks with Energy Harvesting, Smart Grids, and Renewable Energie
NiCo2S4とその複合体の合成、キャラクタリゼーション及び高性能スーパーキャパシタへの応用
九州工業大学博士学位論文(要旨)学位記番号:生工博甲第309号 学位授与年月日:平成30年3月23
Protecting 802.11-Based Wireless Networks From SCTS and JACK Attacks
The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. However, these applications are predicated on the assumption of availability and confidentiality. Error-prone wireless networks afford an attacker considerable flexibility to exploit the vulnerabilities of 802.11-based mechanism. Two of most famous misbehaviors are selfish and malicious attacks. In this thesis we investigate two attacks: Spurious CTS attack (SCTS) and Jamming ACK attack (JACK). In the SCTS, malicious nodes may send periodic Spurious CTS packets to force other nodes to update their NAV values and prevent them from using the channel. In the JACK, an attacker ruins legitimate ACK packets for the intention of disrupting the traffic flow and draining the battery energy of victim nodes quickly. Correspondingly, we propose solutions: termed Carrier Sensing based Discarding (CSD), and Extended Network Allocation Vector (ENAV) scheme. We further demonstrate the performance of our proposed schemes through analysis and NS2 simulations
中国の国家計画を通じた中西部農村教員の研修権保障に関する研究
広島大学(Hiroshima University)博士(教育学)Doctor of Philosophy in Educationdoctora
Protecting 802.11-Based Wireless Networks From SCTS and JACK Attacks
The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. However, these applications are predicated on the assumption of availability and confidentiality. Error-prone wireless networks afford an attacker considerable flexibility to exploit the vulnerabilities of 802.11-based mechanism. Two of most famous misbehaviors are selfish and malicious attacks. In this thesis we investigate two attacks: Spurious CTS attack (SCTS) and Jamming ACK attack (JACK). In the SCTS, malicious nodes may send periodic Spurious CTS packets to force other nodes to update their NAV values and prevent them from using the channel. In the JACK, an attacker ruins legitimate ACK packets for the intention of disrupting the traffic flow and draining the battery energy of victim nodes quickly. Correspondingly, we propose solutions: termed Carrier Sensing based Discarding (CSD), and Extended Network Allocation Vector (ENAV) scheme. We further demonstrate the performance of our proposed schemes through analysis and NS2 simulations
- …