... Corporation
EURASIP Journal on Wireless Communications and Networking
Volume 2011, Article ID 797931, 14 pages
doi:10.1155/2011/797931
Research Ar ticle
Secure Precise Clock Synchronization for
Interconnected ... operly
cited.
Secure time synchronization is a paramount service for wireless sensor networks (WSNs) constituted b y multiple inter connected
body area networks (BANs...
... sensing. The total time to
perform a discrete Fourier Transform (DFT) is given by
T
DFT
=
1
F
DSP
4N log
2
N − 6N +8
,(3)
where F
DSP
is the DSP operating frequency. For simplicity,
assume that ... appropriate channel for CR operation (i.e., increases).
Similarly, the physical implementation is mostly defined by
the user given restrictions on cost, power, performance, and
so forth. F...
... total
number of the encoded frames is 100 for each test sequence.
Hadamard transform is enforced on these video frames. 8
×8
transform is not chosen. As for the entropy coding, the
CAVLC (context-based ... substitute for H.264 DC intraprediction
mode with no need to code side information. However,
prediction performance would be degraded if directly using
previously reconstructed pixels...
... Journal on Wireless Communications and Networking
Volume 2010, Article ID 567040, 10 pages
doi:10.1155/2010/567040
Research Article
Centroid Localization of Uncooperative Nodes in
Wireless Networks ... the
REWL mechanism with λ
= 0.15 performs better than the
other algorithms for all numbers of receivers.
In order to gauge the performance of REWL (λ
= 0.15)
for a single frequen...
... orientation, illumi-
nation, zoom factor, and so forth. However, this fact that
seems so obvious for most of people is not natural and easy
for blind people. For them, taking a picture requires training
(a) ... (especially for the
text detection part). Nevertheless, the extension to another
currency is quite straightforward and may be handled eas-
ily. An all-currency recognizer has n...
... the performance of CO line on the high-
frequency band. Therefore, for RT line, allocating all the re-
maining power over the high -frequency band is a smart strat-
egy to enhance its performance ... high -frequency band is not used by 3000 ft lines
and protective low waterfilling level is not necessary to en-
sure the performance of 3000 ft lines on the high -frequency
band. Therefore,...
... lengths of the forbidden symbols
Hindawi Publishing Corporation
EURASIP Journal on Information Security
Volume 2010, Article ID 621521, 9 pages
doi:10.1155/2010/621521
Research Article
Secure Arithmet ... more
than one forbidden symbol, therefore we use two forbidden
symbols in this method. Since the sum of the probabilities
of two forbidden symbols must be equal to γ,wecandivide
the...
... a certificate before the use of a public
key for signature verification. It takes 4 PM for certificate
verification and 2 PM for message verification, resulting in
a total of 6 PM for signature verification ... the proposed protocol drop
messages for a smaller number of vehicles; for example,
190 vehicles for ECPP and 100 vehicles for the proposed
protocol. However, as for GSIS an...
... on Wireless Communications and Networking
Volume 2011, Article ID 893592, 12 pages
doi:10.1155/2011/893592
Research Article
Secure Clustering and Symmetric Key Establishment in
Heterogeneous Wireless ... IEEE Std.802.15.4 for Information Technology—Telecommu-
nication and Information Exchage between Systems—Local
and Metropolitan Area Networks Specific Requirements Part
15.4: Wi...
... in Signal Processing
Volume 2009, Article ID 361063, 11 pages
doi:10.1155/2009/361063
Research Article
Secure Collision-Free Frequency Hopping for
OFDMA-Based Wireless Networks
Leonard Lightfoot, ... system design using secure dynamic spectrum access control. First, we propose a
collision-free frequency hopping (CFFH) system based on the OFDMA framework and an inno...