Loading...
Search for: communications-capability
0.003 seconds

    Mobile cloud management: A new framework

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 9 September 2012 through 12 September 2012 ; September , 2012 , Pages 48-53 ; 9781467325691 (ISBN) Salehi, M. J ; Khalaj, B. H ; Katz, M ; Fazelnia, G ; Karimi, P ; Sharif University of Technology
    2012
    Abstract
    Smartphones can be viewed as resource pools capable of communicating with their outside world. Such communication capabilities provide unique opportunity for sharing resources, which would result in new possibilities for end users. In this paper, we present a new framework designed for managing mobile local networks, also referred to as Mobile Clouds. In this framework, mobility of nodes is managed by selecting one leader for each cloud, which is responsible for all cloud-level decisions, as well as processing all incoming data from other users. We also evaluate and discuss our proposed framework under different scenarios  

    Mobile clouds: How to find opportunities

    , Article 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2012 ; 2012 , Pages 170-172 ; 9781467331258 (ISBN) Salehi, M. J ; Khalaj, B. H ; Katz, M ; Fazelnia, G ; Karimi, P ; Del Ser, J
    2012
    Abstract
    Smartphones can be regarded as resource pools which are capable of communicating with their outside world using both short-range and long-range links. Such communication capabilities provide a unique opportunity for sharing resources, resulting in new possibilities for end users. In this paper, we present a new data update and processing scheme, designed for local networks of mobile devices which are formed with resource sharing in mind  

    Enhancement of full-duplex efficiency in an asymmetric IEEE 802.11-based WLAN

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 4 September 2016 through 8 September 2016 ; 2016 ; 9781509032549 (ISBN) Goshtasbpour, S ; Ashtiani, F ; Mirmohseni, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In this paper, we propose a new packet prioritization scheme in order to exploit the full-duplex (FD) capability of the access point (AP) more efficiently, in an asymmetric IEEE 802.11-based WLAN, i.e., only the AP has the in-band FD communications capability. In this respect, we consider a modified version of IEEE 802.11 MAC protocol such that at any transmission opportunity in which AP has the role of the transmitter or the receiver, it does the best to select a partner packet to be simultaneously received or transmitted, respectively. The key feature of our proposed partner packet selection scheme is to reduce the idle time intervals that in an FD transmission opportunity, due to... 

    Quantitative modeling and analysis of substation automation systems

    , Article Proceedings of the IEEE Power Engineering Society Transmission and Distribution Conference ; 2012 ; 21608555 (ISSN) ; 9781467319348 (ISBN) Falahati, B ; Darabi, Z ; Fu, Y ; Vakilian, M ; Sharif University of Technology
    2012
    Abstract
    The application of digital technologies in power systems has resulted in an evolutionary replacement of electromechanical devices with numerical ones featuring internal digital processors with communication capabilities. A substation automation system (SAS) deploys substation operation functions, including control, protection, monitoring, and measuring. Ethernet technology and local area networks (LANs) make it possible to design substation communication architectures with greater reliability, availability, speed, and cost savings than conventional hard-wired systems. This paper proposes a new method to describe topologies of the SAS as an interconnected network. The concept of data... 

    A secure key management framework for heterogeneous wireless sensor networks

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 19 October 2011 through 21 October 2011 ; Volume 7025 LNCS , October , 2011 , Pages 18-31 ; 03029743 (ISSN) ; 9783642247118 (ISBN) Alagheband, M. R ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    A Wireless sensor network (WSN) is composed of numerous sensor nodes with both insecurely limited hardware and restricted communication capabilities. Thus WSNs suffer from some inherent weaknesses. Key management is an interesting subject in WSNs because it is the fundamental element for all security operations. A few key management models for heterogeneous sensor networks have been proposed in recent years. In this paper, we propose a new key management scheme based on elliptic curve cryptography and signcryption method for hierarchical heterogeneous WSNs. Our scheme as a secure infrastructure has superior sensor node mobility and network scalability. Furthermore, we propose both a periodic...