Loading...
Search for: many-to-many
0.005 seconds

    Enhancement of full-duplex efficiency in an asymmetric IEEE 802.11-based WLAN

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 4 September 2016 through 8 September 2016 ; 2016 ; 9781509032549 (ISBN) Goshtasbpour, S ; Ashtiani, F ; Mirmohseni, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In this paper, we propose a new packet prioritization scheme in order to exploit the full-duplex (FD) capability of the access point (AP) more efficiently, in an asymmetric IEEE 802.11-based WLAN, i.e., only the AP has the in-band FD communications capability. In this respect, we consider a modified version of IEEE 802.11 MAC protocol such that at any transmission opportunity in which AP has the role of the transmitter or the receiver, it does the best to select a partner packet to be simultaneously received or transmitted, respectively. The key feature of our proposed partner packet selection scheme is to reduce the idle time intervals that in an FD transmission opportunity, due to... 

    Many-to-Many Hub Location-routing Problem with Robust Optimization Approach

    , M.Sc. Thesis Sharif University of Technology Basirati, Mohadeseh (Author) ; Akbari-Jokar, Mohammad Reza (Supervisor)
    Abstract
    Increasing the performance and efficiency of the transportation system is one of the issues that has attracted the attention of many managers and experts in the industrial sector during the last decades, which aims to deliver the product to the customer in the earliest possible time with minimum cost. Therefore, it appears crucial to shed light on two aspects of the issues in this regard. The first one is to create routes functioning as flow transmission interface between many origins and many destinations and to satisfy the allowable time of tours in each route. The other one is the route that vehicles must take within the window time of each destination point. It should be pointed that the... 

    A Data-Driven Framework Based on Credit Risk Management for Improving the Performance of Peer-To-Peer Lending Platforms

    , M.Sc. Thesis Sharif University of Technology Ghoreishi, Mohammad Reza (Author) ; Eshghi, Kourosh (Supervisor)
    Abstract
    Peoples need financial resources to improve their quality of life, and companies need them to progress and increase their comparative advantage. Borrowing is one of the most popular methods of financing. Peer-to-peer lending, also known as "marketplace" or "social" lending, is a novel form of intermediation that expunges the role of financial institutions (like banks) as an intermediary and allows entities (individuals or businesses) to raise loans directly from other entities. This lending platform can provide better quality services to borrowers (by quickly providing a simple loan application process through a transparent and flexible portal) and lenders (by managing their funding and live... 

    An efficient distributed group key management using hierarchical approach with Diffie-Hellman and symmetric algorithm: DHSA

    , Article 2011 International Symposium on Computer Networks and Distributed Systems, CNDS 2011, 23 February 2011 through 24 February 2011, Tehran ; 2011 , Pages 49-54 ; 9781424491544 (ISBN) Mortazavi, S. A ; Pour, A. N ; Kato, T ; Sharif University of Technology
    2011
    Abstract
    This paper proposes an efficient many-to-many group key management protocol in distributed group communication. In this protocol, group members are managed in the hierarchical manner logically. Two kinds of keys are used, asymmetric and symmetric keys. The leaf nodes in the key tree are the asymmetric keys of the corresponding group members and all the intermediate node keys are symmetric keys assigned to each intermediate node. For asymmetric key, Diffie-Hellman key agreement is introduced. To calculate intermediate node keys, members use codes assigned to each intermediate node key tree. Group members calculate intermediate node keys rather than distributed by a sponsor member. The...