By Topic

Journal of Communications and Networks

Issue 1 • Date Feb. 2013

Filter Results

Displaying Results 1 - 21 of 21
  • Identity-based proxy signature from lattices

    Publication Year: 2013, Page(s):1 - 7
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    Most of the provably-secure proxy signature schemes rely on the average-case hardness problems such as the integer factorization problems and the discrete logarithm problems. Therefore, those schemes are insecure to quantum analysis algorithms, since there exist quantum algorithms efficiently solving the factorization and logarithm problems. To make secure proxy signature schemes against quantum a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spectrum leasing and cooperative resource allocation in cognitive OFDMA networks

    Publication Year: 2013, Page(s):102 - 110
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (503 KB) | HTML iconHTML

    This paper considers a cooperative orthogonal frequency division multiple access (OFDMA)-based cognitive radio network where the primary system leases some of its subchannels to the secondary system for a fraction of time in exchange for the secondary users (SUs) assisting the transmission of primary users (PUs) as relays. Our aim is to determine the cooperation strategies among the primary and se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call admission control based on adaptive bandwidth allocation for wireless networks

    Publication Year: 2013, Page(s):15 - 24
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (924 KB) | HTML iconHTML

    Provisioning of quality of service (QoS) is a key issue in any multi-media system. However, in wireless systems, supporting QoS requirements of different traffic types is a more challenging problem due to the need to simultaneously minimize two performance metrics - the probability of dropping a handover call and the probability of blocking a new call. Since QoS requirements are not as stringent f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximate expression of bit error rate in uplink MC-CDMA systems with equal gain combining

    Publication Year: 2013, Page(s):25 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    Uplink multicarrier code-division multiple-access (MC-CDMA) with equal gain combining (EGC) over Nakagami fading channels is considered. An improved expression which is a feasible alternative for the bit error rate (BER) performance evaluation of MC-CDMA signals is proposed. Simulated annealing algorithm is employed to obtain the optimum value of the coefficients belonging to the proposed expressi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced OLSR for defense against DOS attack in ad hoc networks

    Publication Year: 2013, Page(s):31 - 37
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Mobile ad hoc networks (MANET) refers to a network designed for special applications for which it is difficult to use a backbone network. In MANETs, applications are mostly involved with sensitive and secret information. Since MANET assumes a trusted environment for routing, security is a major issue. In this paper we analyze the vulnerabilities of a pro-active routing protocol called optimized li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel dynamic spectrum access algorithm for cognitive radio networks

    Publication Year: 2013, Page(s):38 - 44
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    This paper proposes a new dynamic spectrum access (DSA) algorithm for cognitive radio networks. Once initialized, this algorithm works without the need of coordination overhead and hence can be used when no control channel is available. Secondary user (SU) lists and predetermined access control are used in this algorithm. We analyze the probability of no SU collision with primary user and the thro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile-based relay selection schemes for multi-hop cellular networks

    Publication Year: 2013, Page(s):45 - 53
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB) | HTML iconHTML

    Multi-hop cellular networks (MCNs), which reduce the transmit power, mitigate the inter-cell interference, and improve the system performance, have been widely studied nowadays. The relay selection scheme is a key technique that achieves these advantages, and inappropriate relay selection causes frequent relay switchings, which deteriorates the overall performance. In this study, we analyze the co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tracking system using location prediction and dynamic threshold for minimizing SMS delivery

    Publication Year: 2013, Page(s):54 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (722 KB) | HTML iconHTML

    In this paper, a novel method called location-based delivery (LBD), which combines the short message service (SMS) and global position system (GPS), is proposed, and further, a realistic system for tracking a target's movement is developed. LBD reduces the number of short message transmissions while maintaining the location tracking accuracy within the acceptable range. The proposed approach, LBD,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provisioning of QoS adaptability in wired-wireless integrated networks

    Publication Year: 2013, Page(s):61 - 70
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    The increasing number of mobile users and the popularity of real-time applications make wired-wireless integrated network extremely attractive. In this case, quality of service (QoS) adaptability is particularly important since some important features of the integrated network call for QoS adaptability, such as mobility, bursty applications and so on. Traditional QoS schemes include integrated ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A class of check matrices constructed from Euclidean geometry and their application to quantum LDPC codes

    Publication Year: 2013, Page(s):71 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    A new class of quantum low-density parity-check (LDPC) codes whose parity-check matrices are dual-containing matrices constructed based on lines of Euclidean geometries (EGs) is presented. The parity-check matrices of our quantum codes contain one and only one 4-cycle in every two rows and have better distance properties. However, the classical parity-check matrix constructed from EGs does not sat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of opportunistic spectrum access protocol for multi-channel cognitive radio networks

    Publication Year: 2013, Page(s):77 - 86
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    Cognitive radio (CR) has emerged as one of effective methods to enhance the utilization of existing radio spectrum. Main principle of CR is that secondary users (SUs) are allowed to use the spectrum unused by primary users (PUs) without interfering PU's transmissions. In this paper, PUs operate on a slot-by-slot basis and SUs try to exploit the slots unused by PUs. We propose OSA protocols in the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A combination of CS-CDMA and OFDM for enhanced LTE on downlink channel

    Publication Year: 2013, Page(s):8 - 14
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (514 KB) | HTML iconHTML

    For alleviating the low spectrum efficiency problem of orthogonal frequency division multiplexing (OFDM), due to the strong inter-cell-interference (ICI) at cell's edge, we introduce comb-spectrum code division multiple access (CS-CDMA) into broadband OFDM system at downlink channel for enabling the use of entire spectrum for seamless coverage. In addition, we develop a new method, called orthogon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CFP scheduling for real-time service and energy efficiency in the industrial applications of IEEE 802.15.4

    Publication Year: 2013, Page(s):87 - 101
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (773 KB) | HTML iconHTML

    In industrial applications, sensor networks have to satisfy specified time requirements of exchanged messages. IEEE 802.15.4 defines the communication protocol of the physical and medium access control layers for wireless sensor networks, which support real-time transmission through guaranteed time slots (GTSs). In order to improve the performance of IEEE 802.15.4 in industrial applications, this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertisement

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (255 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (517 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (296 KB)
    Freely Available from IEEE
  • Copyright transfer form

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Front cover

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (506 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2013, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (506 KB)
    Freely Available from IEEE
  • Journal of Communications and Networks (JCN)

    Publication Year: 2013, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (252 KB)
    Freely Available from IEEE
  • Journal of Communications and Networks (JCN) [society officers]

    Publication Year: 2013, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (256 KB)
    Freely Available from IEEE

Aims & Scope

The Journal of Communications and Networks is published six times per year, and is committed to publishing high-quality papers that advance the state-of-the-art and practical applications of communications and information networks.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Anthony Ephremides
University of Maryland