top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Improved Reservoir Models and Production Forecasting Techniques for Multi-Stage Fractured Hydrocarbon Wells
Improved Reservoir Models and Production Forecasting Techniques for Multi-Stage Fractured Hydrocarbon Wells
Autore Khanal Aadi
Pubbl/distr/stampa MDPI - Multidisciplinary Digital Publishing Institute, 2019
Descrizione fisica 1 electronic resource (238 p.)
Soggetto non controllato mimetic finite difference method
infill wells
shale gas
fracture modeling
sensitivity analysis
EDFM
production uplifts
molecular diffusion
fracture properties
pressure communication
Austin Chalk
enhanced permeability
enhanced oil recovery
bottomhole pressure
wolfcamp formation
flow models
semi-analytical model
pore network
particle paths
bubble point pressure
staged fracturing horizontal well
EUR
discrete fracture model
(re)fracturing
well interference
perforating number
naturally fractured reservoirs
line detection
well spacing
production history matching
hydraulic fracturing
microseismic
cluster efficiency
Cyclic CH4 injection
stimulated reservoir volume
drained rock volume
natural fractures
pressure depletion
midland basin
hydraulic fractures
low-permeability reservoir
flow modeling
hydraulic fracturing test site
time of flight
embedded discrete fracture model
Eagle Ford shale
hydraulic fracture closure
Changning shale gas
nanopore confinement
fractured reservoir
fracture porosity
multiple fracture propagation
ISBN 3-03921-893-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910367737903321
Khanal Aadi  
MDPI - Multidisciplinary Digital Publishing Institute, 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings / / edited by Qing Yang, Wei Yu, Yacine Challal
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings / / edited by Qing Yang, Wei Yu, Yacine Challal
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XV, 583 p. 260 illus.)
Disciplina 621.3821
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Electronic digital computers—Evaluation
Electronic data processing—Management
Computer Communication Networks
Computer and Information Systems Applications
System Performance and Evaluation
IT Operations
ISBN 3-319-42836-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems -- 1 Introduction -- 2 Related Works and Preliminary -- 2.1 Related Works -- 2.2 Preliminary -- 3 RSGA -- 3.1 Motivations and Basic Idea -- 3.2 Definitions and Assumptions -- 3.3 The Proposed Authentication Protocol -- 4 Analyses -- 4.1 Anonymity Analysis -- 4.2 Cost Analysis -- 5 Simulation -- 5.1 Simulation Configuration -- 5.2 Simulation Results -- 6 Conclusion -- References -- Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles -- 1 Introduction -- 2 Related Work -- 3 System Design and Implementation -- 3.1 System Overview -- 3.2 Divide Audio Clips into Segments -- 3.3 Segment-Level Feature Extraction -- 3.4 Divide Segments into Frames -- 3.5 Frame-Level Feature Extraction -- 3.6 Multiple Frames Accumulation -- 3.7 Dimension Reduction -- 4 Evaluation -- 4.1 Recognition Performance of Different Recognizers -- 4.2 Experimental Results -- 4.3 Time Consumption of Every Computational Step -- 5 Conclusion -- References -- A New Paradigm for Shortest Link Scheduling in Wireless Networks: Theory and Applications -- 1 Introduction -- 2 Weak Duality -- 3 An Adaptive Zero-Sum Game with Retirement -- 4 Approximation Algorithm for SLS -- 5 Applications -- 5.1 Wireless SCSR Networks Under Physical Interference Model -- 5.2 Wireless MCMR Networks Under Protocol Interference Model -- 5.3 Wireless MIMO Networks Under Protocol Interference Model -- 6 Conclusion -- References -- CO2: Design Fault-Tolerant Relay Node Deployment Strategy for Throwbox-Based DTNs -- 1 Introduction -- 2 Problem Statement -- 3 CO2: Relay Node Placement Strategy -- 4 Performance Evaluation -- 4.1 Experimental Settings -- 4.2 Experimental Results -- 5 Conclusion -- References.
CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid -- 1 Introduction -- 2 Colluded NTL Fraud -- 2.1 Problem Definition and Attack Model -- 3 CNTL Fraud Detection -- 3.1 Observer Meter -- 3.2 Tampered Meter Detection -- 3.3 Adversary Differentiation -- 4 Experiments -- 5 Related Work -- 6 Conclusion -- References -- SUO: Social Reciprocity Based Cooperative Mobile Data Traffic Communication -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Social-Aware Utility -- 3.2 Consumptions in SUO Services -- 4 Optimal Solution -- 5 Performance Evaluation -- 5.1 Simulation Setup -- 5.2 Simulation Results -- 6 Conclusions -- References -- Piggybacking Lightweight Control Messages on Physical Layer for Multicarrier Wireless LANs -- 1 Introduction -- 2 Overview of PhyPig -- 3 Feasibility of PhyPig -- 3.1 Frequency Selective Fading -- 3.2 Symbol Error Pattern -- 3.3 Extra Coding Redundancy -- 4 PhyPig Design -- 4.1 Overall System Architecture -- 4.2 Modulation/Demodulation of Control Messages -- 4.3 Rate Selection of Control Messages -- 5 Evaluation -- 5.1 Accuracy of PhyPig Detection -- 5.2 Rate of Control Messages -- 5.3 Applications of PhyPig -- 6 Conclusion -- References -- Multi-focus Image Fusion via Region Mosaicing on Contrast Pyramids -- Abstract -- 1 Introduction -- 2 Focus Region Segmentation -- 2.1 Pixel Level Focus Measurement -- 2.2 Focus Region Segmentation -- 3 Region Mosaicing on Contrast Pyramids -- 3.1 Contrast Pyramid Fusion -- 3.2 Region Based Contrast Pyramid Fusion -- 4 Experiments -- 5 Conclusions -- Acknowledgement -- References -- Distributed Constrained Optimization Over Cloud-Based Multi-agent Networks -- 1 Introduction -- 2 Algorithm Development -- 2.1 Brief Review of ADMM -- 2.2 Distributed Constrained Optimization -- 3 Implementation Issues -- 3.1 Algorithm Outline.
3.2 Early Termination of Inner Loops -- 3.3 Comparisons with Existing Works -- 4 Numerical Experiments -- 5 Conclusions -- References -- Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles -- 1 Introduction -- 2 Related Work -- 3 Probabilistic Path Inference Model -- 3.1 Problem Definition -- 3.2 Unified Inference Model -- 4 Collaborative Tensor Filter -- 4.1 Tensor Construction -- 4.2 Tensor Decomposition with Regularization -- 4.3 Dynamic Feature Extraction -- 4.4 System Framework -- 5 Experiments -- 5.1 Settings -- 5.2 Evaluation Approach -- 5.3 Results -- 6 Conclusion -- References -- NFC Secure Payment and Verification Scheme for Mobile Payment -- Abstract -- 1 Introduction -- 2 NFC Mobile Electronic Ticket System -- 2.1 Scheme Structure -- 2.2 CS E-Ticket -- 2.3 CS E-Ticket NFC Payment Scheme -- 2.4 Offline CS E-Ticket Secure Verification -- 3 Security Analysis of NFC Mobile Electronic Ticket System -- 3.1 Security Analysis -- 3.2 Practicability Analysis -- 4 Conclusions -- Acknowledgment -- References -- Multi-path Reliable Routing with Pipeline Schedule in Wireless Sensor Networks -- 1 Introduction -- 2 Protocol Design -- 2.1 Establish Conversion Relationship Between Multi-paths -- 2.2 Conversion Between Multi-paths and Pipeline -- 3 The Selection of Scheduling Time in Assemble Line -- 3.1 Pipeline State's Classification -- 3.2 Prediction Algorithm Based on Markov Chain -- 4 Experiment and Analysis -- 4.1 The Impact of Sampling Period -- 4.2 The Impact of the Number of Pipeline Segment -- 4.3 The Impact of Predicting Time -- 5 Conclusion -- References -- A QoE-Aware Adaptive Spectrum Allocation Framework for Secondary Mobile Networks -- 1 Introduction -- 2 Adaptive Framework for Spectrum Allocation in Secondary Mobile Network -- 2.1 Service Model -- 2.2 Adaptive Spectrum Allocation Strategies.
3 Determining System Performance -- 4 Numerical Results -- 5 Conclusion and Future Directions -- References -- Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks -- 1 Introduction -- 2 Network Model and Problem Statement -- 2.1 Network Model -- 2.2 Block Error Rate -- 2.3 Decoding Requirement -- 2.4 Bound for Broadcast Traffic -- 2.5 Objective Function -- 2.6 Approximation of Primal Optimization Problem -- 3 Distributed Algorithm Design -- 4 Performance Evaluation -- 4.1 Influence of Different Link Conditions -- 4.2 Influence of Weight on Traffic Allocation -- 5 Conclusion -- References -- Identifying Discrepant Tags in RFID-enabled Supply Chains -- 1 Introduction -- 2 Problem Formulation -- 3 Deterministic Identification Protocol -- 4 Probabilistic Identification Protocol with Estimation -- 5 Evaluation -- 5.1 Experimental Comparison -- 6 Related Work -- 7 Concluding Remarks -- Appendix: -- References -- SHMDRS: A Smartphone-Based Human Motion Detection and Response System -- 1 Introduction -- 2 Overview of the System -- 3 The Human Motion Detection Module -- 3.1 Software Architecture -- 3.2 Data Acquisition and Collection -- 3.3 Data Processing and Machine Learning -- 3.4 Light-Kernel and Server-Free Design -- 4 The Response and Controller Module -- 5 The Location Retrieving Module -- 6 Experimental Results -- 7 Related Works -- 8 Conclusion -- References -- iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running -- 1 Introduction -- 2 Background -- 3 Data Collection -- 4 System Design -- 4.1 Preprocess -- 4.2 Segmentation -- 4.3 Feature Extraction -- 4.4 Detect Warm-Up Phase -- 5 Evaluation -- 5.1 Slide Window Size -- 5.2 Proper Multi-class Classifier -- 6 Related Work -- 7 Conclusion -- References -- iBeaconing: A Low-Cost, Wireless Student Protection System -- 1 Introduction.
2 Related Work -- 3 Overall System Design -- 3.1 Beacon Scanning -- 3.2 Alert Data Transmission -- 4 System Components -- 4.1 The Bluetooth Scanners -- 4.2 The Central Webserver and Database -- 4.3 The Smartphone Application -- 5 Implementation -- 5.1 Installation -- 5.2 Cost -- 5.3 Evaluation -- 6 Conclusion -- References -- The Power Control Strategy for Mine Locomotive Wireless Network Based on Successive Interference Cancellation -- 1 Introduction -- 2 Mine Locomotive Wireless Networks -- 2.1 Network Model -- 2.2 Problem Formulation -- 2.3 Reformulation -- 3 Polynomial-Time Algorithm -- 4 Simulation Results -- 4.1 Results for a Wireless Network with 20 Locomotives -- 4.2 Results for All Network Instances -- 5 Conclusions -- References -- ESRS: An Efficient and Secure Relay Selection Algorithm for Mobile Social Networks -- 1 Introduction -- 2 Related Work -- 3 Problem Description -- 4 An Efficient and Secure Relay Selection Algorithm -- 4.1 Payoff Functions -- 4.2 Relay Selection Based on the Network Formation Game -- 4.3 Stability Analysis -- 5 Simulation -- 5.1 Simulation Study Using the Synthetic Trace -- 5.2 Simulation Study Using the Real-World Trace -- 6 Conclusion -- References -- Energy Detection of Gaussian Signals Subject to Impulsive Noise in Generalized Fading Channels -- 1 Introduction -- 2 The Energy Detector -- 2.1 Hypothesis H0 -- 2.2 Hypothesis H1 -- 3 Generalized Fading Channels -- 3.1 The - Distribution -- 3.2 The - Distribution -- 3.3 The - Distribution -- 4 Numerical Analysis -- 4.1 Cooperative Sensing -- 5 Conclusion -- Appendix A -- References -- Distance Bounding Protocol for RFID Systems -- 1 Introduction -- 2 The SMDB Protocol -- 2.1 Slow Exchange Phase -- 2.2 Rapid Bit Exchange Phase -- 2.3 Verification Phase -- 2.4 Identifier Update Phase -- 3 Security Analysis of the SMDB Protocol.
3.1 Analysis on Impersonation Attacks.
Record Nr. UNISA-996466058703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings / / edited by Qing Yang, Wei Yu, Yacine Challal
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings / / edited by Qing Yang, Wei Yu, Yacine Challal
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XV, 583 p. 260 illus.)
Disciplina 621.3821
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer networks
Application software
Electronic digital computers—Evaluation
Electronic data processing—Management
Computer Communication Networks
Computer and Information Systems Applications
System Performance and Evaluation
IT Operations
ISBN 3-319-42836-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems -- 1 Introduction -- 2 Related Works and Preliminary -- 2.1 Related Works -- 2.2 Preliminary -- 3 RSGA -- 3.1 Motivations and Basic Idea -- 3.2 Definitions and Assumptions -- 3.3 The Proposed Authentication Protocol -- 4 Analyses -- 4.1 Anonymity Analysis -- 4.2 Cost Analysis -- 5 Simulation -- 5.1 Simulation Configuration -- 5.2 Simulation Results -- 6 Conclusion -- References -- Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles -- 1 Introduction -- 2 Related Work -- 3 System Design and Implementation -- 3.1 System Overview -- 3.2 Divide Audio Clips into Segments -- 3.3 Segment-Level Feature Extraction -- 3.4 Divide Segments into Frames -- 3.5 Frame-Level Feature Extraction -- 3.6 Multiple Frames Accumulation -- 3.7 Dimension Reduction -- 4 Evaluation -- 4.1 Recognition Performance of Different Recognizers -- 4.2 Experimental Results -- 4.3 Time Consumption of Every Computational Step -- 5 Conclusion -- References -- A New Paradigm for Shortest Link Scheduling in Wireless Networks: Theory and Applications -- 1 Introduction -- 2 Weak Duality -- 3 An Adaptive Zero-Sum Game with Retirement -- 4 Approximation Algorithm for SLS -- 5 Applications -- 5.1 Wireless SCSR Networks Under Physical Interference Model -- 5.2 Wireless MCMR Networks Under Protocol Interference Model -- 5.3 Wireless MIMO Networks Under Protocol Interference Model -- 6 Conclusion -- References -- CO2: Design Fault-Tolerant Relay Node Deployment Strategy for Throwbox-Based DTNs -- 1 Introduction -- 2 Problem Statement -- 3 CO2: Relay Node Placement Strategy -- 4 Performance Evaluation -- 4.1 Experimental Settings -- 4.2 Experimental Results -- 5 Conclusion -- References.
CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid -- 1 Introduction -- 2 Colluded NTL Fraud -- 2.1 Problem Definition and Attack Model -- 3 CNTL Fraud Detection -- 3.1 Observer Meter -- 3.2 Tampered Meter Detection -- 3.3 Adversary Differentiation -- 4 Experiments -- 5 Related Work -- 6 Conclusion -- References -- SUO: Social Reciprocity Based Cooperative Mobile Data Traffic Communication -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Social-Aware Utility -- 3.2 Consumptions in SUO Services -- 4 Optimal Solution -- 5 Performance Evaluation -- 5.1 Simulation Setup -- 5.2 Simulation Results -- 6 Conclusions -- References -- Piggybacking Lightweight Control Messages on Physical Layer for Multicarrier Wireless LANs -- 1 Introduction -- 2 Overview of PhyPig -- 3 Feasibility of PhyPig -- 3.1 Frequency Selective Fading -- 3.2 Symbol Error Pattern -- 3.3 Extra Coding Redundancy -- 4 PhyPig Design -- 4.1 Overall System Architecture -- 4.2 Modulation/Demodulation of Control Messages -- 4.3 Rate Selection of Control Messages -- 5 Evaluation -- 5.1 Accuracy of PhyPig Detection -- 5.2 Rate of Control Messages -- 5.3 Applications of PhyPig -- 6 Conclusion -- References -- Multi-focus Image Fusion via Region Mosaicing on Contrast Pyramids -- Abstract -- 1 Introduction -- 2 Focus Region Segmentation -- 2.1 Pixel Level Focus Measurement -- 2.2 Focus Region Segmentation -- 3 Region Mosaicing on Contrast Pyramids -- 3.1 Contrast Pyramid Fusion -- 3.2 Region Based Contrast Pyramid Fusion -- 4 Experiments -- 5 Conclusions -- Acknowledgement -- References -- Distributed Constrained Optimization Over Cloud-Based Multi-agent Networks -- 1 Introduction -- 2 Algorithm Development -- 2.1 Brief Review of ADMM -- 2.2 Distributed Constrained Optimization -- 3 Implementation Issues -- 3.1 Algorithm Outline.
3.2 Early Termination of Inner Loops -- 3.3 Comparisons with Existing Works -- 4 Numerical Experiments -- 5 Conclusions -- References -- Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles -- 1 Introduction -- 2 Related Work -- 3 Probabilistic Path Inference Model -- 3.1 Problem Definition -- 3.2 Unified Inference Model -- 4 Collaborative Tensor Filter -- 4.1 Tensor Construction -- 4.2 Tensor Decomposition with Regularization -- 4.3 Dynamic Feature Extraction -- 4.4 System Framework -- 5 Experiments -- 5.1 Settings -- 5.2 Evaluation Approach -- 5.3 Results -- 6 Conclusion -- References -- NFC Secure Payment and Verification Scheme for Mobile Payment -- Abstract -- 1 Introduction -- 2 NFC Mobile Electronic Ticket System -- 2.1 Scheme Structure -- 2.2 CS E-Ticket -- 2.3 CS E-Ticket NFC Payment Scheme -- 2.4 Offline CS E-Ticket Secure Verification -- 3 Security Analysis of NFC Mobile Electronic Ticket System -- 3.1 Security Analysis -- 3.2 Practicability Analysis -- 4 Conclusions -- Acknowledgment -- References -- Multi-path Reliable Routing with Pipeline Schedule in Wireless Sensor Networks -- 1 Introduction -- 2 Protocol Design -- 2.1 Establish Conversion Relationship Between Multi-paths -- 2.2 Conversion Between Multi-paths and Pipeline -- 3 The Selection of Scheduling Time in Assemble Line -- 3.1 Pipeline State's Classification -- 3.2 Prediction Algorithm Based on Markov Chain -- 4 Experiment and Analysis -- 4.1 The Impact of Sampling Period -- 4.2 The Impact of the Number of Pipeline Segment -- 4.3 The Impact of Predicting Time -- 5 Conclusion -- References -- A QoE-Aware Adaptive Spectrum Allocation Framework for Secondary Mobile Networks -- 1 Introduction -- 2 Adaptive Framework for Spectrum Allocation in Secondary Mobile Network -- 2.1 Service Model -- 2.2 Adaptive Spectrum Allocation Strategies.
3 Determining System Performance -- 4 Numerical Results -- 5 Conclusion and Future Directions -- References -- Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks -- 1 Introduction -- 2 Network Model and Problem Statement -- 2.1 Network Model -- 2.2 Block Error Rate -- 2.3 Decoding Requirement -- 2.4 Bound for Broadcast Traffic -- 2.5 Objective Function -- 2.6 Approximation of Primal Optimization Problem -- 3 Distributed Algorithm Design -- 4 Performance Evaluation -- 4.1 Influence of Different Link Conditions -- 4.2 Influence of Weight on Traffic Allocation -- 5 Conclusion -- References -- Identifying Discrepant Tags in RFID-enabled Supply Chains -- 1 Introduction -- 2 Problem Formulation -- 3 Deterministic Identification Protocol -- 4 Probabilistic Identification Protocol with Estimation -- 5 Evaluation -- 5.1 Experimental Comparison -- 6 Related Work -- 7 Concluding Remarks -- Appendix: -- References -- SHMDRS: A Smartphone-Based Human Motion Detection and Response System -- 1 Introduction -- 2 Overview of the System -- 3 The Human Motion Detection Module -- 3.1 Software Architecture -- 3.2 Data Acquisition and Collection -- 3.3 Data Processing and Machine Learning -- 3.4 Light-Kernel and Server-Free Design -- 4 The Response and Controller Module -- 5 The Location Retrieving Module -- 6 Experimental Results -- 7 Related Works -- 8 Conclusion -- References -- iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running -- 1 Introduction -- 2 Background -- 3 Data Collection -- 4 System Design -- 4.1 Preprocess -- 4.2 Segmentation -- 4.3 Feature Extraction -- 4.4 Detect Warm-Up Phase -- 5 Evaluation -- 5.1 Slide Window Size -- 5.2 Proper Multi-class Classifier -- 6 Related Work -- 7 Conclusion -- References -- iBeaconing: A Low-Cost, Wireless Student Protection System -- 1 Introduction.
2 Related Work -- 3 Overall System Design -- 3.1 Beacon Scanning -- 3.2 Alert Data Transmission -- 4 System Components -- 4.1 The Bluetooth Scanners -- 4.2 The Central Webserver and Database -- 4.3 The Smartphone Application -- 5 Implementation -- 5.1 Installation -- 5.2 Cost -- 5.3 Evaluation -- 6 Conclusion -- References -- The Power Control Strategy for Mine Locomotive Wireless Network Based on Successive Interference Cancellation -- 1 Introduction -- 2 Mine Locomotive Wireless Networks -- 2.1 Network Model -- 2.2 Problem Formulation -- 2.3 Reformulation -- 3 Polynomial-Time Algorithm -- 4 Simulation Results -- 4.1 Results for a Wireless Network with 20 Locomotives -- 4.2 Results for All Network Instances -- 5 Conclusions -- References -- ESRS: An Efficient and Secure Relay Selection Algorithm for Mobile Social Networks -- 1 Introduction -- 2 Related Work -- 3 Problem Description -- 4 An Efficient and Secure Relay Selection Algorithm -- 4.1 Payoff Functions -- 4.2 Relay Selection Based on the Network Formation Game -- 4.3 Stability Analysis -- 5 Simulation -- 5.1 Simulation Study Using the Synthetic Trace -- 5.2 Simulation Study Using the Real-World Trace -- 6 Conclusion -- References -- Energy Detection of Gaussian Signals Subject to Impulsive Noise in Generalized Fading Channels -- 1 Introduction -- 2 The Energy Detector -- 2.1 Hypothesis H0 -- 2.2 Hypothesis H1 -- 3 Generalized Fading Channels -- 3.1 The - Distribution -- 3.2 The - Distribution -- 3.3 The - Distribution -- 4 Numerical Analysis -- 4.1 Cooperative Sensing -- 5 Conclusion -- Appendix A -- References -- Distance Bounding Protocol for RFID Systems -- 1 Introduction -- 2 The SMDB Protocol -- 2.1 Slow Exchange Phase -- 2.2 Rapid Bit Exchange Phase -- 2.3 Verification Phase -- 2.4 Identifier Update Phase -- 3 Security Analysis of the SMDB Protocol.
3.1 Analysis on Impersonation Attacks.
Record Nr. UNINA-9910483867303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui