Abstract: Recently, there is a lot of interest in the field of under
water optical wireless communication for short range because of
its high bandwidth. But in most of the previous works line of
sight propagation or single scattering of photons only considered.
In practical case this is not applicable because of beam blockage in
underwater and multiple scattering also occurred during the photons
propagation through water. In this paper we consider a non-line
of sight underwater wireless optical communication system with
multiple scattering and examine the performance of the system using
monte carlo simulation. The distribution scattering angle of photons
are modeled by Henyey-Greenstein method. The average bit error
rate is calculated using on-off keying modulation for different water
types.
Abstract: In this article we will study the elliptic curve defined
over the ring An and we define the mathematical operations of ECC,
which provides a high security and advantage for wireless
applications compared to other asymmetric key cryptosystem.
Abstract: Wireless Sensor Networks (WSNs) have wide variety
of applications and provide limitless future potentials. Nodes in
WSNs are prone to failure due to energy depletion, hardware failure,
communication link errors, malicious attacks, and so on. Therefore,
fault tolerance is one of the critical issues in WSNs. We study how
fault tolerance is addressed in different applications of WSNs. Fault
tolerant routing is a critical task for sensor networks operating in
dynamic environments. Many routing, power management, and data
dissemination protocols have been specifically designed for WSNs
where energy awareness is an essential design issue. The focus,
however, has been given to the routing protocols which might differ
depending on the application and network architecture.
Abstract: Now in some countries of the world the cellular
market is on the point of saturation, in others - positive dynamics of
development kept on. The reasons for it are also different, but there
are united by their general susceptibility to innovation changes, if
they are really innovative. If to take as an example the cellular market
of Kazakhstan it is defined by the low percent of smart phones at
consumers, the low population density, undercapacity of the 3G
channel, and absence of universal access to the LTE technology that
limits dynamical growth of this branch. These moments are
aggravated by failures of starting commercial projects by private
companies which prevent to be implemented and widely adopted to a
new product among consumers. The object of the research is possible
integration of wireless and program technologies at which
introduction the idea can regenerate in an innovation. The analysis of
existing projects in the market and the possible union of the
technologies through a prism of theoretical bases of innovative
activity shows that efficiency of the company by development and
introduction of innovations is possible only thanks to strict
observance of all terms and conditions of the innovative process
which main term is profit. Despite that fact that on a global scale the
innovativeness issue of companies is very popular, there are no
researches about possibility of innovative breaks in the field of
wireless access to the Internet in the cellular market of Kazakhstan.
Abstract: IEEE 802.11a/b/g standards provide multiple
transmission rates, which can be changed dynamically according to the
channel condition. Cooperative communications were introduced to
improve the overall performance of wireless LANs with the help of
relay nodes with higher transmission rates. The cooperative
communications are based on the fact that the transmission is much
faster when sending data packets to a destination node through a relay
node with higher transmission rate, rather than sending data directly to
the destination node at low transmission rate. To apply the cooperative
communications in wireless LAN, several MAC protocols have been
proposed. Some of them can result in collisions among relay nodes in a
dense network. In order to solve this problem, we propose a new
protocol. Relay nodes are grouped based on their transmission rates.
And then, relay nodes only in the highest group try to get channel
access. Performance evaluation is conducted using simulation, and
shows that the proposed protocol significantly outperforms the
previous protocol in terms of throughput and collision probability.
Abstract: IEEE 802.16 (WiMAX) aims to present high speed
wireless access to cover wide range coverage. The base station (BS)
and the subscriber station (SS) are the main parts of WiMAX.
WiMAX uses either Point-to-Multipoint (PMP) or mesh topologies.
In the PMP mode, the SSs connect to the BS to gain access to the
network. However, in the mesh mode, the SSs connect to each other
to gain access to the BS.
The main components of QoS management in the 802.16 standard
are the admission control, buffer management and packet scheduling.
In this paper, we use QualNet 5.0.2 to study the performance of
different scheduling schemes, such as WFQ, SCFQ, RR and SP when
the numbers of SSs increase. We find that when the number of SSs
increases, the average jitter and average end-to-end delay is increased
and the throughput is reduced.
Abstract: A compact UWB planar antenna fed with a
microstrip-line is proposed. The new design consist of a rectangular
patch with symmetric l-shaped slots and fed by 50 Ω microstrip
transmission line and a reduced ground-plane which have a periodic
slots with an overall size of 47 mm x 20 mm. It is intended to be used
in wireless applications that cover the ultra-wideband (UWB)
frequency band. A wider impedance bandwidth of around 116.5%
(1.875 – 7.115 GHz) with stable radiation pattern is achieved. The
proposed antenna has excellent characteristics, low profile and costeffective
compared to existing UWB antennas. The UWB antenna is
designed and analyzed using CST Microwave Studio in transient
mode to verify antenna parameters improvements.
Abstract: The emerging Cognitive Radio is combo of both the
technologies i.e. Radio dynamics and software technology. It involve
wireless system with efficient coding, designing, and making them
artificial intelligent to take the decision according to the surrounding
environment and adopt themselves accordingly, so as to deliver the
best QoS. This is the breakthrough from fixed hardware and fixed
utilization of the spectrum. This software-defined approach of
research is centralized at user-definition and application driven
model, various software method are used for the optimization of the
wireless communication. This paper focused on the Spectrum
allocation technique using genetic algorithm GA to evolve radio,
represented by chromosomes. The chromosomes gene represents the
adjustable parameters in given radio and by using GA, evolving over
the generations, the optimized set of parameters are evolved, as per
the requirement of user and availability of the spectrum, in our
prototype the gene consist of 6 different parameters, and the best set
of parameters are evolved according to the application need and
availability of the spectrum holes and thus maintaining best QoS for
user, simultaneously maintaining licensed user rights. The analyzing
tool Matlab is used for the performance of the prototype.
Abstract: This paper presents analysis and design of a wideband
Wilkinson power divider for wireless applications. The design is
accomplished by transforming the lengths and impedances of the
quarter wavelength sections of the conventional Wilkinson power
divider into U-shaped sections. The designed power divider is
simulated by using ADS Agilent technologies and CST microwave
studio software. It is shown that the proposed power divider has
simple topology and good performances in terms of insertion loss,
port matching and isolation at all operating frequencies (1.8 GHz,
2.45 GHz and 3.55 GHz).
Abstract: Vertical Handover(VHO) among different
communication technologies ensuring uninterruption and service
continuity is one of the most important performance parameter in
Heterogenous networks environment. In an integrated Universal
Mobile Telecommunicatin System(UMTS) and Wireless Local
Area Network(WLAN), WLAN is given an inherent priority over
UMTS because of its high data rates with low cost. Therefore
mobile users want to be associated with WLAN maximum of the
time while roaming, to enjoy best possible services with low cost.
That encourages reduction of number of VHO. In this work the
reduction of number of VHO with respect to varying number of
WLAN Access Points(APs) in an integrated UMTS and WLAN
network is investigated through simulation to provide best possible
cost effective service to the users. The simulation has been carried
out for an area (7800 × 9006)m2 where COST-231 Hata model
and 3GPP (TR 101 112 V 3.1.0) specified models are used for
WLAN and UMTS path loss models respectively. The handover
decision is triggered based on the received signal level as compared
to the fade margin. Fade margin gives a probabilistic measure of
the reliability of the communication link. A relationship between
number of WLAN APs and the number of VHO is also established
in this work.
Abstract: Wireless mesh networking is rapidly gaining in
popularity with a variety of users: from municipalities to enterprises,
from telecom service providers to public safety and military
organizations. This increasing popularity is based on two basic facts:
ease of deployment and increase in network capacity expressed in
bandwidth per footage; WMNs do not rely on any fixed
infrastructure. Many efforts have been used to maximizing
throughput of the network in a multi-channel multi-radio wireless
mesh network. Current approaches are purely based on either static or
dynamic channel allocation approaches. In this paper, we use a
hybrid multichannel multi radio wireless mesh networking
architecture, where static and dynamic interfaces are built in the
nodes. Dynamic Adaptive Channel Allocation protocol (DACA), it
considers optimization for both throughput and delay in the channel
allocation. The assignment of the channel has been allocated to be codependent
with the routing problem in the wireless mesh network and
that should be based on passage flow on every link. Temporal and
spatial relationship rises to re compute the channel assignment every
time when the pattern changes in mesh network, channel assignment
algorithms assign channels in network. In this paper a computing
path which captures the available path bandwidth is the proposed
information and the proficient routing protocol based on the new path
which provides both static and dynamic links. The consistency
property guarantees that each node makes an appropriate packet
forwarding decision and balancing the control usage of the network,
so that a data packet will traverse through the right path.
Abstract: In this study, data loss tolerance of Support Vector Machines (SVM) based activity recognition model and multi activity classification performance when data are received over a lossy wireless sensor network is examined. Initially, the classification algorithm we use is evaluated in terms of resilience to random data loss with 3D acceleration sensor data for sitting, lying, walking and standing actions. The results show that the proposed classification method can recognize these activities successfully despite high data loss. Secondly, the effect of differentiated quality of service performance on activity recognition success is measured with activity data acquired from a multi hop wireless sensor network, which introduces high data loss. The effect of number of nodes on the reliability and multi activity classification success is demonstrated in simulation environment. To the best of our knowledge, the effect of data loss in a wireless sensor network on activity detection success rate of an SVM based classification algorithm has not been studied before.
Abstract: Many wireless sensor network applications require
K-coverage of the monitored area. In this paper, we propose a
scalable harmony search based algorithm in terms of execution
time, K-Coverage Enhancement Algorithm (KCEA), it attempts to
enhance initial coverage, and achieve the required K-coverage degree
for a specific application efficiently. Simulation results show that
the proposed algorithm achieves coverage improvement of 5.34%
compared to K-Coverage Rate Deployment (K-CRD), which achieves
1.31% when deploying one additional sensor. Moreover, the proposed
algorithm is more time efficient.
Abstract: The ad hoc networks are the future of wireless
technology as everyone wants fast and accurate error free information
so keeping this in mind Bit Error Rate (BER) and power is optimized
in this research paper by using the Genetic Algorithm (GA). The
digital modulation techniques used for this paper are Binary Phase
Shift Keying (BPSK), M-ary Phase Shift Keying (M-ary PSK), and
Quadrature Amplitude Modulation (QAM). This work is
implemented on Wireless Ad Hoc Networks (WLAN). Then it is
analyze which modulation technique is performing well to optimize
the BER and power of WLAN.
Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.
Abstract: The demand of high quality services has fueled
dimensional research and development in wireless communications
and networking. As a result, different wireless technologies like
Wireless LAN, CDMA, GSM, UMTS, MANET, Bluetooth and
satellite networks etc. have emerged in the last two decades. Future
networks capable of carrying multimedia traffic need IP convergence,
portability, seamless roaming and scalability among the existing
networking technologies without changing the core part of the
existing communications networks. To fulfill these goals, the present
networking systems are required to work in cooperation to ensure
technological independence, seamless roaming, high security and
authentication, guaranteed Quality of Services (QoS). In this paper, a
conceptual framework for a cooperative network (CN) is proposed
for integration of heterogeneous existing networks to meet out the
requirements of the next generation wireless networks.
Abstract: In wireless communication, space-time block code (STBC), cyclic delay diversity (CDD) and space-time cyclic delay diversity (STCDD)are used as the spatial diversity schemes and have been widely studied for the reliablecommunication. If these schemes are used, the communication system can obtain the improved performance. However,the quality of the system is degraded when the distance between a source and a destination is distant in wireless communication system. In this paper, the cooperative transmission scheme using two sources is proposed and improves the performance of the wireless communication system.
Abstract: Images are important source of information used as
evidence during any investigation process. Their clarity and accuracy
is essential and of the utmost importance for any investigation.
Images are vulnerable to losing blocks and having noise added to
them either after alteration or when the image was taken initially,
therefore, having a high performance image processing system and it
is implementation is very important in a forensic point of view. This
paper focuses on improving the quality of the forensic images.
For different reasons packets that store data can be affected,
harmed or even lost because of noise. For example, sending the
image through a wireless channel can cause loss of bits. These types
of errors might give difficulties generally for the visual display
quality of the forensic images.
Two of the images problems: noise and losing blocks are covered.
However, information which gets transmitted through any way of
communication may suffer alteration from its original state or even
lose important data due to the channel noise. Therefore, a developed
system is introduced to improve the quality and clarity of the forensic
images.
Abstract: Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.
Abstract: Wireless sensor network is vulnerable to a wide range
of attacks. Recover secrecy after compromise, to develop technique
that can detect intrusions and able to resilient networks that isolates
the point(s) of intrusion while maintaining network connectivity for
other legitimate users. To define new security metrics to evaluate
collaborative intrusion resilience protocol, by leveraging the sensor
mobility that allows compromised sensors to recover secure state
after compromise. This is obtained with very low overhead and in a
fully distributed fashion using extensive simulations support our
findings.