Abstract: Because current wireless communication requires high
reliability in a limited bandwidth environment, this paper proposes
the variable modulation scheme based on the codebook. The variable
modulation scheme adjusts transmission power using the codebook in
accordance with channel state. Also, if the codebook is composed of
many bits, the reliability is more improved by the proposed scheme.
The simulation results show that the performance of proposed scheme
has better reliability than the the performance of conventional scheme.
Abstract: Wireless Sensor Networks (WSNs) enable new
applications and need non-conventional paradigms for the protocol
because of energy and bandwidth constraints, In WSN, sensor node’s
life is a critical parameter. Research on life extension is based on
Low-Energy Adaptive Clustering Hierarchy (LEACH) scheme,
which rotates Cluster Head (CH) among sensor nodes to distribute
energy consumption over all network nodes. CH selection in WSN
affects network energy efficiency greatly. This study proposes an
improved CH selection for efficient data aggregation in sensor
networks. This new algorithm is based on Bacterial Foraging
Optimization (BFO) incorporated in LEACH.
Abstract: In this communication, a low-cost circularly
polarized wire antenna exhibiting improved gain performance for
Dedicated Short Range Communications (DSRC), vehicle-to-vehicle
(V2V) and vehicle-to-infrastructure (V2I) communications is
presented. The proposed antenna comprises a Y-shaped quarterwavelength
monopole antenna surrounded by two iterations of eight
conductive arched walls acting as parasitic elements to enhance the
overall antenna gain and to shape the radiation pattern in the H-plane.
A hemispherical radome shell is added to protect the antenna
structure and its effect on the antenna performance is discussed. The
designed antenna demonstrates antenna gain of 8.2 dB with
omnidirectional far-field radiation pattern in the H-plane. The gain of
the proposed antenna is also compared with the characteristic of the
stand-alone Y-shaped monopole to highlight the advantages of the
proposed approach.
Abstract: Mobile Ad hoc Network is a set of self-governing
nodes which communicate through wireless links. Dynamic topology
MANETs makes routing a challenging task. Various routing
protocols are there, but due to various fundamental characteristic
open medium, changing topology, distributed collaboration and
constrained capability, these protocols are tend to various types of
security attacks. Black hole is one among them. In this attack,
malicious node represents itself as having the shortest path to the
destination but that path not even exists. In this paper, we aim to
develop a routing protocol for detection and prevention of black hole
attack by modifying AODV routing protocol. This protocol is able to
detect and prevent the black hole attack. Simulation is done using
NS-2, which shows the improvement in network performance.
Abstract: File sharing in networks is generally achieved using
Peer-to-Peer (P2P) applications. Structured P2P approaches are
widely used in adhoc networks due to its distributed and scalability
features. Efficient mechanisms are required to handle the huge
amount of data distributed to all peers. The intrinsic characteristics of
P2P system makes for easier content distribution when compared to
client-server architecture. All the nodes in a P2P network act as both
client and server, thus, distributing data takes lesser time when
compared to the client-server method. CHORD protocol is a resource
routing based where nodes and data items are structured into a 1-
dimensional ring. The structured lookup algorithm of Chord is
advantageous for distributed P2P networking applications. However,
structured approach improves lookup performance in a high
bandwidth wired network it could contribute to unnecessary overhead
in overlay networks leading to degradation of network performance.
In this paper, the performance of existing CHORD protocol on
Wireless Mesh Network (WMN) when nodes are static and dynamic
is investigated.
Abstract: A novel chromium-free protective coating films based
on a zeolite coating was growing onto a FeCrAlloy metal using in –
situ hydrothermal method. The zeolite film was obtained using in-situ
crystallization process that is capable of coating large surfaces with
complex shape and in confined spaces has been developed. The
zeolite coating offers an advantage of a high mechanical stability and
thermal stability. The physicochemical properties were investigated
using X-ray diffraction (XRD), Electron Microscopy (SEM), Energy
Dispersive X–ray Analysis (EDX) and Thermogravimetric Analysis
(TGA). The transition from oxide-on-alloy wires to hydrothermally
synthesised uniformly zeolite coated surfaces was followed using
SEM and XRD. In addition, the robustness of the prepared coating
was confirmed by subjecting these to thermal cycling (ambient to
550oC).
Abstract: Particle size distribution, the most important
characteristics of aerosols, is obtained through electrical
characterization techniques. The dynamics of charged nanoparticles
under the influence of electric field in Electrical Mobility
Spectrometer (EMS) reveals the size distribution of these particles.
The accuracy of this measurement is influenced by flow conditions,
geometry, electric field and particle charging process, therefore by
the transfer function (transfer matrix) of the instrument. In this work,
a wire-cylinder corona charger was designed and the combined fielddiffusion
charging process of injected poly-disperse aerosol particles
was numerically simulated as a prerequisite for the study of a
multichannel EMS. The result, a cloud of particles with no uniform
charge distribution, was introduced to the EMS. The flow pattern and
electric field in the EMS were simulated using Computational Fluid
Dynamics (CFD) to obtain particle trajectories in the device and
therefore to calculate the reported signal by each electrometer.
According to the output signals (resulted from bombardment of
particles and transferring their charges as currents), we proposed a
modification to the size of detecting rings (which are connected to
electrometers) in order to evaluate particle size distributions more
accurately. Based on the capability of the system to transfer
information contents about size distribution of the injected particles,
we proposed a benchmark for the assessment of optimality of the
design. This method applies the concept of Von Neumann entropy
and borrows the definition of entropy from information theory
(Shannon entropy) to measure optimality. Entropy, according to the
Shannon entropy, is the ''average amount of information contained in
an event, sample or character extracted from a data stream''.
Evaluating the responses (signals) which were obtained via various
configurations of detecting rings, the best configuration which gave
the best predictions about the size distributions of injected particles,
was the modified configuration. It was also the one that had the
maximum amount of entropy. A reasonable consistency was also
observed between the accuracy of the predictions and the entropy
content of each configuration. In this method, entropy is extracted
from the transfer matrix of the instrument for each configuration.
Ultimately, various clouds of particles were introduced to the
simulations and predicted size distributions were compared to the
exact size distributions.
Abstract: Mobile Adhoc Networks (MANETs) are
infrastructure-less, dynamic network of collections of wireless mobile
nodes communicating with each other without any centralized
authority. A MANET is a mobile device of interconnections through
wireless links, forming a dynamic topology. Routing protocols have a
big role in data transmission across a network. Routing protocols,
two major classifications are unipath and multipath. This study
evaluates performance of an on-demand multipath routing protocol
named Adhoc On-demand Multipath Distance Vector routing
(AOMDV). This study proposes Energy Aware AOMDV (EAAOMDV)
an extension of AOMDV which decreases energy
consumed on a route.
Abstract: Based on application requirements, nodes are static or
mobile in Wireless Sensor Networks (WSNs). Mobility poses
challenges in protocol design, especially at the link layer requiring
mobility adaptation algorithms to localize mobile nodes and predict
link quality to be established with them. This study implements
XMAC and Berkeley Media Access Control (BMAC) routing
protocols to evaluate performance under WSN’s static and mobility
conditions. This paper gives a comparative study of mobility-aware
MAC protocols. Routing protocol performance, based on Average
End to End Delay, Average Packet Delivery Ratio, Average Number
of hops, and Jitter is evaluated.
Abstract: The lifetime of a wireless sensor network can be
effectively increased by using scheduling operations. Once the
sensors are randomly deployed, the task at hand is to find the largest
number of disjoint sets of sensors such that every sensor set provides
complete coverage of the target area. At any instant, only one of these
disjoint sets is switched on, while all other are switched off. This
paper proposes a heuristic search method to find the maximum
number of disjoint sets that completely cover the region. A
population of randomly initialized members is made to explore the
solution space. A set of heuristics has been applied to guide the
members to a possible solution in their neighborhood. The heuristics
escalate the convergence of the algorithm. The best solution explored
by the population is recorded and is continuously updated. The
proposed algorithm has been tested for applications which require
sensing of multiple target points, referred to as point coverage
applications. Results show that the proposed algorithm outclasses the
existing algorithms. It always finds the optimum solution, and that
too by making fewer number of fitness function evaluations than the
existing approaches.
Abstract: Nanotechnology has become the world attention in
various applications including the solar cells devices due to the
uniqueness and benefits of achieving low cost and better
performances of devices. Recently, thin film solar cells such as
Cadmium Telluride (CdTe), Copper-Indium-Gallium-diSelenide
(CIGS), Copper-Zinc-Tin-Sulphide (CZTS), and Dye-Sensitized
Solar Cells (DSSC) enhanced by nanotechnology have attracted
much attention. Thus, a compilation of nanotechnology devices
giving the progress in the solar cells has been presented. It is much
related to nanoparticles or nanocrystallines, carbon nanotubes, and
nanowires or nanorods structures.
Abstract: An Acoustic Micro-Energy Harvester (AMEH) is
developed to convert wasted acoustical energy into useful electrical
energy. AMEH is mathematically modeled using Lumped Element
Modelling (LEM) and Euler-Bernoulli beam (EBB) modelling. An
experiment is designed to validate the mathematical model and assess
the feasibility of AMEH. Comparison of theoretical and experimental
data on critical parameter value such as Mm, Cms, dm and Ceb showed
the variances are within 1% to 6%, which is reasonably acceptable.
Then, AMEH undergoes bandwidth tuning for performance
optimization. The AMEH successfully produces 0.9V/(m/s^2) and
1.79μW/(m^2/s^4) at 60Hz and 400kΩ resistive load which only
show variances about 7% compared to theoretical data. At 1g and
60Hz resonance frequency, the averaged power output is about
2.2mW which fulfilled a range of wireless sensors and
communication peripherals power requirements. Finally, the design
for AMEH is assessed, validated and deemed as a feasible design.
Abstract: Construction projects are information intensive in
nature and involve many activities that are related to each other.
Wireless technologies can be used to improve the accuracy and
timeliness of data collected from construction sites and shares it with
appropriate parties. Nonetheless, the construction industry tends to be
conservative and shows hesitation to adopt new technologies. A main
concern for owners, contractors or any person in charge on a job site
is the cost of the technology in question. Wireless technologies are
not cheap. There are a lot of expenses to be taken into consideration,
and a study should be completed to make sure that the importance
and savings resulting from the usage of this technology is worth the
expenses. This research attempts to assess the effectiveness of using
the appropriate wireless technologies based on criteria such as
performance, reliability, and risk. The assessment is based on a utility
function model that breaks down the selection issue into alternatives
attribute. Then the attributes are assigned weights and single
attributes are measured. Finally, single attribute are combined to
develop one single aggregate utility index for each alternative.
Abstract: This paper presents Carrier Sense Multiple Access
(CSMA) communication models based on SoC design methodology.
Such a model can be used to support the modeling of the complex
wireless communication systems. Therefore, the use of such
communication model is an important technique in the construction
of high-performance communication. SystemC has been chosen
because it provides a homogeneous design flow for complex designs
(i.e. SoC and IP-based design). We use a swarm system to validate
CSMA designed model and to show how advantages of incorporating
communication early in the design process. The wireless
communication created through the modeling of CSMA protocol that
can be used to achieve communication between all the agents and to
coordinate access to the shared medium (channel).
Abstract: In recent years, multi-antenna techniques are being considered as a potential solution to increase the flow of future wireless communication systems. The objective of this article is to study the emission and reception system MIMO (Multiple Input Multiple Output), and present the different reception decoding techniques. First we will present the least complex technical, linear receivers such as the zero forcing equalizer (ZF) and minimum mean squared error (MMSE). Then a nonlinear technique called ordered successive cancellation of interferences (OSIC) and the optimal detector based on the maximum likelihood criterion (ML), finally, we simulate the associated decoding algorithms for MIMO system such as ZF, MMSE, OSIC and ML, thus a comparison of performance of these algorithms in MIMO context.
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: A sensory network consists of multiple detection
locations called sensor nodes, each of which is tiny, featherweight
and portable. A single path routing protocols in wireless sensor
network can lead to holes in the network, since only the nodes
present in the single path is used for the data transmission. Apart
from the advantages like reduced computation, complexity and
resource utilization, there are some drawbacks like throughput,
increased traffic load and delay in data delivery. Therefore, multipath
routing protocols are preferred for WSN. Distributing the traffic
among multiple paths increases the network lifetime. We propose a
scheme, for the data to be transmitted through a dominant path to
save energy. In order to obtain a high delivery ratio, a basic route
reconstruction protocol is utilized to reconstruct the path whenever a
failure is detected. A basic reconstruction routing (BRR) algorithm is
proposed, in which a node can leap over path failure by using the
already existing routing information from its neighbourhood while
the composed data is transmitted from the source to the sink. In order
to save the energy and attain high data delivery ratio, data is
transmitted along a multiple path, which is achieved by BRR
algorithm whenever a failure is detected. Further, the analysis of
how the proposed protocol overcomes the drawback of the existing
protocols is presented. The performance of our protocol is compared
to AOMDV and energy efficient node-disjoint multipath routing
protocol (EENDMRP). The system is implemented using NS-2.34.
The simulation results show that the proposed protocol has high
delivery ratio with low energy consumption.
Abstract: This paper introduces a video sharing platform based
on WiFi, which consists of camera, mobile phone and PC server. This
platform can receive wireless signal from the camera and show the live
video on the mobile phone captured by camera. In addition, it is able to
send commands to camera and control the camera’s holder to rotate.
The platform can be applied to interactive teaching and dangerous
area’s monitoring and so on. Testing results show that the platform can
share the live video of mobile phone. Furthermore, if the system’s PC
server and the camera and many mobile phones are connected
together, it can transfer photos concurrently.
Abstract: The Trustworthy link failure recovery algorithm is
introduced in this paper, to provide the forwarding continuity even
with compound link failures. The ephemeral failures are common in
IP networks and it also has some proposals based on local rerouting.
To ensure forwarding continuity, we are introducing the compound
link failure recovery algorithm, even with compound link failures.
For forwarding the information, each packet carries a blacklist, which
is a min set of failed links encountered along its path, and the next
hop is chosen by excluding the blacklisted links. Our proposed
method describes how it can be applied to ensure forwarding to all
reachable destinations in case of any two or more link or node
failures in the network. After simulating with NS2 contains lot of
samples proved that the proposed protocol achieves exceptional
concert even under elevated node mobility using Trustworthy link
Failure Recovery Algorithm.
Abstract: The 5th generation of mobile networks is term used in
various research papers and projects to identify the next major phase
of mobile telecommunications standards. 5G wireless networks will
support higher peak data rate, lower latency and provide best
connections with QoS guarantees.
In this article, we discuss various promising technologies for 5G
wireless communication systems, such as IPv6 support, World Wide
Wireless Web (WWWW), Dynamic Adhoc Wireless Networks
(DAWN), BEAM DIVISION MULTIPLE ACCESS (BDMA), Cloud
Computing, cognitive radio technology and FBMC/OQAM.
This paper is organized as follows: First, we will give introduction
to 5G systems, present some goals and requirements of 5G. In the
next, basic differences between 4G and 5G are given, after we talk
about key technology innovations of 5G systems and finally we will
conclude in last Section.