SlideShare a Scribd company logo
1 of 17
Download to read offline
TOP CITED ARTICLES IN MOBILE NETWORK
COMMUNICATIONS & TELEMATICS RESEARCH
ARTICLES
INTERNATIONAL JOURNAL OF MOBILE NETWORK
COMMUNICATIONS & TELEMATICS (IJMNCT)
ISSN: 1839 – 5678
http://wireilla.com/ijmnct/index.html
Citation Count – 12
A VERTICAL HANDOVER DECISION APPROACHES IN NEXT GENERATION
WIRELESS NETWORKS: A SURVEY
Harsha A. Bhute1
, Dr. P.P Karde2
, Dr. V.M. Thakare3
1
Department of Computer Engineering, Sinhgad College of Engineering, Pune, India
2
Department of Information Technology, Government Polytechnic, Professor, Amravati, India
3
Professor & Head, Department of Computer Science, SGBAU, Amravati University, Amravati, India
ABSTRACT
In next generation wireless network the most desirable feature is its ability to move seamlessly over various
access network regardless of the network infrastructure is used. The handover between these dissimilar networks
can be explored by using vertical handover algorithms. This paper focuses on the vertical handover decision
methods and algorithms effectiveness. Most of the algorithms which are based on RSS values provide vertical
handover with small delay at a lower rate of throughput. There are such algorithms which provide significant
improvements in throughput but at a cost of higher delays. As per the need for the real time applications in next
generation wireless networks there is a requirement of developing new optimized algorithms that are able to
produce high throughput and minimizing signaling cost and delay.
KEYWORDS
Vertical handover, QoS, mobile networks, next generation wireless networks.
FOR MORE DETAILS: https://wireilla.com/papers/ijmnct/V4N2/4214ijmnct04.pdf
VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
REFERENCES
[1] O. Ormond, G. Muntean and J. Murphy, “Network Selection Strategy in Heterogeneous Wireless Networks,”
Proc. of IT&T 2005: Information Technology and Telecommunications, pp. 175-184, Cork, October 2005.
[2] L.-J. Chen, G. Yang, T. Sun, M.Y. Sanadidi, M. Gerla, “Enhancing QoS support for vertical handovers using
implicit/explicit handover notifications,” In 2nd IEEE International Conference on Quality of Service in
Heterogeneous Wired/Wireless Networks, pp. 8-37, 2005.
[3] Y.C. Chen, J.H. Hsia and Y.J. Liao, “Advanced seamless vertical handover architecture for WiMA and WiFi
heterogeneous networks with QoS guarantees,” Computer Communications, Volume 32 Issue 2, February 2009,
Pages 281-293.
[4] L. J. Chen et al, “A smart decision model for vertical handover,” In Proc. of the 4th International Workshop
on Wireless Internet and Reconfigurability. (ANWIRE 2004), Athens, Greece, May 2004.
[5] A. H. Zahran, B. Liang, and A. Saleh, “Signal threshold adaptation for vertical handover in heterogeneous
wireless networks,” Mobile Networks and Applications, vol. 11, no. 4, pp. 625-640, August 2006.
[6] I.F. Akyildiz, J. McNair, J.S.M. Ho, H. Uzunalioglu, W. Wang, “Mobility management in nextgeneration
wireless systems,” Proceedings of the IEEE, vol. 87, no. 8, pp. 1347-1384, August 1999.
[7] F. Zhu and J. McNair, “Optimizations for vertical handover decision algorithms,” In Proceedings of the 2004
IEEE Wireless Communications and Networking Conference (WCNC 2004), vol. 2, pp. 867–872, 2004.
[8] S. Balasubramaniam and J. Indulska, “Vertical handover supporting pervasive computing in future wireless
networks,” Computer Communications, vol. 27, no. 8, pp. 708–719, 2004.
[9] H. Wang, R. Katz, J. Giese, “Policy-enabled handovers across heterogeneous wireless networks,” Second
IEEE Workshop on Mobile Computing Systems and Applications, 1999 (Proceedings WMCSA’99), 1999, pp.
51-60.
[10] S. Quiqyang and A. Jamalipour, “A network selection mechanism for next generation networks,” In
International Conference of Communications, 2005 (ICC 2005), vol. 2, 2005, pp. 1418–1422.
[11] W. Zhang, “Handover Decision Using Fuzzy MADM in heterogeneous networks,” In Proc. IEEE
WCNC’05, New Or-leans, LA March 2005.
[12] Y. Nkansah-Gyekye and J. I. Agbinya, "Vertical handover between WWAN and WLAN,"
ICNICONSMCL'06, 2006
[13] K. Pahlavan, P. Krishnamurthy, A. Hatami, M. Ylianttila, J. Makela, R. Pichna, and J. Vallstron, “Handover
in hybrid mobile data networks,” IEEE Personal Communications, 7(2):34–47, 2000.
[14] L. Xia, L.-G. Jiang, and C. He, “A novel fuzzy logic vertical handover algorithm with aid of differential
prediction and pre-decision method,” In Proceedings of the 2007 IEEE International Conference on
Communications (ICC’07), pages 5665–5670, Glasgow, Scotland, June 2007.
[15] M.Kassar, B.Kervella, G.Pujolle, “An overview of vertical handover decision strategies in heterogeneous
wireless networks,” Elsevier, Journal of computer communications, Vol.37, No.10, 2008.
[16] J.Y. Hwang, J. Oh and Y. Han, “A two-step vertical handover algorithm in heterogeneous traffic and
systems,” In 66th IEEE Vehicular Technology Conference, 2007, pp. 1543-1547.
[17] T. Shu, M. Liu, and Z. Li, “A performance evaluation model for rssbased vertical handover algorithms,” pp.
271 –276, jul. 2009
[18] N. Nasser, A. Hasswa, H. Hassanein, "Handovers in Fourth Generation Heterogeneous networks," IEEE
Communications Magazine, vol. 44, no. 10, Oct. 2006, pp. 96-103.
[19] K.H. Hong, S.K. Lee, L.Y. Kim and P.J. Song, “Cost-Based Vertical Handover Decision Algorithm for
WWAN/WLAN Integrated Networks,” EURASIP Journal on Wireless Communications and Networking
Volume 2009, 2009, Article ID 372185, 11 pages doi:10.1155/2009/372185.
[20] F. Zhu and J. McNair, “Multiservice vertical handover decision algorithms,” EURASIP Journal on Wireless
Communications and Networking, vol. 2, no. 52, April 2006, pp. 1-13.
[21] R.Tawil, G.Pujolle and O.Salazar, “A Vertical Handover Decision Schemes In Heterogeneous Wireless
Systems,” Vehicular Technology Conference, VTC Spring 2008. IEEE, Singapore, 2008, pp. 2626-2630.
[22] J.D Martinez- Morales, V.P.Rico and E.Steven, “Performance comparison between MADM algorithms for
vertical handover in 4G networks,” 7th International Conference on Electrical Engineering Computing Science
and Automatic Control (CCE 2010) Tuxtla Gutiérrez, Chiapas, México. September 8-10, 2010, pp. 309-314.
[23] K. Savitha and C. Chandrasekar, “Grey Relation Analysis for Vertical Handover Decision Schemes in
Heterogeneous Wireless Networks,” European Journal of Scientific Research,Vol.54, issue 4, June2011, pp.560-
568.
[24] S. Kunarak and R. Suleesathira, “Predictive RSS with Fuzzy Logic based Vertical Handover Algorithm in
Heterogeneous Wireless Networks,” Proc. The 2010 International Conference on Advanced Technologies for
Communications, Hochiminh City, Oct. 20-22, 2010
[25] C. Ceken and H. Arslan, “ Predictive RSS with Fuzzy Logic based Vertical Handover Algorithm in
Heterogeneous Wireless Networks,” Wireless and Microwave Technology Conference (WAMICON), 2009
IEEE 10th Annual .
[26] A. Hasswa, N. Nasser and H.S. Hassanein, “A Seamless Context-Aware Architecture for Fourth Generation
Wireless Networks,” Springer Journal on Wireless Personal Communications, available online, April 2007.
[27] T. Ahmed, K. Kyamakya, and M. Ludwig, “Design and Implementation of a Context Aware Decision
Algorithm for Heterogeneous Networking,” ACMSAC’06.
[28] S.Balasubramaniam, T. Pfeifer, and J. Indulska, “Active Node supporting Context-aware vertical Handover
in pervasive computing Environment with Redundent Positioning,” Wireless Pervasive Computing, 2006 1st
International Symposium , February 2006.
[29] K. Yang, I. Gondal, and B. Qiu, "Context Aware Vertical Soft Handover Algorithm For Heterogeneous
Wireless Networks," in Proc. VTC Fall, 2008, pp.1-5.
[30] X. Yan, Y. A. S¸ekercio glu, and N. Mani. “A method for minimizing unnecessary handoverin
heterogeneous wireless networks, ” In Proceedings of the 2008 International Symposium on a World of Wireless,
Mobile and Multimedia Networks (WoWMoM’08), pages 1–5, Newport Beach, CA, USA, June 2008.
[31] K. Jang-Sub, S. Erchin, S. Dong-Ryeol and Q. Khalid, “Handover Triggering and Network Selection
Algorithms for Load-Balancing 978-1-4673-0734-5/12/$31.00 ©2012 IEEE 366
[32] Handover in CDMA-WLAN Integrated Networks,” EURASIP Journal on Wireless Communications and
Networking, Vol.2008, Issue 1, pp.136939, 2008, ISSN: 16871472.
[34] R.Tawil, J.Demerjain, G.Pujolle And O.Salazar, “Processing-Delay Reduction During The Vertical
Handover Decision In Heterogeneous Wireless System,” International Conference on Computer Systems and
Applications, AICCSA IEEE/ACS 2008, pp.381-385.
[35] S. Dekleva, J.P. Shim, U. Varshney, G. Knoerzer, Evolution and emerging issues in mobile wireless
networks, Communications of the ACM 50 (6) (2007) 38–43.
[36] D.-J. Deng, H.-C. Yen, Quality-of-Service provisioning system for multimedia transmission in IEEE 802.11
wireless LANs, IEEE Journal on Selected Areas in Communication 23 (6) (2005) 1240–1252.
[37] IEEE802.11 WG Draft Supplement to Part 11. Wireless medium access control (MAC) and physical layer
(PHY) specification: medium access control (MAC) enhancements for Quality of Service (QoS). IEEE Standard
802.11e/D4.3, May 2003.
[38] H.S. Park, H.S. Yoon, T.H. Kim, J.S. Park, M.S. Duo, J.Y. Lee, Vertical handover procedure and algorithm
between IEEE802.11 WLAN and CDMA cellular network, Mobile Communications (2003) 103–112.
[39] Perera, Charith, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. "Context Aware
Computing for The Internet of Things: A Survey”, In the proceeding of IEEE Communications Surveys &
Tutorials, Accepted For Publication , pp. 1 -41, 2013.
[40] Yan, Xiaohuan, Y. Ahmet Şekercioğlu, and Sathya Narayanan. "A survey of vertical handover decision
algorithms in Fourth Generation heterogeneous wireless networks." Computer Networks 54.11, pp 1848-1863.
Elsevier, 2010.
[41] Behrouz Shahgholi Ghahfarokhi • Naser Movahhedinia, “Context-Aware Handover Decision in an
Enhanced Media Independent Handover Framework”, Wireless Pers Commun (2013) 68:1633– 1671,DOI
10.1007/s11277-012-0543-4, Published online: 21 February 2012, © Springer Science+Business Media, LLC.
2012.
[42] Hong, C. P., Kang, T. H., Kim, S. D., “A Profile Based Vertical Handoff Scheme for Ubiquitous Computing
Environment”. Asia-Pacific Network Operations and Management Symposium 2006, Busan, Korea.
[42] Harsha Bhute, Avinash N.Bhute, G.T.Chavan, “Mobility management across wireless Networks” in the
proceeding of 3rd International Conference on Intelligent Systems & Networks (IISN-2009) Computational
Intelligence Laboratory (Ci-Lab), IST Klawad Yamuna Nagar, Haryana, Feb, 14th - 16th 2009.pp.68-75.
[43] Harsha Bhute, Avinash N.Bhute, G.T.Chavan, “Cross Layered Mobility management in Heterogeneous
Wireless Networks.” in the proceeding of “ITA-09” ,International Conference on IT In Academics, SIOM, Pune
Feb, 20th to 22nd 2009.pp. 365-374
[44] Harsha A. Bhute, “Mobility Management In Next Generation Wireless Networks” in proceeding of First
National Conference on Cryptography and Network Security (NCCNS-2009) VIT University Vellore, Tamilnadu
19th Feb 2009.
Citation Count –09
SECURITY ATTACKS TAXONOMY ON BRING YOUR OWN DEVICES (BYOD)
MODEL
Manmeet Mahinderjit Singh, Soh Sin Siang, Oh Ying San, Nurul Hashimah Ahamed Hassain Malim and Azizul
Rahman Mohd Shariff,
Universiti Sains Malaysia, Malaysia
ABSTRACT
Internet banking has the potential to provide fast and reliable services to customers for which they are relatively
happy. Due to the technological changes taking place all over the world, many institutions, including the banking
sector have taken giant steps to move in tandem with these changes. In this light most banks, with GCB Bank,
Ghana, not being an exception have introduced electronic banking in order to decongest the banking halls of
customers who spend time unending in order to transact business. The purpose of this research was to assess the
Contribution of Electronic Banking to Customer Satisfaction at GCB Bank-Koforidua, to this end some
objectives were set for the study. These were: To assess the availability of electronic banking facilities at GCB
Bank, Koforidua. To assess the knowledge and patronage of internet banking services by customers, to examine
the effectiveness of the usage of electronic banking facilities, to examine the problem facing an internet banking
in GCB Bank, Koforidua. This is a quantitative study that employed the use of questionnaires as the main tools
for data collection. Data was collected from management, staff and customers of GCB Bank, Koforidua Branch.
Findings from analysis of data revealed that though there was the existence of internet banking facilities of the
bank, respondents of the study were not fully aware of the existence of such facilities. It was also found that the
use of internet banking was quite expensive and that though the bank was utilizing the facility, customers were
not fully patronizing them. It was concluded that internet banking brings efficiency in the operations of the bank.
Finally, the study recommended that all branches of GCB Bank adopt internet banking facilities to help in
effective banking operations and transactional purposes. To maximize the operations and potential of the bank
management must endeavor to educate the customers about the existence of internet banking facilities since a
few customers were aware of the existence of such facilities.
KEYWORDS
Bring Your Own Device (BYOD) model; Advanced Persistent Threat (APT) attack, Malware; Smartphone;
Security
FOR MORE DETAILS: https://wireilla.com/papers/ijmnct/V4N5/4514ijmnct01.pdf
VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
REFERENCES
[1] Osterman Research by Dell, “The Need for IT to Get in Front of the BYOD Problem White Paper”, January,
2013.
[2] Georg Disterer, Carsten Kleiner, BYOD Bring Your Own Device,CENTERIS 2013 - Conference on
ENTERprise Information Systems / ProjMAN 2013 -International Conference on Project MANagement / HCIST
2013 - International Conference on Health and Social Care Information Systems and Technologies, May 2013
[3] Check Point Software Technologies Dimensional Research, “The Impact of Mobile Devices on Information
Security”, June, 2013.
[4] Lumension Information Security, “2013 Survey Results of BYOD & Mobile Security”, 2013.
[5] iBanking: Exploiting the Full Potential of Android Malware [Online]
http://www.symantec.com/connect/blogs/ibanking-exploiting-full-potential-android-malware Accessed date:
20/5/2014
[6] Owasp Mobile Security project https://www.owasp.org/index.php/
OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Accessed Date : 20/5/2014
[7] SYBASE, “Mobility Advantage: Why Secure Your Mobile Devices? White Paper”, February 2013.
[8] Jessica Keyes, “Bring Your Own Devices (BYOD) Survival Guide”, CRC Press Taylor & Francis Group,
Boca Raton, 2013
[9] Brian Prince (16th April 2014), SQL Injection Breaches Take Months to Uncover and Fix: Survey, [Online]
Available: http://www.securityweek.com/sql-injection-breaches-take-months-uncover-andfix-survey, Last
Accessed Date: 23 May 2014.
[10] Dell Secure Works, “Anatomy of an Advanced Persistent Threat (APT)”, 31 March, 2011.
[11] Command Five Pty Ltd, “Advanced Persistent Threats: A Decade in Review”, June 2011.
[12] Why heartbleed could be much worse for android user [Online]
http://bgr.com/2014/04/16/heartbleedandroid-4-1-1-jelly-bean/ Accessed date: 17/5/2014
[13] Mobile Security Reference Architecture v1.0, CIO council, 23 May 2013
[14] Antonio Scarfo, Maticimind Spa, “New Security Perspectives Around BYOD, Wireless Computing”,
Communication and Applications, 2012.
[15] Johannes de Vries & Hans Hoogstraaten, “Systems for Detecting Advanced Persistent Threats”,
International Conference on Cyber Security, 2012.
[16] Tarique, Mustafa, “Malicious Data Leak Prevention and Purposeful Evasion Attacks: An Approach to
Advanced Persistent Threat (APT) Management”, Conference at IEEE, 2013.
[17] Websense, “Advanced Persistent Threats And Other Advanced Attacks White Paper”, 2011
[18] iGR, “The Trusted Computing Group Mobile Specification: Securing Mobile Devices on Converged
Networks White Paper”, September, 2006.
[19] T. Andrew, Radu Vlas, Alan Yang & Cristina Vlas, “Risk Management in Era of BYOD”, IEEE Computer
Society, 2013.
[20] Sean Chung, Barbara & Yan Bai, “2TAC: Distributed Access Control Architecture for “Bring Your Own
Device” Security”, IEEE International Conference on BioMedical Computng, 2012.
[21] T. Ruesbsamen, and C. Reich, “Enhancing Mobile Devices Security by Security Level Integration in a
Cloud Proxy”, The Third International Conference on Cloud Computing, GRIDs, and Virtualization,
Furtwangen, Germany, pp. 159-168, July 2012.
[22] R.G. Lenon, “Changing User Attitudes to Security in Bring Your Own Device (BYOD) & the Cloud”,
Computing Department, Ireland, 2012.
[23] Antonio Scarfo, Maticimind Spa, “New Security Perspectives Around BYOD, Wireless Computing”,
Communication and Applications, 2012.
[24] J.A, de Vries, “Towards a roadmap for development of intelligent data analysis based cyber attack detection
systems”, Delft University of Technology, 5th July 2012.
[25] iGR, “The Trusted Computing Group Mobile Specification: Securing Mobile Devices on Converged
Networks White Paper”, September, 2006.
[26] Wei Feng, “TEEM: A User Oriented Trusted Mobile Device for Multi-platform Security Applications”,
Institute of Software Academy of Sciences, 2013.
[27] Zhang Dawei and Han Zhen, “Protocol for Trusted Channel Based on Portable Trusted Module”, Trusted
Computing and Information Security, 2012.
[28] Kathleen N. McGill, “Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module”,
Johns Hopkins APL Technical Digest, vol. 32, 2013.
[29]Allen Bethea (2012), What is the difference between SHA-1 and SHA-256, [Online] Available:
http://www.ask.com/explore/difference-between-sha1-sha256-2062 Last accessed date: 23 May 2014.
[30] Liqun Chen and Mark Ryan, “Attack, solution and verification for shared authorization data in TCG TPM”,
University of Birningham, UK, 2011.
[31] International Data Corporation; Apple Cedes Market Share in Smartphone Operating System Market as
Android Surges and Windows Phone Gains, According to IDC; published 7 August 2013;
http://www.idc.com/getdoc.jsp?containerId=prUS24257413.
[32] Cisco Security Threat Report 2014 [Online]
https://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf accessed date: 18/5/2014.
[33] F-Secure, “Mobile Threat Report Q3 2013”, F-Secure Corporation, Helsinki, 5 November, 2013.
[34] Trend Micro, “Implementing BYOD plan” , Trend Micro Corporation [Online]
http://www.trendmicro.com/cloud-content/us/pdfs/businessrep orts/rpt_implementing_byod_plans.pdf Accessed
date : 17/5/2014
[35] Why heartbleed could be much worse for android user [Online]
http://bgr.com/2014/04/16/heartbleedandroid-4-1-1-jelly-bean/ Accessed date: 17/5/2014
[36] Ebay ask 145 million user to change their password after cyber attack [Online]
http://uk.reuters.com/article/2014/05/21/uk-ebay-password-idUKKBN0E10ZL20140521 Accessed date:
20/5/2014
[37] BlueBox, “A New Era Dawns in Mobile Data Security”, whitepaper, August 2013
[38] F-Secure, “Mobile Threat Report Q1 2013”, F-Secure Corporation, Helsinki, 11 May, 2013.
[39] Mark Shepherdson, Trustmarque, “BYOD – the biometric implications” Volume 2013, Issue 4, Pages 5–7,
April 2013
[40] John Thielens, “Why APIs are central to a BYOD security strategy”, ScienceDirect network security
Volume 2013, Issue 8, Pages 5–6 August 2013
[41] Khoula Alharthy, Wael Shawkat, Implement Network security control solutions in BYOD environment,
2013 IEEE international conference on control system, computing and engineering, Penang, Malaysia, 29 Nov-1
Dec 2013
Citation Count – 09
PERFORMANCE COMPARISON OF TWO CLIPPING BASED FILTERING METHODS
FOR PAPR REDUCTION IN OFDM SIGNAL
Md. Munjure Mowla1
, Md. Yeakub Ali2
and Rifat Ahmmed Aoni3
1,2
Department of Electronics & Telecommunication Engineering, Rajshahi University of Engineering &
Technology, Rajshahi - 6204, Bangladesh
3
Department of Electrical Engineering, University of Malaya, Kuala Lumpur -50603, Malaysia
ABSTRACT
The growth of wireless communication technologies has been producing the intense demand for high-speed,
efficient, reliable voice & data communication. As a result, third generation partnership project (3GPP) has
implemented next generation wireless communication technology long term evolution (LTE) which is designed
to increase the capacity and speed of existing mobile telephone & data networks. LTE has adopted a multicarrier
transmission technique known as orthogonal frequency division multiplexing (OFDM). OFDM meets the LTE
requirement for spectrum flexibility and enables cost-efficient solutions for very wide carriers. One major
generic problem of OFDM technique is high peak to average power ratio (PAPR) which is defined as the ratio of
the peak power to the average power of the OFDM signal. A trade-off is necessary for reducing PAPR with
increasing bit error rate (BER), computational complexity or data rate loss etc. In this paper, two clipping based
filtering methods have been implemented & also analyzed their modulation effects on reducing PAPR.
KEYWORDS
Bit Error rate (BER), Complementary Cumulative Distribution Function (CCDF), Long Term Evolution (LTE),
Orthogonal Frequency Division Multiplexing (OFDM) and Peak to Average Power Ratio (PAPR)
FOR MORE DETAILS: https://wireilla.com/papers/ijmnct/V4N1/4114ijmnct03.pdf
VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
REFERENCES
[1] R. Prasad, OFDM for Wireless Communications Systems. London, Boston: Artech House, Inc, 2004.
[2] S. H. Han and J. H. Lee, “An overview of peak-to-average power ratio reduction techniques for multicarrier
transmission”, IEEE Wireless Comm, vol. 12, no.2, pp.56-65, Apr. 2005.
[3] Md. Munjure Mowla, “Peak to average power ratio analysis and simulation in LTE system”, M.Sc
dissertation, Department of Electrical & Electronic Engineering, Rajshahi University of Engineering &
Technology, Bangladesh, 2013.
[4] Muhammad Atif Gulzar , Rashid Nawaz and Devendra Thapa, “Implementation of MIMO-OFDM System
for WiMAX”, M.Sc Dissertation, Department of Electrical Engineering, Linnaeus University, Sweden, 2011.
[5] Natalia Revuelto, “PAPR reduction in OFDM systems”, M.Sc Dissertation, Universitat Politecnica de
Catalunya, Spain, 2008.
[6] Y.S. Cho, J. Kim, W.Y.Yang and C.G. Kang, MIMO OFDM Wireless Communications with MATLAB,
Singapore: John Wiley & Sons (Asia) Pte Ltd, 2010.
[7] M.M.Mowla and S.M.M. Hasan, “Performance improvement of PAPR reduction for OFDM signal in LTE
system”, International Journal of Wireless & Mobile Networks (IJWMN), Volume 5, Number 4, August 2013
(ISSN: 0975-3834).
Citation Count – 09
A REVIEW PAPER ON: THE PAPR ANALYSIS OF ORTHOGONAL FREQUENCY
DIVISION MULTIPLEXING (OFDM)
MOHSIN KHAN1
, SAMIMA IQBAL2
and WASEEM ASGHAR3
1
Department of Computer Science, Lahore Garrison University, Lahore
2, 3
Computing & Technology Department, IQRA University Islamabad Campus
AABBSSTTRRAACCTT
OFDM (Orthogonal Frequency Division Multiplexing) has been raised a new modulation technique. Due to its
advantages in multipath fading channel e.g. robust against ISI, ICI and some other advantages like best QoS for
multiple users, efficient usage of bandwidth it is suggested to be the modulation technique for next generation 4G
networks e.g. LTE. But along with all its advantages there are some disadvantages also e.g. High PAPR (Peak to
Average Power Ratio) at the transmitter end and BER (Bit Error Rate) at the receiving end. Since OFDM is only
used in the downlink of 4G networks. To reduce the problems of OFDM some techniques e.g. SLM, PTS,
Clipping, Coding, & Pre-coding etc are suggested but none of them is reduce the PAPR and BER to an
acceptable value. This Paper will discuss some techniques of PAPR & BER reduction, and their advantages and
disadvantages in detail.
KKEEYYWWOORRDDSS
PAPR, OFDM, SLM, DHT, DCT
FOR MORE DETAILS: https://wireilla.com/papers/ijmnct/V4N1/4114ijmnct01.pdf
VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
REFERENCES
[1] Y.Wu and W. Y. Zou, "Orthogonal frequency division multiplexing: A multi-carrier modulation scheme,"
IEEE Trans. Consumer Electronics, vol. 42. no. 3, pp. 392-399, August 1995.
[2] W. Y. Zou and Y. Wu, "COFDM: An overview," IEEE Trans. Broadcasting, vol. 41 no.1, pp. 1-8, March
1995.
[3] JAE HONG LEE SEUNG HEE HAN, "AN OVERVIEW OF PEAK-TO-AVERAGE POWER RATIO
REDUCTION TECHNIQUES FOR MULTICARRIER TRANSMISSION," IEEE Wireless Communications,
pp. 56-65, April 2005.
[4] Yiyan Wu Tao Jiang, "An Overview: Peak-to-Average Power Ratio Reduction Techniques for OFDM
Signals," IEEE TRANSACTIONS ON BROADCASTING, VOL. 54, NO. 2, JUNE 2008, vol. 54, no.2, pp. 257-
268, June 2008.
[5] Jr L. J. Cimini, "Analysis and simulation of a digital mobile channel using orthogonal frequency division
multiplexing," IEEE Trans. Communication, vol. COM-33, no. 7, pp. 665-675, July 1985.
[6] Y. G. Li and G. Stüber, "Orthogonal Frequency Division Multiplexing for Wireless Communications,"
Boston, MA: Springer-Verlag, January 2006.
[7] Chenyang Yang,Gang Wu, Shaoqian Li, and Geoffrey Ye Li Taewon Hwang, "OFDM and Its Wireless
Applications: A Survey," IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, vol. 58, NO. 4, pp.
1673-1694, May 2009.
[8] R. O'Neill and L. B. Lopes, "Envelope Variations and Spectral Splatter in Clipped Multicarrier Signals ,"
IEEE Processing PIMRC 95 Toronto, Canada, pp. 71-75, September 1995.
[9] X. Li and Jr L. J. Cimini, "Effect of Clipping and Filtering on the Performance of OFDM," IEEE
Communication Letter, vol. 2, no. 5, pp. 131-133, May 1998.
[10] D. Kim and G. L. Stüber, "Clipping Noise Mitigation for OFDM by Decision–Aided Reconstruction," IEEE
Communication Letter, vol. 3, no. 1, pp. 4-6, January 1999.
[11] H. Saeedi, M. Sharif, and F. Marvasti, "Clipping Noise Cancellation in OFDM Systems Using Oversampled
Signal Reconstruction ," IEEE Communication Letter, vol. 6, no. 2, pp. 73-75, February 2002.
[12] Sungkeun Cha, Myonghee Park, Sungeun Lee, Keuk-Joon Bang, and Daesik Hong, "A new PAPR reduction
technique for OFDM systems using advanced peak windowing method," IEEE Transactions on Consumer
Electronics, , vol. 54, no. 2, pp. 405-410, May 2008.
[13] P. Foomooljareona nd W.A.C. Fernando, "PAPR Reduction in OFDM Systems," Thammasat Int. J. Sc.
Tech, vol. 7, no. 3, pp. 70-79, December 2002.
[14] Jiang Tao and Guangxi Zhu, "Nonlinear companding transform for reducing peak-to-average power ratio of
OFDM signals," IEEE Transactions on Broadcasting, vol. 50, no. 3, pp. 342-346, September
2004.
[15] N. Bouaynaya, and S. Mohan Y. Rahmatallah, "Bit error rate performance of linear companding transforms
for PAPR reduction in OFDM systems," in Proc. IEEE GLOBECOM, Houston, TX, USA, December 2011.
[16] Muller S. H. and Huber J. B, "A novel peak power reduction scheme for OFDM," the 8th IEEE International
Symposium on in Personal, Indoor and Mobile Radio Communications, 1997.
[17] M. Breiling, S.H. Muller-Weinfurtner, and J.B Huber, "SLM peak-power reduction without explicit side
information," IEEE Communications Letters, vol. 5, no. 6, pp. 239-241, June 2001.
[18] Chin-Liang Wang, Sheng-Ju Ku, and Chun-Ju Yang, "A Low-Complexity PAPR Estimation Scheme for
OFDM Signals and Its Application to SLM-Based PAPR Reduction," IEEE Journal of Selected Topics in Signal
Processing, vol. 4, no. 3, pp. 637-645, June 2010.
[19] S.H. Muller and J.B Huber, "OFDM with reduced peak-to-average power ratio by optimum combination of
partial transmit sequences," IEEE Electronics Letters , vol. 33, no. 5, pp. 368-369, February 1997.
[20] Han Seung Hee and Jae Hong Lee, "PAPR reduction of OFDM signals using a reduced complexity PTS
technique," IEEE Signal Processing Letters, vol. 11, no. 11, pp. 887-890, November 2004
.
[21] Dae-Woon Lim, Seok-Joong Heo, Jong-Seon No, and Habong Chung, "A new PTS OFDM scheme with
low complexity for PAPR reduction," IEEE Transactions on Broadcasting, vol. 52, no. 1, pp. 77- 82, March
2006.
[22] J. Tellado, "Peak to Average Power Reduction for Multicarrier Modulation," Ph.D. dissertation, Stanford
Univ, 2000.
[23] B. S. Krongold and D. L. Jones, "An Active Set Approach for OFDM PAR Reduction via Tone
Reservation," IEEE Transaction Signal Processing, vol. 52, no. 2, pp. 495-509, February 2004.
[24] D L Jones, "Peak power reduction in OFDM and DMT via active channel modification," in Proc. Asilomar
Conference on Signals, Systems, and Computers, vol. 2, pp. 1076-1079, 1999.
[25] B. S. Krongold and D. L. Jones, "PAR Reduction in OFDM via Active Constellation Extension," IEEE
Transaction on Broadcasting, vol. 49, no. 3, pp. 258-268, September 2003.
[26] S. Pino-Povedano and F.J Gonzalez-Serrano, "PAPR reduction for OFDM transmission using a method of
Convex Optimization and Amplitude Predistortion," International Workshop on Satellite and Space
Communications, IWSSC 2009, pp. 210-214, 9-11 September 2009.
[27] C. Nader, P. Handel, and N Bjorsell, "Peak-to-Average Power Reduction of OFDM Signals by Convex
Optimization: Experimental Validation and Performance Optimization," IEEE Transactions on Instrumentation
and Measurement, vol. 60, no. 2, pp. 473-479, February 2011.
[28] Lung-Sheng Tsai, Wei-Ho Chung, and Da-shan Shiu, "Lower Bounds on the Correlation Property for
OFDM Sequences with Spectral-Null Constraints," IEEE Transactions on Wireless Communications, vol. 10, no.
8, pp. 2652-2659, August 2011.
[29] J.A. Davis and J Jedwab, "Peak-to-mean power control and error correction for OFDM transmission using
Golay sequences and Reed-Muller codes," Electronics Letters, vol. 33, no. 4, pp. 267-268, February 1997.
[30] J.A. Davis and J Jedwab, "Peak-to-mean power control in OFDM, Golay complementary sequences, and
Reed-Muller codes," IEEE Transactions on Information Theory, vol. 45, no. 7, pp. 2397-2417, November 1999.
[31] Jiang Tao and Guangxi Zhu, "Complement block coding for reduction in peak-to-average power ratio of
OFDM signals," IEEE Communications Magazine, vol. 43, no. 9, pp. S17-S22, September 2005.
[32] Heeyoung Jun, Jaehee Cho, et.al Myonghee Park, "PAPR reduction in OFDM transmission using Hadamard
transform," ICC 2000, pp. 430-433, 2000.
[33] Xiang-Gen Xia, "Precoded and vector OFDM robust to channel spectral nulls and with reduced cyclic prefix
length in single transmit antenna systems," IEEE Transactions on Communications, vol. 49, no. 8, pp. 1363-
1374, August 2001.
[34] Yuan-Pei Lin and See-May Phoong, "BER minimized OFDM systems with channel independent precoders,"
IEEE Transactions on Signal Processing, vol. 51, no. 9, pp. 2369-2380, September 2003.
[35] Zhengdao Wang, Shengli Zhou, and G.B Giannakis, "Joint coding-precoding with low-complexity turbo-
decoding," IEEE Transactions on Wireless Communication, vol. 3, no. 3, pp. 832-842, May 2004.
[36] Yew Kuan Min, M. Drieberg, and V Jeoti, "On PAPR Reduction in OFDM Systems: A Technique using
Normalized Complex Hadamard Transform," IEEE Region TENCON 2005, pp. 1-4, 21-24 November 2005.
[37] I. Baig and V Jeoti, "PAPR analysis of DHT-precoded OFDM system for M-QAM," International
Conference on Intelligent and Advanced Systems (ICIAS), pp. 1-4, 15-17 June 2010.
[38] I. Baig and V Jeoti, "DCT precoded SLM technique for PAPR reduction in OFDM systems," International
Conference on Intelligent and Advanced Systems (ICIAS), 2010, pp. 1-6, 15-17 June 2010.
[39] I. Baig and V Jeoti, "PAPR Reduction in OFDM Systems: Zadoff-Chu Matrix Transform Based Pre/Post-
Coding Techniques," Second International Conference on Computational Intelligence, Communication Systems
and Networks (CICSyN), 2010, pp. 373-377, July 2010.
[40] A. Joshi, D. Bhardwaj, and D.S Saini, "PAPR reduction in OFDM with FEC (RS-CC and Turbo coding)
using DHT preceding," International Symposium on Instrumentation & Measurement, Sensor Network and
Automation (IMSNA), vol. 1, no. 1, pp. 14-18, 25-28 August 2012.
[41] N. Ahmed and K.R. Rao, "Orthogonal transforms for digital signal processing," Berlin: SpringerVerlag,
1975.
[42] R.N. Bracewell, "Discrete Hartley transform," Journal of the Optical Society of America, vol. 73, no. 12, pp.
1832-1835, 1983.
[43] B.M Popovic´, "Spreading sequences for multi-carrier CDMA systems," In IEE Colloquium CDMA
Techniques and Applications for Third Generation Mobile Systems, pp. 1-8, 1997.
[44] N. Ahmed, T. Natarajan, and K.R and Rao, "Discrete cosine transform," IEEE Transactions on Computers,
C-23(1), pp. 90-93, 1974.
Citation Count – 08
PERFORMANCE ANALYSIS ON THE BASIS OF A COMPARATIVE STUDY
BETWEEN MULTIPATH RAYLEIGH FADING AND AWGN CHANNEL IN THE
PRESENCE OF VARIOUS INTERFERENCE
Sutanu Ghosh
Dr. Sudhir Chandra Sur Degree Engineering College
AABBSSTTRRAACCTT
Interference is the most important issue for present wireless communication. There are various kinds of channel
used in wireless communication. Here I want to show a performance analysis on the basis of two different
channels – AWGN and Multipath Rayleigh fading channel. This is the comparative analysis with different kinds
of modulation techniques. Here I have also measured the Bit Error Rate with respect to different modulation
techniques and compare the rate in different channels. My objective is to compare the different characteristics of
the transmitter and receiver for different types of channels and modulators.
KKEEYYWWOORRDDSS
Rayleigh fading channel, Bit Error Rate, AWGN, Cellular Interference.
FOR MORE DETAILS: http://wireilla.com/papers/ijmnct/V4N1/4114ijmnct02.pdf
VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
REFERENCES
[1] Cavers, James K. “An analysis of pilot symbol assisted modulation for Rayleigh fading channels [mobile
radio].” Vehicular Technology, IEEE Transactions on 40.4 (1991): 686-693
[2] Stein, Seymour. “Fading channel issues in system engineering.” Selected Areas in Communications, IEEE
Journal on 5.2 (1987): 68-89.
[3] Mishra, Ajay R. “Fundamentals of cellular network planning and optimisation: 2G/2.5 G/3G... evolution to
4G.”Wiley. com, 2004.
[4] Foschini, Gerard J. and Michael J. Gans. “On limits of wireless communications in a fading environment
when using multiple antennas.” Wireless personal communications 6.3 (1998): 311-335.
[5] Yang, Hong-Chuan and M-S. Alouini. "Closed-form formulas for the outage probability of wireless
communication systems with a minimum signal power constraint." Vehicular Technology, IEEE Transactions on
51.6 (2002): 1689-1698.
[6] T. S. Rappaport, Wireless Communications: Principles and Practice. N.J.: Prentice Hall, 1996.
[7] Petersen, B. R. and D. D. Falconer. "Exploiting cyclostationary subscriber-loop interference by equalization."
Global Telecommunications Conference, 1990, and Exhibition.'Communications: Connecting the Future',
GLOBECOM'90., IEEE. IEEE, 1990.
[8] Chen, S. and B. Mulgrew. "Overcoming co-channel interference using an adaptive radial basis function
equaliser." Signal Processing 28.1 (1992): 91-107.

More Related Content

What's hot

Trends in mobile network communication and telematics in 2020
Trends in mobile network communication and telematics in 2020Trends in mobile network communication and telematics in 2020
Trends in mobile network communication and telematics in 2020ijmnct
 
June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing  June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing ijsc
 
New research articles 2020 june issue- international journal of computer sc...
New research articles   2020 june issue- international journal of computer sc...New research articles   2020 june issue- international journal of computer sc...
New research articles 2020 june issue- international journal of computer sc...AIRCC Publishing Corporation
 
A Survey on Call Admission Control Schemes in LTE
A Survey on Call Admission Control Schemes in LTEA Survey on Call Admission Control Schemes in LTE
A Survey on Call Admission Control Schemes in LTEIJCSES Journal
 
PublicationsResearchProjectsEtc
PublicationsResearchProjectsEtcPublicationsResearchProjectsEtc
PublicationsResearchProjectsEtcpados
 
Energy efficient routing protocol for enhancing network lifetime and performa...
Energy efficient routing protocol for enhancing network lifetime and performa...Energy efficient routing protocol for enhancing network lifetime and performa...
Energy efficient routing protocol for enhancing network lifetime and performa...AmairullahKhanLodhi1
 
Mohamad Aziz Resume
Mohamad Aziz ResumeMohamad Aziz Resume
Mohamad Aziz ResumeMohamad Aziz
 
Publication list
Publication listPublication list
Publication listdrcgdethe
 
Quality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksQuality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksIffat Anjum
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...Amir Shokri
 
Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...IJCSES Journal
 
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...ijujournal
 
TOP 1 CITED PAPER - International Journal of Artificial Intelligence & Appli...
TOP 1  CITED PAPER - International Journal of Artificial Intelligence & Appli...TOP 1  CITED PAPER - International Journal of Artificial Intelligence & Appli...
TOP 1 CITED PAPER - International Journal of Artificial Intelligence & Appli...gerogepatton
 

What's hot (20)

Trends in mobile network communication and telematics in 2020
Trends in mobile network communication and telematics in 2020Trends in mobile network communication and telematics in 2020
Trends in mobile network communication and telematics in 2020
 
June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing  June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing
 
New research articles 2020 june issue- international journal of computer sc...
New research articles   2020 june issue- international journal of computer sc...New research articles   2020 june issue- international journal of computer sc...
New research articles 2020 june issue- international journal of computer sc...
 
A Survey on Call Admission Control Schemes in LTE
A Survey on Call Admission Control Schemes in LTEA Survey on Call Admission Control Schemes in LTE
A Survey on Call Admission Control Schemes in LTE
 
PublicationsResearchProjectsEtc
PublicationsResearchProjectsEtcPublicationsResearchProjectsEtc
PublicationsResearchProjectsEtc
 
Energy efficient routing protocol for enhancing network lifetime and performa...
Energy efficient routing protocol for enhancing network lifetime and performa...Energy efficient routing protocol for enhancing network lifetime and performa...
Energy efficient routing protocol for enhancing network lifetime and performa...
 
9 refrences M.TECH ( PDF FILE )
9 refrences M.TECH ( PDF FILE )9 refrences M.TECH ( PDF FILE )
9 refrences M.TECH ( PDF FILE )
 
9 refrences M.TECH ( M S WORD FILE )
9 refrences M.TECH ( M S WORD FILE )9 refrences M.TECH ( M S WORD FILE )
9 refrences M.TECH ( M S WORD FILE )
 
Atul
AtulAtul
Atul
 
Mohamad Aziz Resume
Mohamad Aziz ResumeMohamad Aziz Resume
Mohamad Aziz Resume
 
Publication list
Publication listPublication list
Publication list
 
Quality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksQuality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networks
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...
 
Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...
 
CC NEW
CC NEWCC NEW
CC NEW
 
Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )
 
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
 
TOP 1 CITED PAPER - International Journal of Artificial Intelligence & Appli...
TOP 1  CITED PAPER - International Journal of Artificial Intelligence & Appli...TOP 1  CITED PAPER - International Journal of Artificial Intelligence & Appli...
TOP 1 CITED PAPER - International Journal of Artificial Intelligence & Appli...
 
PUBLICATIONS_prasun
PUBLICATIONS_prasunPUBLICATIONS_prasun
PUBLICATIONS_prasun
 
linkedin resume
linkedin resumelinkedin resume
linkedin resume
 

Similar to TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ARTICLES

An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile networkAn efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile networkBasil John
 
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...ijwmn
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
Top 10 reseach articles for academia - International Journal of peer-to-peer ...
Top 10 reseach articles for academia - International Journal of peer-to-peer ...Top 10 reseach articles for academia - International Journal of peer-to-peer ...
Top 10 reseach articles for academia - International Journal of peer-to-peer ...ijp2p
 
Chapter 2 wireless sensor
Chapter 2 wireless sensorChapter 2 wireless sensor
Chapter 2 wireless sensorAhmed Tememe
 
Design And Analysis for Millimeter Wave Networks using Antenna Arrays
Design And Analysis for Millimeter Wave Networks using Antenna ArraysDesign And Analysis for Millimeter Wave Networks using Antenna Arrays
Design And Analysis for Millimeter Wave Networks using Antenna Arrayssanthoshkumarecegnit
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...ijwmn
 
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...ijwmn
 
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...ijwmn
 
Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...ijassn
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021ijujournal
 
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...ijwmn
 
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...ijwmn
 
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...ijwmn
 
Top 10 Cited Articles in VLSI Design & Communication Systems Research: Januar...
Top 10 Cited Articles in VLSI Design & Communication Systems Research: Januar...Top 10 Cited Articles in VLSI Design & Communication Systems Research: Januar...
Top 10 Cited Articles in VLSI Design & Communication Systems Research: Januar...VLSICS Design
 
Top Cited Articles in Control Theory and Computer Modelling : June 2020
Top Cited Articles in Control Theory and Computer Modelling :  June 2020Top Cited Articles in Control Theory and Computer Modelling :  June 2020
Top Cited Articles in Control Theory and Computer Modelling : June 2020ijctcm
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
 

Similar to TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ARTICLES (20)

An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile networkAn efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile network
 
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
Top 10 reseach articles for academia - International Journal of peer-to-peer ...
Top 10 reseach articles for academia - International Journal of peer-to-peer ...Top 10 reseach articles for academia - International Journal of peer-to-peer ...
Top 10 reseach articles for academia - International Journal of peer-to-peer ...
 
Chapter 2 wireless sensor
Chapter 2 wireless sensorChapter 2 wireless sensor
Chapter 2 wireless sensor
 
Design And Analysis for Millimeter Wave Networks using Antenna Arrays
Design And Analysis for Millimeter Wave Networks using Antenna ArraysDesign And Analysis for Millimeter Wave Networks using Antenna Arrays
Design And Analysis for Millimeter Wave Networks using Antenna Arrays
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
 
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
 
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
 
Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021
 
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
 
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
 
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
 
Top 10 Cited Articles in VLSI Design & Communication Systems Research: Januar...
Top 10 Cited Articles in VLSI Design & Communication Systems Research: Januar...Top 10 Cited Articles in VLSI Design & Communication Systems Research: Januar...
Top 10 Cited Articles in VLSI Design & Communication Systems Research: Januar...
 
Top Cited Articles in Control Theory and Computer Modelling : June 2020
Top Cited Articles in Control Theory and Computer Modelling :  June 2020Top Cited Articles in Control Theory and Computer Modelling :  June 2020
Top Cited Articles in Control Theory and Computer Modelling : June 2020
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...
 

Recently uploaded

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ARTICLES

  • 1. TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ARTICLES INTERNATIONAL JOURNAL OF MOBILE NETWORK COMMUNICATIONS & TELEMATICS (IJMNCT) ISSN: 1839 – 5678 http://wireilla.com/ijmnct/index.html
  • 2. Citation Count – 12 A VERTICAL HANDOVER DECISION APPROACHES IN NEXT GENERATION WIRELESS NETWORKS: A SURVEY Harsha A. Bhute1 , Dr. P.P Karde2 , Dr. V.M. Thakare3 1 Department of Computer Engineering, Sinhgad College of Engineering, Pune, India 2 Department of Information Technology, Government Polytechnic, Professor, Amravati, India 3 Professor & Head, Department of Computer Science, SGBAU, Amravati University, Amravati, India ABSTRACT In next generation wireless network the most desirable feature is its ability to move seamlessly over various access network regardless of the network infrastructure is used. The handover between these dissimilar networks can be explored by using vertical handover algorithms. This paper focuses on the vertical handover decision methods and algorithms effectiveness. Most of the algorithms which are based on RSS values provide vertical handover with small delay at a lower rate of throughput. There are such algorithms which provide significant improvements in throughput but at a cost of higher delays. As per the need for the real time applications in next generation wireless networks there is a requirement of developing new optimized algorithms that are able to produce high throughput and minimizing signaling cost and delay. KEYWORDS Vertical handover, QoS, mobile networks, next generation wireless networks. FOR MORE DETAILS: https://wireilla.com/papers/ijmnct/V4N2/4214ijmnct04.pdf VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
  • 3. REFERENCES [1] O. Ormond, G. Muntean and J. Murphy, “Network Selection Strategy in Heterogeneous Wireless Networks,” Proc. of IT&T 2005: Information Technology and Telecommunications, pp. 175-184, Cork, October 2005. [2] L.-J. Chen, G. Yang, T. Sun, M.Y. Sanadidi, M. Gerla, “Enhancing QoS support for vertical handovers using implicit/explicit handover notifications,” In 2nd IEEE International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, pp. 8-37, 2005. [3] Y.C. Chen, J.H. Hsia and Y.J. Liao, “Advanced seamless vertical handover architecture for WiMA and WiFi heterogeneous networks with QoS guarantees,” Computer Communications, Volume 32 Issue 2, February 2009, Pages 281-293. [4] L. J. Chen et al, “A smart decision model for vertical handover,” In Proc. of the 4th International Workshop on Wireless Internet and Reconfigurability. (ANWIRE 2004), Athens, Greece, May 2004. [5] A. H. Zahran, B. Liang, and A. Saleh, “Signal threshold adaptation for vertical handover in heterogeneous wireless networks,” Mobile Networks and Applications, vol. 11, no. 4, pp. 625-640, August 2006. [6] I.F. Akyildiz, J. McNair, J.S.M. Ho, H. Uzunalioglu, W. Wang, “Mobility management in nextgeneration wireless systems,” Proceedings of the IEEE, vol. 87, no. 8, pp. 1347-1384, August 1999. [7] F. Zhu and J. McNair, “Optimizations for vertical handover decision algorithms,” In Proceedings of the 2004 IEEE Wireless Communications and Networking Conference (WCNC 2004), vol. 2, pp. 867–872, 2004. [8] S. Balasubramaniam and J. Indulska, “Vertical handover supporting pervasive computing in future wireless networks,” Computer Communications, vol. 27, no. 8, pp. 708–719, 2004. [9] H. Wang, R. Katz, J. Giese, “Policy-enabled handovers across heterogeneous wireless networks,” Second IEEE Workshop on Mobile Computing Systems and Applications, 1999 (Proceedings WMCSA’99), 1999, pp. 51-60. [10] S. Quiqyang and A. Jamalipour, “A network selection mechanism for next generation networks,” In International Conference of Communications, 2005 (ICC 2005), vol. 2, 2005, pp. 1418–1422. [11] W. Zhang, “Handover Decision Using Fuzzy MADM in heterogeneous networks,” In Proc. IEEE WCNC’05, New Or-leans, LA March 2005. [12] Y. Nkansah-Gyekye and J. I. Agbinya, "Vertical handover between WWAN and WLAN," ICNICONSMCL'06, 2006 [13] K. Pahlavan, P. Krishnamurthy, A. Hatami, M. Ylianttila, J. Makela, R. Pichna, and J. Vallstron, “Handover in hybrid mobile data networks,” IEEE Personal Communications, 7(2):34–47, 2000. [14] L. Xia, L.-G. Jiang, and C. He, “A novel fuzzy logic vertical handover algorithm with aid of differential prediction and pre-decision method,” In Proceedings of the 2007 IEEE International Conference on Communications (ICC’07), pages 5665–5670, Glasgow, Scotland, June 2007. [15] M.Kassar, B.Kervella, G.Pujolle, “An overview of vertical handover decision strategies in heterogeneous wireless networks,” Elsevier, Journal of computer communications, Vol.37, No.10, 2008. [16] J.Y. Hwang, J. Oh and Y. Han, “A two-step vertical handover algorithm in heterogeneous traffic and systems,” In 66th IEEE Vehicular Technology Conference, 2007, pp. 1543-1547.
  • 4. [17] T. Shu, M. Liu, and Z. Li, “A performance evaluation model for rssbased vertical handover algorithms,” pp. 271 –276, jul. 2009 [18] N. Nasser, A. Hasswa, H. Hassanein, "Handovers in Fourth Generation Heterogeneous networks," IEEE Communications Magazine, vol. 44, no. 10, Oct. 2006, pp. 96-103. [19] K.H. Hong, S.K. Lee, L.Y. Kim and P.J. Song, “Cost-Based Vertical Handover Decision Algorithm for WWAN/WLAN Integrated Networks,” EURASIP Journal on Wireless Communications and Networking Volume 2009, 2009, Article ID 372185, 11 pages doi:10.1155/2009/372185. [20] F. Zhu and J. McNair, “Multiservice vertical handover decision algorithms,” EURASIP Journal on Wireless Communications and Networking, vol. 2, no. 52, April 2006, pp. 1-13. [21] R.Tawil, G.Pujolle and O.Salazar, “A Vertical Handover Decision Schemes In Heterogeneous Wireless Systems,” Vehicular Technology Conference, VTC Spring 2008. IEEE, Singapore, 2008, pp. 2626-2630. [22] J.D Martinez- Morales, V.P.Rico and E.Steven, “Performance comparison between MADM algorithms for vertical handover in 4G networks,” 7th International Conference on Electrical Engineering Computing Science and Automatic Control (CCE 2010) Tuxtla Gutiérrez, Chiapas, México. September 8-10, 2010, pp. 309-314. [23] K. Savitha and C. Chandrasekar, “Grey Relation Analysis for Vertical Handover Decision Schemes in Heterogeneous Wireless Networks,” European Journal of Scientific Research,Vol.54, issue 4, June2011, pp.560- 568. [24] S. Kunarak and R. Suleesathira, “Predictive RSS with Fuzzy Logic based Vertical Handover Algorithm in Heterogeneous Wireless Networks,” Proc. The 2010 International Conference on Advanced Technologies for Communications, Hochiminh City, Oct. 20-22, 2010 [25] C. Ceken and H. Arslan, “ Predictive RSS with Fuzzy Logic based Vertical Handover Algorithm in Heterogeneous Wireless Networks,” Wireless and Microwave Technology Conference (WAMICON), 2009 IEEE 10th Annual . [26] A. Hasswa, N. Nasser and H.S. Hassanein, “A Seamless Context-Aware Architecture for Fourth Generation Wireless Networks,” Springer Journal on Wireless Personal Communications, available online, April 2007. [27] T. Ahmed, K. Kyamakya, and M. Ludwig, “Design and Implementation of a Context Aware Decision Algorithm for Heterogeneous Networking,” ACMSAC’06. [28] S.Balasubramaniam, T. Pfeifer, and J. Indulska, “Active Node supporting Context-aware vertical Handover in pervasive computing Environment with Redundent Positioning,” Wireless Pervasive Computing, 2006 1st International Symposium , February 2006. [29] K. Yang, I. Gondal, and B. Qiu, "Context Aware Vertical Soft Handover Algorithm For Heterogeneous Wireless Networks," in Proc. VTC Fall, 2008, pp.1-5. [30] X. Yan, Y. A. S¸ekercio glu, and N. Mani. “A method for minimizing unnecessary handoverin heterogeneous wireless networks, ” In Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’08), pages 1–5, Newport Beach, CA, USA, June 2008. [31] K. Jang-Sub, S. Erchin, S. Dong-Ryeol and Q. Khalid, “Handover Triggering and Network Selection Algorithms for Load-Balancing 978-1-4673-0734-5/12/$31.00 ©2012 IEEE 366 [32] Handover in CDMA-WLAN Integrated Networks,” EURASIP Journal on Wireless Communications and Networking, Vol.2008, Issue 1, pp.136939, 2008, ISSN: 16871472.
  • 5. [34] R.Tawil, J.Demerjain, G.Pujolle And O.Salazar, “Processing-Delay Reduction During The Vertical Handover Decision In Heterogeneous Wireless System,” International Conference on Computer Systems and Applications, AICCSA IEEE/ACS 2008, pp.381-385. [35] S. Dekleva, J.P. Shim, U. Varshney, G. Knoerzer, Evolution and emerging issues in mobile wireless networks, Communications of the ACM 50 (6) (2007) 38–43. [36] D.-J. Deng, H.-C. Yen, Quality-of-Service provisioning system for multimedia transmission in IEEE 802.11 wireless LANs, IEEE Journal on Selected Areas in Communication 23 (6) (2005) 1240–1252. [37] IEEE802.11 WG Draft Supplement to Part 11. Wireless medium access control (MAC) and physical layer (PHY) specification: medium access control (MAC) enhancements for Quality of Service (QoS). IEEE Standard 802.11e/D4.3, May 2003. [38] H.S. Park, H.S. Yoon, T.H. Kim, J.S. Park, M.S. Duo, J.Y. Lee, Vertical handover procedure and algorithm between IEEE802.11 WLAN and CDMA cellular network, Mobile Communications (2003) 103–112. [39] Perera, Charith, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. "Context Aware Computing for The Internet of Things: A Survey”, In the proceeding of IEEE Communications Surveys & Tutorials, Accepted For Publication , pp. 1 -41, 2013. [40] Yan, Xiaohuan, Y. Ahmet Şekercioğlu, and Sathya Narayanan. "A survey of vertical handover decision algorithms in Fourth Generation heterogeneous wireless networks." Computer Networks 54.11, pp 1848-1863. Elsevier, 2010. [41] Behrouz Shahgholi Ghahfarokhi • Naser Movahhedinia, “Context-Aware Handover Decision in an Enhanced Media Independent Handover Framework”, Wireless Pers Commun (2013) 68:1633– 1671,DOI 10.1007/s11277-012-0543-4, Published online: 21 February 2012, © Springer Science+Business Media, LLC. 2012. [42] Hong, C. P., Kang, T. H., Kim, S. D., “A Profile Based Vertical Handoff Scheme for Ubiquitous Computing Environment”. Asia-Pacific Network Operations and Management Symposium 2006, Busan, Korea. [42] Harsha Bhute, Avinash N.Bhute, G.T.Chavan, “Mobility management across wireless Networks” in the proceeding of 3rd International Conference on Intelligent Systems & Networks (IISN-2009) Computational Intelligence Laboratory (Ci-Lab), IST Klawad Yamuna Nagar, Haryana, Feb, 14th - 16th 2009.pp.68-75. [43] Harsha Bhute, Avinash N.Bhute, G.T.Chavan, “Cross Layered Mobility management in Heterogeneous Wireless Networks.” in the proceeding of “ITA-09” ,International Conference on IT In Academics, SIOM, Pune Feb, 20th to 22nd 2009.pp. 365-374 [44] Harsha A. Bhute, “Mobility Management In Next Generation Wireless Networks” in proceeding of First National Conference on Cryptography and Network Security (NCCNS-2009) VIT University Vellore, Tamilnadu 19th Feb 2009.
  • 6. Citation Count –09 SECURITY ATTACKS TAXONOMY ON BRING YOUR OWN DEVICES (BYOD) MODEL Manmeet Mahinderjit Singh, Soh Sin Siang, Oh Ying San, Nurul Hashimah Ahamed Hassain Malim and Azizul Rahman Mohd Shariff, Universiti Sains Malaysia, Malaysia ABSTRACT Internet banking has the potential to provide fast and reliable services to customers for which they are relatively happy. Due to the technological changes taking place all over the world, many institutions, including the banking sector have taken giant steps to move in tandem with these changes. In this light most banks, with GCB Bank, Ghana, not being an exception have introduced electronic banking in order to decongest the banking halls of customers who spend time unending in order to transact business. The purpose of this research was to assess the Contribution of Electronic Banking to Customer Satisfaction at GCB Bank-Koforidua, to this end some objectives were set for the study. These were: To assess the availability of electronic banking facilities at GCB Bank, Koforidua. To assess the knowledge and patronage of internet banking services by customers, to examine the effectiveness of the usage of electronic banking facilities, to examine the problem facing an internet banking in GCB Bank, Koforidua. This is a quantitative study that employed the use of questionnaires as the main tools for data collection. Data was collected from management, staff and customers of GCB Bank, Koforidua Branch. Findings from analysis of data revealed that though there was the existence of internet banking facilities of the bank, respondents of the study were not fully aware of the existence of such facilities. It was also found that the use of internet banking was quite expensive and that though the bank was utilizing the facility, customers were not fully patronizing them. It was concluded that internet banking brings efficiency in the operations of the bank. Finally, the study recommended that all branches of GCB Bank adopt internet banking facilities to help in effective banking operations and transactional purposes. To maximize the operations and potential of the bank management must endeavor to educate the customers about the existence of internet banking facilities since a few customers were aware of the existence of such facilities. KEYWORDS Bring Your Own Device (BYOD) model; Advanced Persistent Threat (APT) attack, Malware; Smartphone; Security FOR MORE DETAILS: https://wireilla.com/papers/ijmnct/V4N5/4514ijmnct01.pdf VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
  • 7. REFERENCES [1] Osterman Research by Dell, “The Need for IT to Get in Front of the BYOD Problem White Paper”, January, 2013. [2] Georg Disterer, Carsten Kleiner, BYOD Bring Your Own Device,CENTERIS 2013 - Conference on ENTERprise Information Systems / ProjMAN 2013 -International Conference on Project MANagement / HCIST 2013 - International Conference on Health and Social Care Information Systems and Technologies, May 2013 [3] Check Point Software Technologies Dimensional Research, “The Impact of Mobile Devices on Information Security”, June, 2013. [4] Lumension Information Security, “2013 Survey Results of BYOD & Mobile Security”, 2013. [5] iBanking: Exploiting the Full Potential of Android Malware [Online] http://www.symantec.com/connect/blogs/ibanking-exploiting-full-potential-android-malware Accessed date: 20/5/2014 [6] Owasp Mobile Security project https://www.owasp.org/index.php/ OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Accessed Date : 20/5/2014 [7] SYBASE, “Mobility Advantage: Why Secure Your Mobile Devices? White Paper”, February 2013. [8] Jessica Keyes, “Bring Your Own Devices (BYOD) Survival Guide”, CRC Press Taylor & Francis Group, Boca Raton, 2013 [9] Brian Prince (16th April 2014), SQL Injection Breaches Take Months to Uncover and Fix: Survey, [Online] Available: http://www.securityweek.com/sql-injection-breaches-take-months-uncover-andfix-survey, Last Accessed Date: 23 May 2014. [10] Dell Secure Works, “Anatomy of an Advanced Persistent Threat (APT)”, 31 March, 2011. [11] Command Five Pty Ltd, “Advanced Persistent Threats: A Decade in Review”, June 2011. [12] Why heartbleed could be much worse for android user [Online] http://bgr.com/2014/04/16/heartbleedandroid-4-1-1-jelly-bean/ Accessed date: 17/5/2014 [13] Mobile Security Reference Architecture v1.0, CIO council, 23 May 2013 [14] Antonio Scarfo, Maticimind Spa, “New Security Perspectives Around BYOD, Wireless Computing”, Communication and Applications, 2012. [15] Johannes de Vries & Hans Hoogstraaten, “Systems for Detecting Advanced Persistent Threats”, International Conference on Cyber Security, 2012. [16] Tarique, Mustafa, “Malicious Data Leak Prevention and Purposeful Evasion Attacks: An Approach to Advanced Persistent Threat (APT) Management”, Conference at IEEE, 2013. [17] Websense, “Advanced Persistent Threats And Other Advanced Attacks White Paper”, 2011 [18] iGR, “The Trusted Computing Group Mobile Specification: Securing Mobile Devices on Converged Networks White Paper”, September, 2006. [19] T. Andrew, Radu Vlas, Alan Yang & Cristina Vlas, “Risk Management in Era of BYOD”, IEEE Computer Society, 2013.
  • 8. [20] Sean Chung, Barbara & Yan Bai, “2TAC: Distributed Access Control Architecture for “Bring Your Own Device” Security”, IEEE International Conference on BioMedical Computng, 2012. [21] T. Ruesbsamen, and C. Reich, “Enhancing Mobile Devices Security by Security Level Integration in a Cloud Proxy”, The Third International Conference on Cloud Computing, GRIDs, and Virtualization, Furtwangen, Germany, pp. 159-168, July 2012. [22] R.G. Lenon, “Changing User Attitudes to Security in Bring Your Own Device (BYOD) & the Cloud”, Computing Department, Ireland, 2012. [23] Antonio Scarfo, Maticimind Spa, “New Security Perspectives Around BYOD, Wireless Computing”, Communication and Applications, 2012. [24] J.A, de Vries, “Towards a roadmap for development of intelligent data analysis based cyber attack detection systems”, Delft University of Technology, 5th July 2012. [25] iGR, “The Trusted Computing Group Mobile Specification: Securing Mobile Devices on Converged Networks White Paper”, September, 2006. [26] Wei Feng, “TEEM: A User Oriented Trusted Mobile Device for Multi-platform Security Applications”, Institute of Software Academy of Sciences, 2013. [27] Zhang Dawei and Han Zhen, “Protocol for Trusted Channel Based on Portable Trusted Module”, Trusted Computing and Information Security, 2012. [28] Kathleen N. McGill, “Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module”, Johns Hopkins APL Technical Digest, vol. 32, 2013. [29]Allen Bethea (2012), What is the difference between SHA-1 and SHA-256, [Online] Available: http://www.ask.com/explore/difference-between-sha1-sha256-2062 Last accessed date: 23 May 2014. [30] Liqun Chen and Mark Ryan, “Attack, solution and verification for shared authorization data in TCG TPM”, University of Birningham, UK, 2011. [31] International Data Corporation; Apple Cedes Market Share in Smartphone Operating System Market as Android Surges and Windows Phone Gains, According to IDC; published 7 August 2013; http://www.idc.com/getdoc.jsp?containerId=prUS24257413. [32] Cisco Security Threat Report 2014 [Online] https://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf accessed date: 18/5/2014. [33] F-Secure, “Mobile Threat Report Q3 2013”, F-Secure Corporation, Helsinki, 5 November, 2013. [34] Trend Micro, “Implementing BYOD plan” , Trend Micro Corporation [Online] http://www.trendmicro.com/cloud-content/us/pdfs/businessrep orts/rpt_implementing_byod_plans.pdf Accessed date : 17/5/2014 [35] Why heartbleed could be much worse for android user [Online] http://bgr.com/2014/04/16/heartbleedandroid-4-1-1-jelly-bean/ Accessed date: 17/5/2014 [36] Ebay ask 145 million user to change their password after cyber attack [Online] http://uk.reuters.com/article/2014/05/21/uk-ebay-password-idUKKBN0E10ZL20140521 Accessed date: 20/5/2014 [37] BlueBox, “A New Era Dawns in Mobile Data Security”, whitepaper, August 2013 [38] F-Secure, “Mobile Threat Report Q1 2013”, F-Secure Corporation, Helsinki, 11 May, 2013.
  • 9. [39] Mark Shepherdson, Trustmarque, “BYOD – the biometric implications” Volume 2013, Issue 4, Pages 5–7, April 2013 [40] John Thielens, “Why APIs are central to a BYOD security strategy”, ScienceDirect network security Volume 2013, Issue 8, Pages 5–6 August 2013 [41] Khoula Alharthy, Wael Shawkat, Implement Network security control solutions in BYOD environment, 2013 IEEE international conference on control system, computing and engineering, Penang, Malaysia, 29 Nov-1 Dec 2013
  • 10. Citation Count – 09 PERFORMANCE COMPARISON OF TWO CLIPPING BASED FILTERING METHODS FOR PAPR REDUCTION IN OFDM SIGNAL Md. Munjure Mowla1 , Md. Yeakub Ali2 and Rifat Ahmmed Aoni3 1,2 Department of Electronics & Telecommunication Engineering, Rajshahi University of Engineering & Technology, Rajshahi - 6204, Bangladesh 3 Department of Electrical Engineering, University of Malaya, Kuala Lumpur -50603, Malaysia ABSTRACT The growth of wireless communication technologies has been producing the intense demand for high-speed, efficient, reliable voice & data communication. As a result, third generation partnership project (3GPP) has implemented next generation wireless communication technology long term evolution (LTE) which is designed to increase the capacity and speed of existing mobile telephone & data networks. LTE has adopted a multicarrier transmission technique known as orthogonal frequency division multiplexing (OFDM). OFDM meets the LTE requirement for spectrum flexibility and enables cost-efficient solutions for very wide carriers. One major generic problem of OFDM technique is high peak to average power ratio (PAPR) which is defined as the ratio of the peak power to the average power of the OFDM signal. A trade-off is necessary for reducing PAPR with increasing bit error rate (BER), computational complexity or data rate loss etc. In this paper, two clipping based filtering methods have been implemented & also analyzed their modulation effects on reducing PAPR. KEYWORDS Bit Error rate (BER), Complementary Cumulative Distribution Function (CCDF), Long Term Evolution (LTE), Orthogonal Frequency Division Multiplexing (OFDM) and Peak to Average Power Ratio (PAPR) FOR MORE DETAILS: https://wireilla.com/papers/ijmnct/V4N1/4114ijmnct03.pdf VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
  • 11. REFERENCES [1] R. Prasad, OFDM for Wireless Communications Systems. London, Boston: Artech House, Inc, 2004. [2] S. H. Han and J. H. Lee, “An overview of peak-to-average power ratio reduction techniques for multicarrier transmission”, IEEE Wireless Comm, vol. 12, no.2, pp.56-65, Apr. 2005. [3] Md. Munjure Mowla, “Peak to average power ratio analysis and simulation in LTE system”, M.Sc dissertation, Department of Electrical & Electronic Engineering, Rajshahi University of Engineering & Technology, Bangladesh, 2013. [4] Muhammad Atif Gulzar , Rashid Nawaz and Devendra Thapa, “Implementation of MIMO-OFDM System for WiMAX”, M.Sc Dissertation, Department of Electrical Engineering, Linnaeus University, Sweden, 2011. [5] Natalia Revuelto, “PAPR reduction in OFDM systems”, M.Sc Dissertation, Universitat Politecnica de Catalunya, Spain, 2008. [6] Y.S. Cho, J. Kim, W.Y.Yang and C.G. Kang, MIMO OFDM Wireless Communications with MATLAB, Singapore: John Wiley & Sons (Asia) Pte Ltd, 2010. [7] M.M.Mowla and S.M.M. Hasan, “Performance improvement of PAPR reduction for OFDM signal in LTE system”, International Journal of Wireless & Mobile Networks (IJWMN), Volume 5, Number 4, August 2013 (ISSN: 0975-3834).
  • 12. Citation Count – 09 A REVIEW PAPER ON: THE PAPR ANALYSIS OF ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) MOHSIN KHAN1 , SAMIMA IQBAL2 and WASEEM ASGHAR3 1 Department of Computer Science, Lahore Garrison University, Lahore 2, 3 Computing & Technology Department, IQRA University Islamabad Campus AABBSSTTRRAACCTT OFDM (Orthogonal Frequency Division Multiplexing) has been raised a new modulation technique. Due to its advantages in multipath fading channel e.g. robust against ISI, ICI and some other advantages like best QoS for multiple users, efficient usage of bandwidth it is suggested to be the modulation technique for next generation 4G networks e.g. LTE. But along with all its advantages there are some disadvantages also e.g. High PAPR (Peak to Average Power Ratio) at the transmitter end and BER (Bit Error Rate) at the receiving end. Since OFDM is only used in the downlink of 4G networks. To reduce the problems of OFDM some techniques e.g. SLM, PTS, Clipping, Coding, & Pre-coding etc are suggested but none of them is reduce the PAPR and BER to an acceptable value. This Paper will discuss some techniques of PAPR & BER reduction, and their advantages and disadvantages in detail. KKEEYYWWOORRDDSS PAPR, OFDM, SLM, DHT, DCT FOR MORE DETAILS: https://wireilla.com/papers/ijmnct/V4N1/4114ijmnct01.pdf VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
  • 13. REFERENCES [1] Y.Wu and W. Y. Zou, "Orthogonal frequency division multiplexing: A multi-carrier modulation scheme," IEEE Trans. Consumer Electronics, vol. 42. no. 3, pp. 392-399, August 1995. [2] W. Y. Zou and Y. Wu, "COFDM: An overview," IEEE Trans. Broadcasting, vol. 41 no.1, pp. 1-8, March 1995. [3] JAE HONG LEE SEUNG HEE HAN, "AN OVERVIEW OF PEAK-TO-AVERAGE POWER RATIO REDUCTION TECHNIQUES FOR MULTICARRIER TRANSMISSION," IEEE Wireless Communications, pp. 56-65, April 2005. [4] Yiyan Wu Tao Jiang, "An Overview: Peak-to-Average Power Ratio Reduction Techniques for OFDM Signals," IEEE TRANSACTIONS ON BROADCASTING, VOL. 54, NO. 2, JUNE 2008, vol. 54, no.2, pp. 257- 268, June 2008. [5] Jr L. J. Cimini, "Analysis and simulation of a digital mobile channel using orthogonal frequency division multiplexing," IEEE Trans. Communication, vol. COM-33, no. 7, pp. 665-675, July 1985. [6] Y. G. Li and G. Stüber, "Orthogonal Frequency Division Multiplexing for Wireless Communications," Boston, MA: Springer-Verlag, January 2006. [7] Chenyang Yang,Gang Wu, Shaoqian Li, and Geoffrey Ye Li Taewon Hwang, "OFDM and Its Wireless Applications: A Survey," IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, vol. 58, NO. 4, pp. 1673-1694, May 2009. [8] R. O'Neill and L. B. Lopes, "Envelope Variations and Spectral Splatter in Clipped Multicarrier Signals ," IEEE Processing PIMRC 95 Toronto, Canada, pp. 71-75, September 1995. [9] X. Li and Jr L. J. Cimini, "Effect of Clipping and Filtering on the Performance of OFDM," IEEE Communication Letter, vol. 2, no. 5, pp. 131-133, May 1998. [10] D. Kim and G. L. Stüber, "Clipping Noise Mitigation for OFDM by Decision–Aided Reconstruction," IEEE Communication Letter, vol. 3, no. 1, pp. 4-6, January 1999. [11] H. Saeedi, M. Sharif, and F. Marvasti, "Clipping Noise Cancellation in OFDM Systems Using Oversampled Signal Reconstruction ," IEEE Communication Letter, vol. 6, no. 2, pp. 73-75, February 2002. [12] Sungkeun Cha, Myonghee Park, Sungeun Lee, Keuk-Joon Bang, and Daesik Hong, "A new PAPR reduction technique for OFDM systems using advanced peak windowing method," IEEE Transactions on Consumer Electronics, , vol. 54, no. 2, pp. 405-410, May 2008. [13] P. Foomooljareona nd W.A.C. Fernando, "PAPR Reduction in OFDM Systems," Thammasat Int. J. Sc. Tech, vol. 7, no. 3, pp. 70-79, December 2002. [14] Jiang Tao and Guangxi Zhu, "Nonlinear companding transform for reducing peak-to-average power ratio of OFDM signals," IEEE Transactions on Broadcasting, vol. 50, no. 3, pp. 342-346, September 2004. [15] N. Bouaynaya, and S. Mohan Y. Rahmatallah, "Bit error rate performance of linear companding transforms for PAPR reduction in OFDM systems," in Proc. IEEE GLOBECOM, Houston, TX, USA, December 2011. [16] Muller S. H. and Huber J. B, "A novel peak power reduction scheme for OFDM," the 8th IEEE International Symposium on in Personal, Indoor and Mobile Radio Communications, 1997.
  • 14. [17] M. Breiling, S.H. Muller-Weinfurtner, and J.B Huber, "SLM peak-power reduction without explicit side information," IEEE Communications Letters, vol. 5, no. 6, pp. 239-241, June 2001. [18] Chin-Liang Wang, Sheng-Ju Ku, and Chun-Ju Yang, "A Low-Complexity PAPR Estimation Scheme for OFDM Signals and Its Application to SLM-Based PAPR Reduction," IEEE Journal of Selected Topics in Signal Processing, vol. 4, no. 3, pp. 637-645, June 2010. [19] S.H. Muller and J.B Huber, "OFDM with reduced peak-to-average power ratio by optimum combination of partial transmit sequences," IEEE Electronics Letters , vol. 33, no. 5, pp. 368-369, February 1997. [20] Han Seung Hee and Jae Hong Lee, "PAPR reduction of OFDM signals using a reduced complexity PTS technique," IEEE Signal Processing Letters, vol. 11, no. 11, pp. 887-890, November 2004 . [21] Dae-Woon Lim, Seok-Joong Heo, Jong-Seon No, and Habong Chung, "A new PTS OFDM scheme with low complexity for PAPR reduction," IEEE Transactions on Broadcasting, vol. 52, no. 1, pp. 77- 82, March 2006. [22] J. Tellado, "Peak to Average Power Reduction for Multicarrier Modulation," Ph.D. dissertation, Stanford Univ, 2000. [23] B. S. Krongold and D. L. Jones, "An Active Set Approach for OFDM PAR Reduction via Tone Reservation," IEEE Transaction Signal Processing, vol. 52, no. 2, pp. 495-509, February 2004. [24] D L Jones, "Peak power reduction in OFDM and DMT via active channel modification," in Proc. Asilomar Conference on Signals, Systems, and Computers, vol. 2, pp. 1076-1079, 1999. [25] B. S. Krongold and D. L. Jones, "PAR Reduction in OFDM via Active Constellation Extension," IEEE Transaction on Broadcasting, vol. 49, no. 3, pp. 258-268, September 2003. [26] S. Pino-Povedano and F.J Gonzalez-Serrano, "PAPR reduction for OFDM transmission using a method of Convex Optimization and Amplitude Predistortion," International Workshop on Satellite and Space Communications, IWSSC 2009, pp. 210-214, 9-11 September 2009. [27] C. Nader, P. Handel, and N Bjorsell, "Peak-to-Average Power Reduction of OFDM Signals by Convex Optimization: Experimental Validation and Performance Optimization," IEEE Transactions on Instrumentation and Measurement, vol. 60, no. 2, pp. 473-479, February 2011. [28] Lung-Sheng Tsai, Wei-Ho Chung, and Da-shan Shiu, "Lower Bounds on the Correlation Property for OFDM Sequences with Spectral-Null Constraints," IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 2652-2659, August 2011. [29] J.A. Davis and J Jedwab, "Peak-to-mean power control and error correction for OFDM transmission using Golay sequences and Reed-Muller codes," Electronics Letters, vol. 33, no. 4, pp. 267-268, February 1997. [30] J.A. Davis and J Jedwab, "Peak-to-mean power control in OFDM, Golay complementary sequences, and Reed-Muller codes," IEEE Transactions on Information Theory, vol. 45, no. 7, pp. 2397-2417, November 1999. [31] Jiang Tao and Guangxi Zhu, "Complement block coding for reduction in peak-to-average power ratio of OFDM signals," IEEE Communications Magazine, vol. 43, no. 9, pp. S17-S22, September 2005. [32] Heeyoung Jun, Jaehee Cho, et.al Myonghee Park, "PAPR reduction in OFDM transmission using Hadamard transform," ICC 2000, pp. 430-433, 2000. [33] Xiang-Gen Xia, "Precoded and vector OFDM robust to channel spectral nulls and with reduced cyclic prefix length in single transmit antenna systems," IEEE Transactions on Communications, vol. 49, no. 8, pp. 1363- 1374, August 2001.
  • 15. [34] Yuan-Pei Lin and See-May Phoong, "BER minimized OFDM systems with channel independent precoders," IEEE Transactions on Signal Processing, vol. 51, no. 9, pp. 2369-2380, September 2003. [35] Zhengdao Wang, Shengli Zhou, and G.B Giannakis, "Joint coding-precoding with low-complexity turbo- decoding," IEEE Transactions on Wireless Communication, vol. 3, no. 3, pp. 832-842, May 2004. [36] Yew Kuan Min, M. Drieberg, and V Jeoti, "On PAPR Reduction in OFDM Systems: A Technique using Normalized Complex Hadamard Transform," IEEE Region TENCON 2005, pp. 1-4, 21-24 November 2005. [37] I. Baig and V Jeoti, "PAPR analysis of DHT-precoded OFDM system for M-QAM," International Conference on Intelligent and Advanced Systems (ICIAS), pp. 1-4, 15-17 June 2010. [38] I. Baig and V Jeoti, "DCT precoded SLM technique for PAPR reduction in OFDM systems," International Conference on Intelligent and Advanced Systems (ICIAS), 2010, pp. 1-6, 15-17 June 2010. [39] I. Baig and V Jeoti, "PAPR Reduction in OFDM Systems: Zadoff-Chu Matrix Transform Based Pre/Post- Coding Techniques," Second International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), 2010, pp. 373-377, July 2010. [40] A. Joshi, D. Bhardwaj, and D.S Saini, "PAPR reduction in OFDM with FEC (RS-CC and Turbo coding) using DHT preceding," International Symposium on Instrumentation & Measurement, Sensor Network and Automation (IMSNA), vol. 1, no. 1, pp. 14-18, 25-28 August 2012. [41] N. Ahmed and K.R. Rao, "Orthogonal transforms for digital signal processing," Berlin: SpringerVerlag, 1975. [42] R.N. Bracewell, "Discrete Hartley transform," Journal of the Optical Society of America, vol. 73, no. 12, pp. 1832-1835, 1983. [43] B.M Popovic´, "Spreading sequences for multi-carrier CDMA systems," In IEE Colloquium CDMA Techniques and Applications for Third Generation Mobile Systems, pp. 1-8, 1997. [44] N. Ahmed, T. Natarajan, and K.R and Rao, "Discrete cosine transform," IEEE Transactions on Computers, C-23(1), pp. 90-93, 1974.
  • 16. Citation Count – 08 PERFORMANCE ANALYSIS ON THE BASIS OF A COMPARATIVE STUDY BETWEEN MULTIPATH RAYLEIGH FADING AND AWGN CHANNEL IN THE PRESENCE OF VARIOUS INTERFERENCE Sutanu Ghosh Dr. Sudhir Chandra Sur Degree Engineering College AABBSSTTRRAACCTT Interference is the most important issue for present wireless communication. There are various kinds of channel used in wireless communication. Here I want to show a performance analysis on the basis of two different channels – AWGN and Multipath Rayleigh fading channel. This is the comparative analysis with different kinds of modulation techniques. Here I have also measured the Bit Error Rate with respect to different modulation techniques and compare the rate in different channels. My objective is to compare the different characteristics of the transmitter and receiver for different types of channels and modulators. KKEEYYWWOORRDDSS Rayleigh fading channel, Bit Error Rate, AWGN, Cellular Interference. FOR MORE DETAILS: http://wireilla.com/papers/ijmnct/V4N1/4114ijmnct02.pdf VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
  • 17. REFERENCES [1] Cavers, James K. “An analysis of pilot symbol assisted modulation for Rayleigh fading channels [mobile radio].” Vehicular Technology, IEEE Transactions on 40.4 (1991): 686-693 [2] Stein, Seymour. “Fading channel issues in system engineering.” Selected Areas in Communications, IEEE Journal on 5.2 (1987): 68-89. [3] Mishra, Ajay R. “Fundamentals of cellular network planning and optimisation: 2G/2.5 G/3G... evolution to 4G.”Wiley. com, 2004. [4] Foschini, Gerard J. and Michael J. Gans. “On limits of wireless communications in a fading environment when using multiple antennas.” Wireless personal communications 6.3 (1998): 311-335. [5] Yang, Hong-Chuan and M-S. Alouini. "Closed-form formulas for the outage probability of wireless communication systems with a minimum signal power constraint." Vehicular Technology, IEEE Transactions on 51.6 (2002): 1689-1698. [6] T. S. Rappaport, Wireless Communications: Principles and Practice. N.J.: Prentice Hall, 1996. [7] Petersen, B. R. and D. D. Falconer. "Exploiting cyclostationary subscriber-loop interference by equalization." Global Telecommunications Conference, 1990, and Exhibition.'Communications: Connecting the Future', GLOBECOM'90., IEEE. IEEE, 1990. [8] Chen, S. and B. Mulgrew. "Overcoming co-channel interference using an adaptive radial basis function equaliser." Signal Processing 28.1 (1992): 91-107.