SlideShare a Scribd company logo
1 of 29
Download to read offline
Most Viewed Articles inWireless
& Mobile Networks
International Journal of Wireless & Mobile
Networks (IJWMN)
ISSN: 0975-3834 [Online]; 0975-4679 [Print]
http://airccse.org/journal/ijwmn.html
FAULT DETECTION AND RECOVERY IN WIRELESS SENSOR
NETWORK USING CLUSTERING
Abolfazl Akbari1, Arash Dana2, Ahmad Khademzadeh3 and Neda Beikmahdavi4
1Dept. of Computer Engineering, Islamic Azad University Ayatollah Amoli Branch, Amol,
Iran
2Islamic Azad University, Central Tehran Branch, Tehran, Iran
3Iran Telecom Research Center, Tehran, Iran
4 Islamic Azad University Ayatollah Amoli Branch, Amol, Iran
ABSTRACT
Some WSN by a lot of immobile node and with the limited energy and without further charge
of energy. Whereas extension of many sensor nodes and their operation. Hence it is normal.
unactive nodes miss their communication in network, hence split the network. For avoidance
split of network, we proposed a fault recovery corrupted node and Self Healing is necessary.
In this Thesis, we design techniques to maintain the cluster structure in the event of failures
caused by energy-drained nodes. Initially, node with the maximum residual energy in a
cluster becomes cluster heed and node with the second maximum residual energy becomes
secondary cluster heed. Later on, selection of cluster heed and secondary cluster heed will be
based on available residual energy. We use Matlab software as simulation platform
quantities. like, energy consumption at cluster and number of clusters is computed in
evaluation of proposed algorithm. Eventually we evaluated and compare this proposed
method against previous method and we demonstrate our model is better optimization than
other method such as Venkataraman, in energy consumption rate.
KEYWORDS
Sensor Networks, clustering, fault detection, fault recovery.
Full Text: http://airccse.org/journal/jwmn/0211ijwmn12.pdf
Volume Link: http://airccse.org/journal/jwmn_current11.html
REFERENCES
[1] A. Bharathidasas, and V. Anand, “Sensor networks: An overview”, Technical report,
Dept. of Computer Science, University of California at Davis, 2002
[2] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, "Next century challenges: Scalable
coordination in sensor networks", in Proceedings of ACM Mobicom, Seattle, Washington,
USA, August 1999, pp. 263-- 270, ACM.
[3] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor
Networks", IEEE Communications Magazine, pp. 102--114, August 2002.
[4] D. Estrin, L. Girod, G. Pottie, M. Srivastava, “Instrumenting the world with wireless
sensor networks”, In Proceedings of the International Conference on Acoustics, Speech and
Signal Processing (ICASSP 2001.
[5] E. S. Biagioni and G. Sasaki, “Wireless sensor placement for reliable and efficient data
collection”, in the 36th International Conference on Systems Sciences, Hawaii, January 2003.
[6] G. Gupta and M. Younis, “Load-Balanced Clustering in Wireless Sensor Networks”, in
the Proceedings of International Conference on Communication (ICC 2003), Anchorage, AK,
May 2003.
[7] J. Chen, S. Kher and A. Somani, “Distributed Fault Detection of Wireless Sensor
Networks”, in DIWANS'06. 2006. Los Angeles, USA: ACM Pres.
[8] F. Koushanfar, M. Potkonjak, A. Sangiovanni- Vincentelli, “Fault Tolerance in Wireless
Ad-hoc Sensor Networks”, Proceedings of IEEE Sensors 2002, June, 2002.
[9] W. L. Lee, A. Datta, and R. Cardell-Oliver, “Network Management in Wireless Sensor
Networks”, to appear in Handbook on Mobile Ad Hoc and Pervasive Communications, edited
by M. K. Denko and L. T.Yang, American Scientific Publishers.
[10] G. Venkataraman, S. Emmanuel and S.Thambipillai, “Energy-efficient cluster-based
scheme for failure management in sensor networks” IET Commun, Volume 2, Issue 4, April
2008 Page(s):528 – 537
[11] L. Paradis and Q. Han, “A Survey of Fault Management in Wireless Sensor Networks”,
Journal of Network and Systems Management, vol. 15, no. 2, pp. 171-190, 2007.
[12] L. M. S. D. Souza, H. Vogt and M. Beigl, “A survey on fault tolerance in wireless sensor
networks”, 2007.
[13] W. L Lee, A.D., R. Cordell-Oliver, WinMS: Wireless Sensor Network-Management
System, An Adaptive Policy-Based Management for Wireless Sensor Networks. 2006.
[14] L. B. Ruiz, I. G.Siqueira, L. B. Oliveira, H. C. Wong, J.M. S. Nigeria, and A. A. F.
Loureiro. “Fault management in event-driven wireless sensor networks”, MSWiM’04,
October 4-6, 2004, Venezia, Italy
[15] G. Gupta and M. Younis; Fault tolerant clustering of wireless sensor networks;
WCNC’03, pp. 1579.1584.
[16] M. Ding, D. Chen, K. Xing, and X. Cheng, “Localized fault-tolerant event boundary
detection in sensor networks”, in Proceedings of the 24th Annual Joint Conference of the
IEEE Computer and Communications Societies (INFOCOM '05), vol. 2, pp. 902–913,
Miami, Fla, USA, March 2005
[17] C. Hsin and M.Liu, “Self-monitoring of Wireless Sensor Networks”, Computer
Communications, 2005. 29: p. 462-478
[18] S. Chessa and P. Santi, “Crash faults identification in wireless sensor networks”,
Comput. Commun., 2002, 25, (14), pp. 1273-1282.
[19] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient
Communication Protocol for Wireless Microsensor Networks," Proc. Hawaii Int'l Conf.
System Sciences 2000.
[20] GUPTA G., YOUNIS M.: ‘Fault-tolerant clustering of wireless sensor networks’. Proc.
IEEE WCNC, New Orleans, USA,March 2003, vol. 3, p. 1579 – 1584
[21] N. Bulusu, J. Heidemann and D. Estrin, ”GPS-less Low Cost Outdoor Localization For
Very Small Devices”, IEEE Personal Communications, Special Issue on "Smart Spaces and
Environments", Vol. 7, No. 5, pp. 28-34, October 2000.
[22] Radhika Nagpal, ”Organizing a Global Coordinate System from Local Information on
anAmorphous Computer”, MIT AI Memo 1666, August 1999
BROWSER GAMES FOR ONLINE COMMUNITIES
Juha-Matti Vanhatupa
Department of Software Systems, Tampere University of Technology, Tampere, Finland
ABSTRACT
Games played directly inside the web browser have many benefits. Browser games do not
need software installation. Furthermore since the web has become the ultimate collaboration
environment, the games are available for numerous players that can play in collaborative
fashion. Through history online communities have birth alongside with browser games.
Nowadays online communities have achieved massive user numbers and those can be
important part of the browser game itself. This article targets at analyzing and categorizing of
browser games. We also discuss financial opportunities relating to browser games and
technologies used in those.
KEYWORDS
Browser Games, Game Analysis, Online Communities
Full Text: http://airccse.org/journal/jwmn/0203ijwmn03.pdf
Volume Link: http://airccse.org/journal/jwmn_current10.html
REFERENCES
[1] Facebook Social Utility, http://www.facebook.com/
[2] Travian Browser Game, http://www.travian.com/
[3] Hattrick Browser Game, http://www.hattrick.org/
[4] Vanhatupa Juha-Matti (2010) “Browser Games: The New Frontier of Social Gaming”, In
Proc of Second International Conference of Wireless & Mobile Networks. CCIS Vol. 84, pp.
349-355, Springer Berlin Heidenberg
[5] Barton Matt, (2008) Dungeons & Desktops, The History of Computer Role Playing
Games, A.K. Peters, pp. 37-43.
[6] Earth 2025 Browser Game, http://games.swirve.com/earth
[7] Facebook Statistics, http://www.facebook.com/press/info.php?statistics
[8] Mafia Wars Facebook application,
http://www.facebook.com/apps/application.php?id=10979261223
[9] Dogs of the Seas Browser Game, http://www.dogsoftheseas.com/
[10] DarkOrbit Browser Game, http://www.darkorbit.com/
[11] ForumWarz Browser Game, http://www.forumwarz.com/
[12] Stick Arena Browser Game, http://www.xgenstudios.com/play/stickarena
[13] Habbo Hotel Virtual World, http://www.habbo.com/
[14] Hattrick history, http://hattrick.org/Help/History.aspx
[15] Häsel Mathias, (2007) “Rich Internet Architectures for Browser-Based Multiplayer
Real-Time Games –Design and Implementation Issues of virtual-kicker.com”, In: Enokido,
T./Barolli, L./Takizawa, M. (Eds.), Network-Based Information Systems: First International
Conference, NBiS 2007. LNCS, vol. 4658, pp. 157-166, Berlin/Heidelberg: Springer-Verlag
[16] Mizanian Kiarash, Vasef Mehdi, Analoui Morteza, (2010) ”Bandwidth Modeling and
Estimation in Peer to Peer Networks”, International Journal of Computer Networks &
Communications (IJCNC), Vol. 2, No. 3.
[17] Klemm Alexander, Lindemann Christoph, Waldhorst Oliver P., (2003), “A Special-
Purpose Peer-to-Peer File Sharing System for Mobile ad hoc networks”, In Proc of Vehicular
Technology Conference, VTC2003, IEEE 58th Vol.4, pp. 2758-2763.
[18] Sharma Abhishek, Shi Hao, (2010) “Innovative Rated-Resource Peer-to-Peer Network”,
International Journal of Computer Networks & Communications (IJCNC), Vol. 2, No. 2.
[19] Foxtrick Hattrick web plugin, http://www.ht-foxtrick.com/forum/portal.php
[20] Facebook Advertising, http://www.facebook.com/advertising/
[21] The Continuum Browser Game, http://www.thecontinuum.com/
[22] Magic: The Gathering collectible card game,
http://www.wizards.com/magic/multiverse/default.aspx
[23] Club Penguin Browser Game, http://www.clubpenguin.com/
[24] Walmsley Andrew, Kids’ Virtual Worlds are Maturing Nicely,
http://www.marketingmagazine.co.uk/news/756021/
[25] Schultheiss Daniel, (2007) “Long-term Motivations to Play MMOGs: A Longitudinal
Study on Motivations, Experience and Behavior”, In Proc of the DiGRA 2007 - Situated
Play,Digital Games Research Association International Conference 2007, 344-348.
[26] Space Merchant Realms Browser Game, http://www.smrealms.de/
[27] Kabus Patrick, Terpstra Wesley, Cilia Mariano, Buchmann, Alejandro, (2005)
“Addressing Cheating in Distributed MMOGs”, In Proc of the 4th ACM SIGCOMM
workshop on Network and system support for games.
A NOVEL APPROACH FOR MOBILITY MANAGEMENT IN LTE
FEMTOCELLS
1Pantha Ghosal, 2Shouman Barua, 3Ramprasad Subramanian, 4Shiqi Xing and 5Kumbesan
Sandrasegaran
1,2,3,4,5,6Centre for Real-time Information Networks
School of Computing and Communications, Faculty of Engineering and Information
Technology, University of Technology Sydney, Sydney, Australia
ABSTRACT
LTE is an emerging wireless data communication technology to provide broadband
ubiquitous Internet access. Femtocells are included in 3GPP since Release 8 to enhance the
indoor network coverage and capacity. The main challenge of mobility management in
hierarchical LTE structure is to guarantee efficient handover to or from/to/between
Femtocells. This paper focuses, on different types of Handover and comparison performance
between different decision algorithms. Furthermore, a speed based Handover algorithm for
macro-femto scenario is proposed with simulation results
KEYWORDS
Femtocell Access Point (FAP), Handover Hysteresis Margin (HMM), Reference Signal
Received Power (RSRP), Reference Signal Received Quality (RSRQ), Signal to Interference
Plus Noise Ratio (SINR, Evolved NodeB (eNB), User equipment (UE).
Full Text: http://airccse.org/journal/jwmn/6514ijwmn04.pdf
Volume Link: http://airccse.org/journal/jwmn_current14.html
REFERENCES
[1] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access. Wiley, NewYork,
2008.
[2] E Dahlman, S Parkvall, J Skold, P Beming, 3G Evolution HSPA and LTE for Mobile
Broadband. Academia Press, USA, 2008.
[3] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, "On Accurate simulations of LTE
femtocells using an open source simulator," in EURASIP Journal on Wireless
Communication and Networking, 2012.
[4] Onyeije Consulting LLC, Solving the capacity crunch (2011).
[5] T. Zahir, K. Arshad, A. Nakata, K. Moessner,“Interference Management in Femtocells,”
in Commun. Surveys & Tutorials, vol. 15, pp. 293-311, 2013.
[6] www.en.wikipedia.org/wiki/Fixed_mobile_convergence/.
[7] R. Bendlin, V. Chandrasekhar, C. Runhua, A. Ekpenyong, and E. Onggosanusi, "From
homogeneous to heterogeneous networks: A 3GPP Long Term Evolution rel. 8/9 case study,"
in 45th Annu. Conf., Inform. Sci. and Syst. (CISS), Baltimore, MD, pp. 1-5, 2011.
[8] H. Mahmoud, I .Guvenc,” A comparative study of different deployment modes for
femtocell networks,” in IEEE Int. Symposium on Personal, Indoor and Mobile Radio
Commun. , Palo Alto, USA, pp. 1–5, 2009.
[9] D. Xenakis, N. Passas, L. Merakos, C. Verikoukis, “Mobility Management for Femtocells
in LTEAdvanced: Key Aspects and Survey of Handover Decision Algorithms” in IEEE
Commun. Surveys & Tutorials., vol. 16 pp. 2014.
[10] J. Moon, D. Cho, “Efficient handoff algorithm for inbound mobility in hierarchical
macro/femto cell networks”, IEEE Commun. Mag. Letters, vol.13, no.10, pp.755-757, Oct.
2009.
[11] P. Xu, X. Fang, R. He, Z. Xiang, “An efficient handoff algorithm based on received
signal strength and wireless transmission loss in hierarchical cell networks”, Telecom. Sys. J.,
Elsevier, pp. 1-9, Sept. 2011.
[12] D. Lopez-Perez, A. Valcarce, A. Ladanyi, G. de la Roche, J. Zhang, “Intracell handover
for interference and handover mitigation in OFDMA two-tier macrocell-femtocell networks”,
EURASIPJ. on Wirel. Com
[13] A. Ulvan, M. Ulvan, and R. Bestak, “The Enhancement of Handover Strategy by
Mobility Prediction in Broadband Wirel. Access”, Netw. and Electronic Commerce Research
Conf. (NAEC) 2009, TX: American Telecom. Sys. Mgmt. Assoc. Inc., pp. 266-276, 2009.
ISBN 978-0-9820958-2-9.
[14] A. Ulvan, R.Bestak, M.Ulvan,“Handover Scenario and Procedure in LTE-based
Femtocell Networks," UBICOMM 4th Intl. Conf. on mobile ubiquitous computing, system,
services and tech.Florance, Italy, 2010.
[15] H. Zhang, X. Wen, B. Wang, W. Zheng, Y. Sun, “A Novel Handover Mechanism
Between Femtocell and Macrocell for LTE Based Networks”, IEEE 2nd Internat. Conf. on
Comm. Softw. and Nets. 2010 (ICCSN), pp.228-231, Feb. 2010.
[16] D. Xenakis, N. Passas, and C. Verikoukis, “A Novel Handover Decision Policy for
Reducing Power Transmissions in the two-tier LTE network”, 2012 IEEE Internat. Comm.
Conf. (ICC), pp.1352-1356, June 2012.
[17] D. Xenakis, N. Passas, C. Verikoukis, “An energy-centric handover decisionalgorithm
for the integrated LTE macrocell-femtocell network”, Comp. Comm., Elsevier, 2012
[18] An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications,
First Edition, m Copyright John Wiley and Sons Ltd., Inc. 2012. Published by John Wiley &
Sons, Ltd, ISBN: 9781119970385
[19] G Piro, L Grieco, G Boggia, F Capozzi, P Camarda,”Simulating LTE cellular systems:
an opensource framework, ” in Vehicular Technology, IEEE Trans. vol. 60, pp. 498-513,
2011.
[20] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network
research,” Wireless Communications and Mobile Computing, vol. 2, pp. 483–502, Aug.
2002.
[21] R Subramanian, P Ghosal, S Barua, S Xing, S Cong, K Sandrasegaran,'' Survey of LTE
Downlink Schedulers Algorithm in Open Access Simulation Tolls NS-3 and LTE-Sim '',
Manuscript in International Journal of Wireless & Mobile Networks(IJWMN), November
2014.
SYSTEM LEVEL SIMULATION FOR TWO TIER MACRO-FEMTO
CELLULAR NETWORKS
1Shiqi Xing, 2 Pantha Ghosal, 3Shouman Barua, 4 Ramprasad Subramanian and 5Kumbesan
Sandrasegaran
Centre for Real-time Information Networks
School of Computing and Communications, Faculty of Engineering and Information
Technology, University of Technology Sydney, Sydney, Australia.
ABSTRACT
LTE is an emerging wireless communication technology to provide high- speed data service
for the mobile phones and data terminals. To improve indoor coverage and capacity
Femtocells are included in 3GPP since Release 8. There is no common simulation platform is
available for performance justification of LTEFemtocells. LTE-Sim is an object-oriented
open source simulator which incorporates a complete protocol stack can be used for
simulating two-tier macro-femto scenarios. To the best of our knowledge no paper provides
the guideline to perform system level simulation of Femtocell networks. Here, in this paper
Femtocells performance is evaluated in multi-Macrocells and multi-Femtocells environment
with interference from Microcells and Macrocell users along with the scripting.
KEYWORDS
Channel quality indicator (CQI), Femto Access Point (FAP), Macro eNodeB (MeNB),
Macrocell User Equepment (MUE), Moblity Management Entity(MME), Signal to
Interference Plus Noise Ratio(SINR), Physical Layer(PHY)
Full Text: http://airccse.org/journal/jwmn/6614ijwmn01.pdf
Volume Link: http://airccse.org/journal/jwmn_current14.html
REFERENCES
[1] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access. Wiley, NewYork,
2008.
[2] E Dahlman, S Parkvall, J Skold, P Beming, 3G Evolution HSPA and LTE for Mobile
Broadband. Academia Press, USA, 2008.
[3] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, "On Accurate simulations of LTE
femtocells using an open source simulator," in EURASIP Journal on Wireless
Communication and Networking, 2012.
[4] G Piro, L Grieco, G Boggia, F Capozzi, P Camarda,”Simulating LTE cellular systems: an
opensource framework, ” in Vehicular Technology, IEEE Trans. vol. 60, pp. 498-513, 2011.
[5] Raheem, Rand, Aboubaker Lasebae, and Jonathan Loo. "Performance Evaluation of LTE
Network via Using Fixed/Mobile Femtocells." Advanced Information Networking and
Applications Workshops (WAINA), 2014 28th International Conference on. IEEE, 2014.
[6] WCDMA for UMTS – HSPA Evolution and LTE, Fourth Edition. Edited by Harri Holma
and Antti Toskala © 2007 John Wiley & Sons, Ltd. ISBN: 978-0-470-31933-8
[7] D. Lopez-Perez, I. Guvenc, G. de la Roche, M. Kountouris, T. Q. S. Quek, and Z. Jie,
"Enhanced intercell interference coordination challenges in heterogeneous networks," IEEE
Wireless Commun., vol. 18, pp. 22-30, 2011.
[8] D. Xenakis, N. Passas, L. Merakos, C. Verikoukis, “Mobility Management for Femtocells
in LTEAdvanced: Key Aspects and Survey of Handover Decision Algorithms” in IEEE
Trans. Wireless Commun., vol. 18 pp. 2011.
[9] R. Bendlin, V. Chandrasekhar, C. Runhua, A. Ekpenyong, and E. Onggosanusi, "From
homogeneous to heterogeneous networks: A 3GPP Long Term Evolution rel. 8/9 case study,"
in 45th Annu. Conf., Inform. Sci. and Syst. (CISS), Baltimore, MD, pp. 1-5, 2011.
[10] H. Mahmoud, I .Guvenc,” A comparative study of different deployment modes for
femtocell networks,” in IEEE Int. Symposium on Personal, Indoor and Mobile Radio
Commun. , Palo Alto, USA, pp. 1–5, 2009.
[11] Siemens, R1-060135, “Interference Mitigation by Partial Frequency Reuse,” 3GPP RAN
WG1#42, London, UK, January 2006.
[12] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network
research,” Wireless Communications and Mobile Computing, vol. 2, pp. 483–502, Aug.
2002.
[13] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, " A system-level simulation
framework for LTE Femtocell," in Proc. of International Conference on Simulation Tools and
Techniques(ICST), Desenzano, Italy, pp.1-3, 2012.
[14] http://www.infoutils.com/frequency-reuse-in-ofdma-based-ltewimax-system/
EXPLAINABLE AI FOR AUTONOMOUS NETWORK FUNCTIONS IN
WIRELESS AND MOBILE NETWORKS
Premnath K Narayanan1 and David K Harrison2
1LM Ericsson Ltd., SA OSS PDU OSS S&T Research & PCT, Athlone, Ireland
2School of Computing, Glasgow Caledonian University, Glasgow, United Kingdom
ABSTRACT
As the telecommunication network components and functions are getting commoditized, the
complexity in configuration and optimization increases. Several automation techniques are
evolving from traditional deterministic algorithms (pre-defined rulesets obtained from
experience accumulated by humans) that were heuristic-based to more cognitive and
stochastic-based algorithms. The aim of this paper is to introduce the seven layers in wireless
telecommunication networks that uses stochastic or AI algorithms, explain the need for
monitoring and possible potential biases in each layer of the stochastic algorithm stack and
finally conclude with evaluation methods, techniques for detecting false positive and false
negative proposals in autonomous network functions. The main subject of the paper is to
provide a background on the need of explainable AI for autonomous network functions. The
paper includes introduction of two models ANOBIA and INFEROBIA models that helps to
achieve explainable AI for autonomous network functions in wireless and mobile networks.
KEYWORDS
Explainable AI; Machine Learning; Artificial Intelligence; Precision; Recall; BIAS;
Variance; Algorithm and Mitigation methods
Full Text: https://aircconline.com/ijwmn/V12N3/12320ijwmn03.pdf
Volume Link: http://airccse.org/journal/jwmn_current20.html
REFERENCES
[1] Paulo Valente Klaine, Muhammad Ali Imran, OluwakayodeOnireti, Richard Demo
Souza, "A Survey of Machine Learning Techniques Applied to Self-Organizing Cellular
Networks," IEEE Communications Surveys and Tutorials, IEEE, Volume 19, issue 4, pp.
2392-2431, DOI: 10.1109/COMST.2017.2727878, 2017
[2] O-RAN alliance, “Operator Defined Next Generation RAN Architecture and Interfaces,"
https://www.o-ran.org/, 2019 (last accessed August 2019)
[3] Matti Latva, Kari Leppanen, "Key drivers and research challenges for 6G ubiquitous
wireless intelligence," http://jultika.oulu.fi/files/isbn9789526223544.pdf, 2019 (last accessed
January 2020)
[4] Willmott Cort J, Matsuura Kenji, "Advantages of the mean absolute error (MAE) over the
root mean square error (RMSE) in assessing average model performance," Climate Research,
pp. 79-82, DOI:10.3354/cr030079, 2005
[5] Magee L, "R2 measures based on Wald and likelihood ratio joint significance tests". The
American Statistician. 44. pp. 250–3. DOI:10.1080/00031305.1990.10475731, 1990
[6] de Myttenaere, B Golden, B Le Grand, F Rossi, "Mean absolute percentage error for
regression models," Neurocomputing 2016 archived preprint, 2016
[7] Powers, David M W, "Evaluation: From Precision, Recall and F-Measure to ROC,
Informedness, Markedness& Correlation," Journal of Machine Learning Technologies, pp.
37–63, 2011
[8] Shen Yi, "Loss Functions For Binary Classification and Class Probability Estimation,"
University of Pennsylvania, 2005
[9] Kriegel Hans Peter, Schubert Erich, Zimek Arthur, "The (black) art of runtime evaluation:
Are we comparing algorithms or implementations?", Knowledge and Information Systems,
pp. 341–378, DOI:10.1007/s10115-016-1004-2, 2016
[10] Peter J Rousseeuw, "Silhouettes: a Graphical Aid to the Interpretation and Validation of
Cluster Analysis." Computational and Applied Mathematics, pp. 53–65, DOI:10.1016/0377-
0427(87)90125- 7, 1987
[11] Glen Ford, “4 human-caused biases we need to fix for machine learning”,
https://thenextweb.com/contributors/2018/10/27/4-human-caused-biases-machine-learning/,
2017 (last accessed October 2018)
[12] Wald Abraham, “A Method of Estimating Plane Vulnerability Based on Damage of
Survivors," Statistical Research Group, Columbia University, CRC 432 — reprint from July
1980, 1943
[13] Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng, Jörg Sander, "LOF:
identifying densitybased local outliers," Vol. 29, No 2, pp. 93–104, ACM, May 2000.
[14] Quinlan, J. R, "Programs for Machine Learning," Morgan Kaufmann Publishers, 1993.
[15] Lundberg, S., Erion, G. and Lee, S.,“Consistent Individualized Feature Attribution For
Tree Ensembles,” https://arxiv.org/pdf/1802.03888.pdf, 2019(last accessed June 2020)
[16] Lundberg, S. and Lee, S., “A Unified Approach to Interpreting Model Predictions,”
https://arxiv.org/pdf/1705.07874v2.pdf, 2017 (last accessed June 2020)
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard
transform for Bluetooth Technology
D.Sharmila1, R.Neelaveni2
1(Research Scholar), Associate Professor, Bannari Amman Institute of Technology,
Sathyamangalam, Tamil Nadu-638401.
2 Asst.Prof. PSG College of Technology, Coimbatore.Tamil Nadu -638401.
ABSTRACT
In this paper, a modified SAFER plus algorithm is presented. Additionally, a comparison
with various security algorithms like pipelined AES, Triple DES, Elliptic curve Diffie
Hellman and the existing SAFER plus are done. Performance of the algorithms is evaluated
based on the data throughput, frequency and security level. The results show that the
modified SAFER plus algorithm has enhanced security compared to the existing algorithms.
KEYWORDS
Secure And Fast Encryption Routine, Triple Data Encryption Standard, Pipelined Advanced
Encryption Standard, Elliptic Curve Diffie Hellmann, Pseudo Hadamard Transform,
Encryption and Decryption.
Full Text: http://airccse.org/journal/jwmn/1109s6.pdf
Volume Link: http://airccse.org/journal/j3current.html
REFERENCES
[1] Paraskevas kitos, Nicolas sklavos, Kyriakos Papadomanolakis and Odysseas Koufopavlou
university of patras, Greece,” Hardware Implementation of Bluetooth Security” IEEE CS and
IEEE Communications Society - January to March 2003. pp. 21 to 29.
[2] Karen Scarfone John Padgette, “Guide to Bluetooth security “National Institute of
standards and technology Special Publication 800-121, U.S. Department of Commerce 43
pages.
[3] Vainio, Juha T. “Bluetooth Security,” Helsinki University of Technology, 25 May 2000
[4 ] Gyongsu Lee, ”Bluetooth Security Implementation based on Software Oriented
Hardware-Software Partition” IEEE journal 2005. pp. 2070-2074.
[5] Kardach, James, “Bluetooth Architecture Overview,” Intel Technology Journal, 2000
[6] Jyrki Oraskari, "Bluetooth versus wlan ieee 802.11x", Helsinki university of technology,
october, 2001.
[7] A. Laurie and B.Laurie. serious flaws in blue tooth security lead to disclosure of personal
data. http://bluestumbler.com.
[8] Brent A.Miller And Chatschik Bisdikian “Bluetooth revealed” – low price edition
[9] Wikipedia.org, “Bluetooth,” Wikipedia.org, 5 March 2005,
http://en.wikipedia.org/wiki/Bluetooth (21 February 2005)
[10] Vrije Universiteit Brussel, “Bluetooth security” phd thesis December 2004
[11] Keijo M.J. Haataja Licentiate Thesis January 2007 University of Kuopio
[12] J. L. Massey, “On the Optimality of SAFER+ Diffusion”, Second Advanced Encryption
Standard Candidate Conference (AES2), Rome, Italy, March 22-23 online available at
http://csrc.nist.gov/encryption/aes/round1/conf2/aes2conf.htm.
[13] Wanli Ouyang, W.K. Cham,”Fast Algorithm for Walsh Hadamard Transform on Sliding
Windows” IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE
INTELLIGENCE, MANUSCRIPT ID TPAMI-2008-06-0328
[14] NIST: Advanced Encryption Standard (AES) The Federal Information Processing
Standards Publication 197. NIST, November 26, 2001.
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf (20.9.2006)
[15] NIST: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block
Cipher. NIST, May 2004. http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf
(19.9.2006)
[16] NIST: Data Encryption Standard (DES) The Federal Information Processing Standards
Publication 46-3. NIST, October 1999. http://www.cerberussystems.
com/INFOSEC/stds/fip46-3.htm (19.9.2006)
[17]AlfonsoDeGregorio. Cryptographic Key ReliableLifetimes: Bounding the Risk of Key
Exposure in the Presence of Faults. In Fault Diagnosis and Tolerance in Cryptography,
volume 4236 of LNCS, pages 144–158. Springer, 2006.
[18] ARC Electronics (n.d.). DSSS and FHSS - Spread Spectrum modem. Retrieved March
24, 2004 from, Web site:http://www.arcelect.com/DSSS_FHSS-spead_spectrum.htm
IMPLEMENTATION OF APPLICATION FOR HUGE DATA FILE
TRANSFER
Taner Arsan, Fatih Günay and Elif Kaya
Department of Computer Engineering, Kadir Has University, Istanbul, Turkey
ABSTRACT
Nowadays big data transfers make people’s life difficult. During the big data transfer, people
waste so much time. Big data pool grows everyday by sharing data. People prefer to keep
their backups at the cloud systems rather than their computers. Furthermore considering the
safety of cloud systems, people prefer to keep their data at the cloud systems instead of their
computers. When backups getting too much size, their data transfer becomes nearly
impossible. It is obligated to transfer data with various algorithms for moving data from one
place to another. These algorithms constituted for transferring data faster and safer. In this
Project, an application has been developed to transfer of the huge files. Test results show its
efficiency and success.
KEYWORDS
Network Protocols, Resource Management in Networks, Internet and Web Applications,
Network Based Applications.
Full Text: http://airccse.org/journal/jwmn/6414ijwmn03.pdf
Volume Link: http://airccse.org/journal/jwmn_current14.html
REFERENCES
[1] Information Storage and Management Storing, Managing, and Protecting Digital
Information Edited by G. Somasundaram Alok Shrivastava, EMC Education Services, 27-29.
[2] The Embedded Internet TCP/IP basics, implementation and applications Edited by Sergio
Scaglia , 2007,225-228
[3] Computer Networking A Top-Down Approach Featuring the Internet third edition Edited
by James F. Kurose, Keith W. Ross 96-98.
[4] Data Transfer Linda Woodard Consultant Cornell CAC Workshop: Parallel Computing
on Stampede: June 18, 2013, 2.
[5] Managed File Transfer Solutions using DataPower and WebSphere MQ File Transfer
Edition Edited by IBM,4-5.
[6] Computing Community Consortium Version 8 : December 22 , 2008
COMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES
FOR OFDM SYSTEMS USING MATLAB
Raghad K. Mohammed
Department of Basic Sciences, College of Dentistry University of Baghdad, Baghdad, Iraq
ABSTRACT
This paper compares the performance of various channel estimation techniques for OFDM
systems over quasi-static channels using MATLab. It compares the performance of five
channel estimation techniques, these are: decision directed (DD), linear interpolation, second-
order interpolation, discrete Fourier transform (DFT) interpolation, minimum mean square
error (MMSE) interpolation. The performance is evaluated in terms of two widely-used
performance measures, namely, bit-error rate (BER) and the mean square error (MSE) for
different levels of signal-to-noise ratio (SNR). The OFDM model is explained and
implemented using MATLab to run different simulations. The simulation results demonstrate
that the DD channel estimation provides the lowest BER and MSE as compared to
interpolation techniques, at the cost of extra processing delay and comparatively sensitive to
channel variations between OFDM symbols. Also, the MMSE interpolation outperforms all
other interpolation techniques.
KEYWORDS
OFDM, pilot-based channel estimation, pilot allocation, direct decision, interpolation channel
estimation, LS, MMSE, MATLab
Full Text: https://aircconline.com/ijwmn/V11N3/11319ijwmn02.pdf
Volume Link: http://airccse.org/journal/jwmn_current19.html
REFERENCES
[1] Henrik Schulze and Christian Luders. Theory and Applications of OFDM and CDMA:
Wideband Wireless Communications. John Wiley & Sons, 2006.
[2] Yong Soo Cho, Jaekwon Kim, Won Young Yang, Chung G. Kang. MIMO-OFDM
Wireless Communications with MATLAB, John Wiley & Sons, August 2010.
[3] Mathuranathan Viswanathan. Digital Modulations using MATLab: Build Simulation
Models from Scratch. E-book, June, 2017.
[4] Srishtansh Pathak and Himanshu Sharma. Channel Estimation in OFDM Systems.
International Journal of Advanced Research in Computer Science and Software Engineering
(IJARCSSE), Vol.3, No.3, pp. 312-327, 2013.
[5] Elizabeth A. Thompson, Charles McIntosh, James Isaacs, Eric Harmison, Ross Sneary.
Robot Communication Link Using 802.11n or 900 MHz OFDM. Journal of Network and
Computer Applications (JNCA), Vol. 52, Issue 6, pp. 37-51, June 2015.
[6] Jeffrey G. Andrews, Arunabha Ghosh, and Rias Muhamed. Fundamentals of WiMAX-
Understanding Broadband Wireless Networking. Prentice Hall, Second Edition, 2007.
[7] Christopher Cox. An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile
Communications. John-Wiley & Sons, March 2012.
[8] Mehdi Alasti, Behnam Neekzad, Jie Hui, and Rath Vannithamby. Quality of Service in
WiMAX and LTE Networks. IEEE Communications Magazine, Vol. 48, Issue 5, May 2010.
[9] Deepak Sharma and Praveen Srivastava. OFDM Simulator Using MATLAB.
International Journal of Emerging Technology and Advanced Engineering, Vol. 3, Issue 9,
pp. 493-496, September 2013.
[10] S. S. Ghorpade and S. V. Sankpal. Behavior of OFDM System Using MATLAB
Simulation. International Journal of Innovative Technology and Research (IJITR), Vol., No.
1, Issue No. 3, pp. 249 – 252, April - May 2013.
[11] S. Sadinov, P. Daneva, and P. Kogias. Description and Simulation of OFDM Reception
Process Journal of Engineering Science and Technology Review, Vol. 7, No. 4, pp. 18-22,
2014.
[12] Orlandos Grigoriadis and H. Srikanth Kamath. BER Calculation Using MATLAB
Simulation for OGDM Transmission. Proceedings of the International Multi-Conference of
Engineers and Computer Scientists (IMECS), Vol II, Hong Kong, 19-21 March 2008.
[13] Kala Praveen Bagadi and Susmita Das. MIMO-OFDM Channel Estimation Using Pilot
Carries. International Journal of Computer Applications (0975 – 888 (IJCA), Vol. 2, No. 3,
May 2010.
[14] H. Sinha, R. Meshram, and G.R. Sinha. BER Performance Analysis of MIMO-OFDM
over Wireless Channel. International Journal of Pure and Applied Mathematics (IJPAM),
Vol. 118, No. 5, pp. 195- 206, 2018.
[15] Pratima Manhas and M.K Soni. OFDM Performance Evaluation under Different Fading
Channels using Matlab Simulink. Indonesian Journal of Electrical Engineering and Computer
Science, Vol. 5, No. 2, pp. 260-266, 2017.
[16] A. Z. M. Touhidul Islam. A Comparative Performance Study of OFDM System with the
Implementation of Comb Pilot-Based MMSE Channel Estimation. International Journal on
Computational Sciences & Applications (IJCSA), Vol.3, No.6, pp. 45-53, December 2013.
[17] D. Khosla, S. Singh, R. Singh, and S. Goyal. OFDM Modulation Technique & its
Applications: A Review. Proceedings of the International Conference on Innovations in
Computing (ICIC 2017), pp. 101-105, 2017.
[18] Fateme Salehi, Mohammad‐Hassan Majidi, and Naaser Neda. Channel Estimation Based
on Learning Automata for OFDM Systems. International Journal of Communication Systems,
Vol. 321, Issue 12, August, 2018.
[19] Navjot Kaur and Neetu Gupta. Simulation and Analysis of OFDM and SC-FDMA with
STBC using Different Modulation Techniques. International Journal of Advanced Research
in Computer Engineering & Technology (IJARCET), Vol. 4, Issue 11, pp. 4184-4189,
November 2015.
[20] Himanshi Jain and Vikas Nandal. A Comparison of Various Channel Estimation
Techniques to Improve Fading Effects in MIMO over Different Fading Channels.
International Journal of Current Engineering and Technology (IJCET), Vol. 6, No. 4, pp.
1382-1386, 2016.
[21] Kussum Bhagat and Jyoteesh Malhotra. Performance Evaluation of Channel Estimation
Techniques in OFDM-based Mobile Wireless System. International Journal of Future
Generation Communication and Networking (IJFGCN), Vol. 8, No. 3, pp. 53-60, 2015.
[22] Vishal Sharma and Harleen Kaur. On BER Evaluation of MIMO-OFDM Incorporated
Wireless System. International Journal for Light and Electron Optics, Vol. 127, Issue 1, pp.
203-205, January 2016.
[23] N. Kumar and Anuradha. BER Analysis of Conventional and Wavelet Based OFDM in
LTE using Different Modulation Techniques. IEEE Engineering and Computational
Sciences, March 2014.
[24] M Divya. Bit Error Rate Performance of BPSK Modulation and OFDM-BPSK with
Rayleigh Multiple Channel. International Journal of Engineering and Advanced Technology
(IJEAT), Vol. 2, Issue 4, April 2013.
[25] Song Wang, Jinli Cao, Jiankun Hu. A Frequency Domain Subspace Blind Channel
Estimation Method for Trailing Zero OFDM Systems. Journal of Network and Computer
Applications (JNCA), Vol. 34, Issue 1, pp. 116-120, January 2011.
[26] Li Li. Advanced Channel Estimation and Detection Techniques for MIMO and OFDM
Systems. PhD Thesis, University of York, UK, 2013.
[27] S. Patil and A. N. Jadhav. Channel Estimation Using LS and MMSE Estimators. KIET
International Journal of Communications & Electronics, Vol. 2, No.1, pp. 51-55, April 2014.
[28] Anwar Yousef Al-Tarawneh. An Improved Performance OFDM Channel Estimation
Using PilotSymbol-Aided Technique. MSc Thesis, Mutah University, Jordan, 2015.
RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM
CONCURRENT TRANSMISSIONS
Ji Qi1, Xin Li1, Shivam Garg2, Fei Hu1, Sunil Kumar2
1Department of Electrical and Computer Engineering, University of Alabama, Tuscaloosa,
AL
2Department of Electrical and Computer Engineering, San Diego State University, San
Diego, CA
ABSTRACT
The paper presents a Riverbed simulator implementation with both routing and medium
access control (MAC) protocols for mobile ad-hoc network wireless networks with multi-
beam smart antennas (MBSAs). As one of the latest promising antenna techniques, MBSAs
can achieve concurrent transmissions / receptions in multiple directions/beams. Thus it can
significantly improve the network throughput. However, so far there is still no accurate
network simulator that can measure the MBSA-based routing/MAC protocol performance. In
this paper, we describe the simulation models with the implementation of MBSA antenna
model in physical layer, MAC layer, and routing layer protocols, all in Riverbed Modeler.
We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and multi-
path pipe routing. We will analyze the network performance for those two scenarios and
illustrate the advantages of using MBSAs in wireless networks.
KEYWORDS
Multi-beam Smart Antennas (MBSAs), Medium Access Control (MAC), Multi-path routing,
Riverbed Modeler.
Full Text: https://aircconline.com/ijwmn/V9N6/9617ijwmn01.pdf
Volume Link: http://airccse.org/journal/jwmn_current17.html
REFERENCES
[1] J. Macker, “Mobile ad hoc networking (manet): Routing protocol performance issues and
evaluation considerations,” 1999.
[2] E. M. Royer and C.-K. Toh, “A review of current routing protocols for ad hoc mobile
wireless networks,” IEEE personal communications, vol. 6, no. 2, pp. 46–55, 1999.
[3] C. E. Perkins et al., Ad hoc networking. Addison-wesley Reading, 2001, vol. 1.
[4] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (aodv)
routing,” Tech. Rep., 2003.
[5] T. Clausen and P. Jacquet, “Optimized link state routing protocol (olsr),” Tech. Rep.,
2003.
[6] O. Modeler, “Riverbed technology,” Inc. http://www. riverbed. com, 2016.
[7] A. Zaballos, A. Vallejo, G. Corral, and J. Abella, “Adhoc routing performance study
using opnet modeler,” OPNETWORK, Washington DC (United States) August, 2006.
[8] N. Bilandi and H. K. Verma, “Comparative analysis of reactive, proactive and hybrid
routing protocols in manet,” International Journal of Electronics and Computer Science
Engineering, vol. 1, no. 3, pp. 1660– 1667, 2012.
[9] S. G. Thorenoor, “Dynamic routing protocol implementation decision between eigrp, ospf
and rip based on technical background using opnet modeler,” in Computer and Network
Technology (ICCNT), 2010 Second International Conference on. IEEE, 2010, pp. 191–195.
[10] V. Hnatyshin and H. Asenov, “Design and implementation of an opnet model for
simulating geoaodv manet routing protocol,” in Proc. of the OPNETWORK 2010
International Conference, Session: Wireless Ad Hoc and Wireless Personal Area Networks,
Washington DC, 2010.
[11] R. Al-Maharmah, G. Bruck, and P. Jung, “Practical methodology for adding new manet
routing protocols to opnet modeler,” in The 5th International Conference on Advances in
System Simulation (SIMUL 2013), Vience, 2013, pp. 73–80.
[12] J. Stine, “Modeling smart antennas in synchronous ad hoc networks using opnet’s
pipeline stages,” The MITRE Corporation, Tech. Rep, 2005.
[13] V. Jain, A. Gupta, and D. P. Agrawal, “On-demand medium access in multihop wireless
networks with multiple beam smart antennas,” IEEE Transactions on Parallel and Distributed
Systems, vol. 19, no. 4, pp. 489–502, 2008.
[14] B. P. Crow, I. Widjaja, L. Kim, and P. T. Sakai, “Ieee 802.11 wireless local area
networks,” IEEE Communications magazine, vol. 35, no. 9, pp. 116–126, 1997.
[15] V. Kolar, S. Tilak, and N. B. Abu-Ghazaleh, “Avoiding head of line blocking in
directional antenna [mac protocol],” in Local Computer Networks, 2004. 29th Annual IEEE
International Conference on. IEEE, 2004, pp. 385–392.
[16] A. Kalis and T. Antonakopoulos, “Direction finding in ieee802. 11 wireless networks,”
IEEE Transactions on Instrumentation and Measurement, vol. 51, no. 5, pp. 940–948, 2002.
[17] A. Gill et al., “Introduction to the theory of finite-state machines,” 1962.
[18] N. Briscoe, “Understanding the osi 7-layer model,” PC Network Advisor, vol. 120, no.
2, 2000.
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING
PROTOCOLS FOR 3D WIRELESS SENSOR NETWORKS
Vianney Kengne Tchendji1, Jean Frédéric Myoupo2, Pauline Laure Fotso3 and Ulrich
Kenfack Zeukeng1
1Department of Mathematics and Computer Science, University of Dschang, Cameroon
2Lab-MIS, University of Picardie Jules Verne, 33 rue St Leu, 80039, Amiens, France
3Department of Computer Science, University of Yaounde 1, Cameroon
ABSTRACT
This paper proposes a virtual architecture for three-dimensional (3D) wireless sensor
networks (WSNs), a dynamic coordinate system, and a scalable energy-efficient training
protocol for collections of nodes deployed in the space that are initially anonymous,
asynchronous, and unaware of their initial location. The 3D WSNs considered comprise
massively deployed tiny energy-constrained commodity sensors and one or more sink nodes
that provide an interface to the outside world. The proposed architecture is a generalization of
a two-dimensional virtual architecture previously proposed in the literature, in which a
flexible and intuitive coordinate system is imposed onto the deployment area and the
anonymous nodes are partitioned into clusters where data can be gathered from the
environment and synthesized under local control. The architecture solves the hidden sensors
problem that occurs because of irregularities in rugged deployment areas or environments
containing buildings by training the network of nodes arbitrarily dispersed in the 3D space. In
addition, we derive two simple and energy-efficient routing protocols, respectively for dense
and sparse networks, based on the proposed dynamic coordinate system. They are used to
minimize the power expended in collecting and routing data to the sink node, thus increasing
the lifetime of the network.
KEYWORDS
Wireless Sensor Network, Self-organization, Training protocol, Energy-efficient Routing
Protocol.
Full Text: https://aircconline.com/ijwmn/V9N5/9517ijwmn07.pdf
Volume Link: http://airccse.org/journal/jwmn_current17.html
REFERENCES
[1] Akyildiz, I. F., Su, W., Y. Sankarasubramaniam, Y. and E. Cayirci, E. (2002) ‘Wireless
sensor networks: A survey, Comput. Networks’, 38(4), 393-422.
[2] Zhirnov, V. V. and Herr, D. J. (2001). ‘New frontiers: Self-assembly and
nanoelectronics’., Computer, 34(1), pp. 34-43.
[3] Agre, J. and Clare L. (2000). ‘An integrated architecture for cooperative sensing
networks’, Computer, 33(5), pp. 106-108.
[4] Dargie, W. W. and Poellabaurer, C. (2010) ‘Fundamentals of Wireless Sensor Networks:
Theory and Practice,, Wiley.
[5] Intanagonwiwat, C., R. Govindan,R. and D. Estrin, D. (2000) ‘Directed diffusion: A
scalable and robust communication paradigm for sensor networks’. MOBICOM, pp. 56-67.
[6] Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V. and Culler D. E. (2001) ‘Spins: Security
protocols for sensor networks’, In: Proceedings of the 7th Annual ACM/IEEE International
Conference on Mobile Computing and Networking, pp. 189-199.
[7] Shen, C. C., Srisathapornphat, C. and Jaikaeo, C. (2001) ‘Sensor information networking
architecture and applications’, IEEE Pers. Commun., 8(4), 52-59.
[8] Tilak, S., Abu-Ghazaleh, N. B. and Heinzelman, W.(2002) ‘A taxonomy of wireless
micro-sensor network models’. ACM SIGMOBILE Mobile Computer Communication
Review., 6(2), 28-36.
[9] El Emary,I. M. M. and S. Ramakrishnan, S. (2013) ‘Wireless Sensor Networks: From
Theory to Applications’, CRC Press.
[10] Li, Y. and Thai, M. T. (2013). Wireless Sensor Networks and Applications, Springer.
[11] Bar-Yehuda, R., Goldreich, O. and Itai, A. (1991) ‘Efficient emulation of single-hop
radio network with collision detection on multi-hop radio network with no collision
detection’. Distributed Computing, 5(2), pp. 67-71.
[12] Bertzekas,D. and Gallager R. (1992) Data Networks, Second Edition, Prentice-Hall.
[13] Li, C., Wang, Z. and Yang, C. (2011) ‘Secure Routing for Wireless Mesh Networks’,
International Journal of Network Security, 13(2), 109-120.
[14] Saroit, I. A., El-Zoghdy, S. F. and Matar, M. (2011) ‘A scalable and distributed security
protocol for multicast communications’, International Journal of Network Security, 12(2), 61-
74.
[15] Karlof, C., Sastry, N. and Wagner, D. (2000) ‘TinySec: A link layer security architecture
for wireless sensor networks’, Proceedings of the 2nd International Conference on Embedded
Networked Sensor Systems, pp. 162-175, ACM.
[16] Boufares, N., Khoufi, I., Minet, P., Saidane, L. and Ben Saied, Y. (2015) ‘Three
dimensional mobile wireless sensor networks redeployment based on virtual forces’, IEEE
Wireless Communications and Mobile Computing Conference (IWCMC), pp.563-568.
[17] A. Wadaa, A., S. Olariu, S., L. Wilson, L., M. Eltoweissy, M. and K. Jones K..(2005)
‘Training a wireless sensor network’, Mobile networks and Applications, 10(1-2), 151-168,
2005.
[18] Bertossi, A. A., Olariu S., Pinotti M. C. (2008) ‘Efficient corona training protocols for
sensor networks’, Theoretical Computer Science, 402(1): 2-15.
[19] Olariu, S., Wadaa, A., Wilson, L. and Eltoweissy, M. (2004) ‘Wireless sensor networks:
leveraging the virtual infrastructure’. IEEE Network 18(4): 51-56.
[20] Howard, A., Mataric, M.J. and Sukhatme, G. S. (2002) ‘An Incremental Self-
Deployment Algorithm for Mobile Sensor Networks’, Autonomous Robots, Special Issue on
Intelligent Embedded Systems, 13(2), pp. 113-126.
[21] Tamoghna, O., Manas, M. and Studip M..(2013) ‘Tic-Tac-Toe-Arch: a self-organising
virtual architecture for Underwater Sensor Networks’. IET Wireless Sensor Systems, vo. 3,
Issue: 4, pp. 307- 316.
[22] Capella, J. V., Bonastre, A., Serrano, J. J. and Ors, R. (2009) ‘A New Robust, Energy-
efficient and Scalable Wireless Sensor Networks Architecture Applied to a Wireless Fire
Detection System’, International Conference on Wireless Networks and Information Systems,
WNIS '09. pp. 395 – 398.
[23] Miao, C., Dai, G., Zhao, X., Tang, Z. and Chen, Q (2014) ‘3D Self-Deployment
Algorithm in Mobile Wireless Sensor Networks’, In: Sun L., Ma H., Fang D., Niu J., Wang
W. (eds) Advances in Wireless Sensor Networks-CWSN 2014. pp. 27-41.
[24] Chen, J., Qian, H. (2014) ‘Three-dimensional deployment algorithm based on ideal fluid
dynamics model for mobile sensor networks’, Computer Modelling & New Technologies
18(9)12-18
[25] Huang, C-F., Tseng, Y-C. and Lo L-C. (2007) ‘The coverage problem in three-
dimensional wireless sensor networks’, Journal of Interconnection Networks, 8, Issue 03, p.
209.
[26] Langendoen, K.. and Reijers, N. (2003). ‘Distributed localization in wireless sensor
networks: A quantitative comparison’, Computer Network, 43(4), 499-518.
[27] Tanenbaum A. and Wetherall D. (2011) ‘Computer Networks’, Pearson Education, Inc/
Prentice Hall.
[28] WSNet, [online]. http://wsnet.gforge.inria.fr. (2016 ).
[29] A. Allirani, A. and M. Suganthi M.(2008) An energy sorting protocol (ESP) with low
energy and low latency in wireless sensor networks. International Journal of Computer
Science and Network Security, 8(11), pp. 208-214.

More Related Content

What's hot

March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Various security issues and its solutions in the
Various security issues and its solutions in theVarious security issues and its solutions in the
Various security issues and its solutions in theManash Kumar Mondal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...ijwmn
 
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...ijwmn
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...ijwmn
 
Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere IJECEIAES
 
Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...IJCSES Journal
 
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...IJCSES Journal
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
 
MCAR_Presentation_Poster
MCAR_Presentation_PosterMCAR_Presentation_Poster
MCAR_Presentation_PosterKwame Martin
 
Conclusion
ConclusionConclusion
Conclusionhanmya
 
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...ijmnct
 
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESA WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computingsemicircle
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Arpan Patel
 

What's hot (20)

March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
Various security issues and its solutions in the
Various security issues and its solutions in theVarious security issues and its solutions in the
Various security issues and its solutions in the
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
 
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
 
Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere
 
Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...
 
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
MCAR_Presentation_Poster
MCAR_Presentation_PosterMCAR_Presentation_Poster
MCAR_Presentation_Poster
 
Conclusion
ConclusionConclusion
Conclusion
 
9.references
9.references9.references
9.references
 
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
 
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESA WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 

Similar to Most Popular Browser Game Articles

Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021ijujournal
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...ijwmn
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
 
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...ijwmn
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
April 2024 Top 10 Read Article for Wireless & Mobile Networks
April 2024 Top 10 Read        Article for Wireless & Mobile NetworksApril 2024 Top 10 Read        Article for Wireless & Mobile Networks
April 2024 Top 10 Read Article for Wireless & Mobile Networksijwmn
 

Similar to Most Popular Browser Game Articles (20)

Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
 
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
 
April 2024 Top 10 Read Article for Wireless & Mobile Networks
April 2024 Top 10 Read        Article for Wireless & Mobile NetworksApril 2024 Top 10 Read        Article for Wireless & Mobile Networks
April 2024 Top 10 Read Article for Wireless & Mobile Networks
 

Recently uploaded

Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 

Recently uploaded (20)

Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 

Most Popular Browser Game Articles

  • 1. Most Viewed Articles inWireless & Mobile Networks International Journal of Wireless & Mobile Networks (IJWMN) ISSN: 0975-3834 [Online]; 0975-4679 [Print] http://airccse.org/journal/ijwmn.html
  • 2. FAULT DETECTION AND RECOVERY IN WIRELESS SENSOR NETWORK USING CLUSTERING Abolfazl Akbari1, Arash Dana2, Ahmad Khademzadeh3 and Neda Beikmahdavi4 1Dept. of Computer Engineering, Islamic Azad University Ayatollah Amoli Branch, Amol, Iran 2Islamic Azad University, Central Tehran Branch, Tehran, Iran 3Iran Telecom Research Center, Tehran, Iran 4 Islamic Azad University Ayatollah Amoli Branch, Amol, Iran ABSTRACT Some WSN by a lot of immobile node and with the limited energy and without further charge of energy. Whereas extension of many sensor nodes and their operation. Hence it is normal. unactive nodes miss their communication in network, hence split the network. For avoidance split of network, we proposed a fault recovery corrupted node and Self Healing is necessary. In this Thesis, we design techniques to maintain the cluster structure in the event of failures caused by energy-drained nodes. Initially, node with the maximum residual energy in a cluster becomes cluster heed and node with the second maximum residual energy becomes secondary cluster heed. Later on, selection of cluster heed and secondary cluster heed will be based on available residual energy. We use Matlab software as simulation platform quantities. like, energy consumption at cluster and number of clusters is computed in evaluation of proposed algorithm. Eventually we evaluated and compare this proposed method against previous method and we demonstrate our model is better optimization than other method such as Venkataraman, in energy consumption rate. KEYWORDS Sensor Networks, clustering, fault detection, fault recovery. Full Text: http://airccse.org/journal/jwmn/0211ijwmn12.pdf Volume Link: http://airccse.org/journal/jwmn_current11.html
  • 3. REFERENCES [1] A. Bharathidasas, and V. Anand, “Sensor networks: An overview”, Technical report, Dept. of Computer Science, University of California at Davis, 2002 [2] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, "Next century challenges: Scalable coordination in sensor networks", in Proceedings of ACM Mobicom, Seattle, Washington, USA, August 1999, pp. 263-- 270, ACM. [3] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks", IEEE Communications Magazine, pp. 102--114, August 2002. [4] D. Estrin, L. Girod, G. Pottie, M. Srivastava, “Instrumenting the world with wireless sensor networks”, In Proceedings of the International Conference on Acoustics, Speech and Signal Processing (ICASSP 2001. [5] E. S. Biagioni and G. Sasaki, “Wireless sensor placement for reliable and efficient data collection”, in the 36th International Conference on Systems Sciences, Hawaii, January 2003. [6] G. Gupta and M. Younis, “Load-Balanced Clustering in Wireless Sensor Networks”, in the Proceedings of International Conference on Communication (ICC 2003), Anchorage, AK, May 2003. [7] J. Chen, S. Kher and A. Somani, “Distributed Fault Detection of Wireless Sensor Networks”, in DIWANS'06. 2006. Los Angeles, USA: ACM Pres. [8] F. Koushanfar, M. Potkonjak, A. Sangiovanni- Vincentelli, “Fault Tolerance in Wireless Ad-hoc Sensor Networks”, Proceedings of IEEE Sensors 2002, June, 2002. [9] W. L. Lee, A. Datta, and R. Cardell-Oliver, “Network Management in Wireless Sensor Networks”, to appear in Handbook on Mobile Ad Hoc and Pervasive Communications, edited by M. K. Denko and L. T.Yang, American Scientific Publishers. [10] G. Venkataraman, S. Emmanuel and S.Thambipillai, “Energy-efficient cluster-based scheme for failure management in sensor networks” IET Commun, Volume 2, Issue 4, April 2008 Page(s):528 – 537 [11] L. Paradis and Q. Han, “A Survey of Fault Management in Wireless Sensor Networks”, Journal of Network and Systems Management, vol. 15, no. 2, pp. 171-190, 2007. [12] L. M. S. D. Souza, H. Vogt and M. Beigl, “A survey on fault tolerance in wireless sensor networks”, 2007. [13] W. L Lee, A.D., R. Cordell-Oliver, WinMS: Wireless Sensor Network-Management System, An Adaptive Policy-Based Management for Wireless Sensor Networks. 2006. [14] L. B. Ruiz, I. G.Siqueira, L. B. Oliveira, H. C. Wong, J.M. S. Nigeria, and A. A. F. Loureiro. “Fault management in event-driven wireless sensor networks”, MSWiM’04, October 4-6, 2004, Venezia, Italy [15] G. Gupta and M. Younis; Fault tolerant clustering of wireless sensor networks; WCNC’03, pp. 1579.1584.
  • 4. [16] M. Ding, D. Chen, K. Xing, and X. Cheng, “Localized fault-tolerant event boundary detection in sensor networks”, in Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), vol. 2, pp. 902–913, Miami, Fla, USA, March 2005 [17] C. Hsin and M.Liu, “Self-monitoring of Wireless Sensor Networks”, Computer Communications, 2005. 29: p. 462-478 [18] S. Chessa and P. Santi, “Crash faults identification in wireless sensor networks”, Comput. Commun., 2002, 25, (14), pp. 1273-1282. [19] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks," Proc. Hawaii Int'l Conf. System Sciences 2000. [20] GUPTA G., YOUNIS M.: ‘Fault-tolerant clustering of wireless sensor networks’. Proc. IEEE WCNC, New Orleans, USA,March 2003, vol. 3, p. 1579 – 1584 [21] N. Bulusu, J. Heidemann and D. Estrin, ”GPS-less Low Cost Outdoor Localization For Very Small Devices”, IEEE Personal Communications, Special Issue on "Smart Spaces and Environments", Vol. 7, No. 5, pp. 28-34, October 2000. [22] Radhika Nagpal, ”Organizing a Global Coordinate System from Local Information on anAmorphous Computer”, MIT AI Memo 1666, August 1999
  • 5. BROWSER GAMES FOR ONLINE COMMUNITIES Juha-Matti Vanhatupa Department of Software Systems, Tampere University of Technology, Tampere, Finland ABSTRACT Games played directly inside the web browser have many benefits. Browser games do not need software installation. Furthermore since the web has become the ultimate collaboration environment, the games are available for numerous players that can play in collaborative fashion. Through history online communities have birth alongside with browser games. Nowadays online communities have achieved massive user numbers and those can be important part of the browser game itself. This article targets at analyzing and categorizing of browser games. We also discuss financial opportunities relating to browser games and technologies used in those. KEYWORDS Browser Games, Game Analysis, Online Communities Full Text: http://airccse.org/journal/jwmn/0203ijwmn03.pdf Volume Link: http://airccse.org/journal/jwmn_current10.html
  • 6. REFERENCES [1] Facebook Social Utility, http://www.facebook.com/ [2] Travian Browser Game, http://www.travian.com/ [3] Hattrick Browser Game, http://www.hattrick.org/ [4] Vanhatupa Juha-Matti (2010) “Browser Games: The New Frontier of Social Gaming”, In Proc of Second International Conference of Wireless & Mobile Networks. CCIS Vol. 84, pp. 349-355, Springer Berlin Heidenberg [5] Barton Matt, (2008) Dungeons & Desktops, The History of Computer Role Playing Games, A.K. Peters, pp. 37-43. [6] Earth 2025 Browser Game, http://games.swirve.com/earth [7] Facebook Statistics, http://www.facebook.com/press/info.php?statistics [8] Mafia Wars Facebook application, http://www.facebook.com/apps/application.php?id=10979261223 [9] Dogs of the Seas Browser Game, http://www.dogsoftheseas.com/ [10] DarkOrbit Browser Game, http://www.darkorbit.com/ [11] ForumWarz Browser Game, http://www.forumwarz.com/ [12] Stick Arena Browser Game, http://www.xgenstudios.com/play/stickarena [13] Habbo Hotel Virtual World, http://www.habbo.com/ [14] Hattrick history, http://hattrick.org/Help/History.aspx [15] Häsel Mathias, (2007) “Rich Internet Architectures for Browser-Based Multiplayer Real-Time Games –Design and Implementation Issues of virtual-kicker.com”, In: Enokido, T./Barolli, L./Takizawa, M. (Eds.), Network-Based Information Systems: First International Conference, NBiS 2007. LNCS, vol. 4658, pp. 157-166, Berlin/Heidelberg: Springer-Verlag [16] Mizanian Kiarash, Vasef Mehdi, Analoui Morteza, (2010) ”Bandwidth Modeling and Estimation in Peer to Peer Networks”, International Journal of Computer Networks & Communications (IJCNC), Vol. 2, No. 3. [17] Klemm Alexander, Lindemann Christoph, Waldhorst Oliver P., (2003), “A Special- Purpose Peer-to-Peer File Sharing System for Mobile ad hoc networks”, In Proc of Vehicular Technology Conference, VTC2003, IEEE 58th Vol.4, pp. 2758-2763. [18] Sharma Abhishek, Shi Hao, (2010) “Innovative Rated-Resource Peer-to-Peer Network”, International Journal of Computer Networks & Communications (IJCNC), Vol. 2, No. 2. [19] Foxtrick Hattrick web plugin, http://www.ht-foxtrick.com/forum/portal.php [20] Facebook Advertising, http://www.facebook.com/advertising/ [21] The Continuum Browser Game, http://www.thecontinuum.com/
  • 7. [22] Magic: The Gathering collectible card game, http://www.wizards.com/magic/multiverse/default.aspx [23] Club Penguin Browser Game, http://www.clubpenguin.com/ [24] Walmsley Andrew, Kids’ Virtual Worlds are Maturing Nicely, http://www.marketingmagazine.co.uk/news/756021/ [25] Schultheiss Daniel, (2007) “Long-term Motivations to Play MMOGs: A Longitudinal Study on Motivations, Experience and Behavior”, In Proc of the DiGRA 2007 - Situated Play,Digital Games Research Association International Conference 2007, 344-348. [26] Space Merchant Realms Browser Game, http://www.smrealms.de/ [27] Kabus Patrick, Terpstra Wesley, Cilia Mariano, Buchmann, Alejandro, (2005) “Addressing Cheating in Distributed MMOGs”, In Proc of the 4th ACM SIGCOMM workshop on Network and system support for games.
  • 8. A NOVEL APPROACH FOR MOBILITY MANAGEMENT IN LTE FEMTOCELLS 1Pantha Ghosal, 2Shouman Barua, 3Ramprasad Subramanian, 4Shiqi Xing and 5Kumbesan Sandrasegaran 1,2,3,4,5,6Centre for Real-time Information Networks School of Computing and Communications, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, Australia ABSTRACT LTE is an emerging wireless data communication technology to provide broadband ubiquitous Internet access. Femtocells are included in 3GPP since Release 8 to enhance the indoor network coverage and capacity. The main challenge of mobility management in hierarchical LTE structure is to guarantee efficient handover to or from/to/between Femtocells. This paper focuses, on different types of Handover and comparison performance between different decision algorithms. Furthermore, a speed based Handover algorithm for macro-femto scenario is proposed with simulation results KEYWORDS Femtocell Access Point (FAP), Handover Hysteresis Margin (HMM), Reference Signal Received Power (RSRP), Reference Signal Received Quality (RSRQ), Signal to Interference Plus Noise Ratio (SINR, Evolved NodeB (eNB), User equipment (UE). Full Text: http://airccse.org/journal/jwmn/6514ijwmn04.pdf Volume Link: http://airccse.org/journal/jwmn_current14.html
  • 9. REFERENCES [1] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access. Wiley, NewYork, 2008. [2] E Dahlman, S Parkvall, J Skold, P Beming, 3G Evolution HSPA and LTE for Mobile Broadband. Academia Press, USA, 2008. [3] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, "On Accurate simulations of LTE femtocells using an open source simulator," in EURASIP Journal on Wireless Communication and Networking, 2012. [4] Onyeije Consulting LLC, Solving the capacity crunch (2011). [5] T. Zahir, K. Arshad, A. Nakata, K. Moessner,“Interference Management in Femtocells,” in Commun. Surveys & Tutorials, vol. 15, pp. 293-311, 2013. [6] www.en.wikipedia.org/wiki/Fixed_mobile_convergence/. [7] R. Bendlin, V. Chandrasekhar, C. Runhua, A. Ekpenyong, and E. Onggosanusi, "From homogeneous to heterogeneous networks: A 3GPP Long Term Evolution rel. 8/9 case study," in 45th Annu. Conf., Inform. Sci. and Syst. (CISS), Baltimore, MD, pp. 1-5, 2011. [8] H. Mahmoud, I .Guvenc,” A comparative study of different deployment modes for femtocell networks,” in IEEE Int. Symposium on Personal, Indoor and Mobile Radio Commun. , Palo Alto, USA, pp. 1–5, 2009. [9] D. Xenakis, N. Passas, L. Merakos, C. Verikoukis, “Mobility Management for Femtocells in LTEAdvanced: Key Aspects and Survey of Handover Decision Algorithms” in IEEE Commun. Surveys & Tutorials., vol. 16 pp. 2014. [10] J. Moon, D. Cho, “Efficient handoff algorithm for inbound mobility in hierarchical macro/femto cell networks”, IEEE Commun. Mag. Letters, vol.13, no.10, pp.755-757, Oct. 2009. [11] P. Xu, X. Fang, R. He, Z. Xiang, “An efficient handoff algorithm based on received signal strength and wireless transmission loss in hierarchical cell networks”, Telecom. Sys. J., Elsevier, pp. 1-9, Sept. 2011. [12] D. Lopez-Perez, A. Valcarce, A. Ladanyi, G. de la Roche, J. Zhang, “Intracell handover for interference and handover mitigation in OFDMA two-tier macrocell-femtocell networks”, EURASIPJ. on Wirel. Com [13] A. Ulvan, M. Ulvan, and R. Bestak, “The Enhancement of Handover Strategy by Mobility Prediction in Broadband Wirel. Access”, Netw. and Electronic Commerce Research Conf. (NAEC) 2009, TX: American Telecom. Sys. Mgmt. Assoc. Inc., pp. 266-276, 2009. ISBN 978-0-9820958-2-9. [14] A. Ulvan, R.Bestak, M.Ulvan,“Handover Scenario and Procedure in LTE-based Femtocell Networks," UBICOMM 4th Intl. Conf. on mobile ubiquitous computing, system, services and tech.Florance, Italy, 2010.
  • 10. [15] H. Zhang, X. Wen, B. Wang, W. Zheng, Y. Sun, “A Novel Handover Mechanism Between Femtocell and Macrocell for LTE Based Networks”, IEEE 2nd Internat. Conf. on Comm. Softw. and Nets. 2010 (ICCSN), pp.228-231, Feb. 2010. [16] D. Xenakis, N. Passas, and C. Verikoukis, “A Novel Handover Decision Policy for Reducing Power Transmissions in the two-tier LTE network”, 2012 IEEE Internat. Comm. Conf. (ICC), pp.1352-1356, June 2012. [17] D. Xenakis, N. Passas, C. Verikoukis, “An energy-centric handover decisionalgorithm for the integrated LTE macrocell-femtocell network”, Comp. Comm., Elsevier, 2012 [18] An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications, First Edition, m Copyright John Wiley and Sons Ltd., Inc. 2012. Published by John Wiley & Sons, Ltd, ISBN: 9781119970385 [19] G Piro, L Grieco, G Boggia, F Capozzi, P Camarda,”Simulating LTE cellular systems: an opensource framework, ” in Vehicular Technology, IEEE Trans. vol. 60, pp. 498-513, 2011. [20] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network research,” Wireless Communications and Mobile Computing, vol. 2, pp. 483–502, Aug. 2002. [21] R Subramanian, P Ghosal, S Barua, S Xing, S Cong, K Sandrasegaran,'' Survey of LTE Downlink Schedulers Algorithm in Open Access Simulation Tolls NS-3 and LTE-Sim '', Manuscript in International Journal of Wireless & Mobile Networks(IJWMN), November 2014.
  • 11. SYSTEM LEVEL SIMULATION FOR TWO TIER MACRO-FEMTO CELLULAR NETWORKS 1Shiqi Xing, 2 Pantha Ghosal, 3Shouman Barua, 4 Ramprasad Subramanian and 5Kumbesan Sandrasegaran Centre for Real-time Information Networks School of Computing and Communications, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, Australia. ABSTRACT LTE is an emerging wireless communication technology to provide high- speed data service for the mobile phones and data terminals. To improve indoor coverage and capacity Femtocells are included in 3GPP since Release 8. There is no common simulation platform is available for performance justification of LTEFemtocells. LTE-Sim is an object-oriented open source simulator which incorporates a complete protocol stack can be used for simulating two-tier macro-femto scenarios. To the best of our knowledge no paper provides the guideline to perform system level simulation of Femtocell networks. Here, in this paper Femtocells performance is evaluated in multi-Macrocells and multi-Femtocells environment with interference from Microcells and Macrocell users along with the scripting. KEYWORDS Channel quality indicator (CQI), Femto Access Point (FAP), Macro eNodeB (MeNB), Macrocell User Equepment (MUE), Moblity Management Entity(MME), Signal to Interference Plus Noise Ratio(SINR), Physical Layer(PHY) Full Text: http://airccse.org/journal/jwmn/6614ijwmn01.pdf Volume Link: http://airccse.org/journal/jwmn_current14.html
  • 12. REFERENCES [1] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access. Wiley, NewYork, 2008. [2] E Dahlman, S Parkvall, J Skold, P Beming, 3G Evolution HSPA and LTE for Mobile Broadband. Academia Press, USA, 2008. [3] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, "On Accurate simulations of LTE femtocells using an open source simulator," in EURASIP Journal on Wireless Communication and Networking, 2012. [4] G Piro, L Grieco, G Boggia, F Capozzi, P Camarda,”Simulating LTE cellular systems: an opensource framework, ” in Vehicular Technology, IEEE Trans. vol. 60, pp. 498-513, 2011. [5] Raheem, Rand, Aboubaker Lasebae, and Jonathan Loo. "Performance Evaluation of LTE Network via Using Fixed/Mobile Femtocells." Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on. IEEE, 2014. [6] WCDMA for UMTS – HSPA Evolution and LTE, Fourth Edition. Edited by Harri Holma and Antti Toskala © 2007 John Wiley & Sons, Ltd. ISBN: 978-0-470-31933-8 [7] D. Lopez-Perez, I. Guvenc, G. de la Roche, M. Kountouris, T. Q. S. Quek, and Z. Jie, "Enhanced intercell interference coordination challenges in heterogeneous networks," IEEE Wireless Commun., vol. 18, pp. 22-30, 2011. [8] D. Xenakis, N. Passas, L. Merakos, C. Verikoukis, “Mobility Management for Femtocells in LTEAdvanced: Key Aspects and Survey of Handover Decision Algorithms” in IEEE Trans. Wireless Commun., vol. 18 pp. 2011. [9] R. Bendlin, V. Chandrasekhar, C. Runhua, A. Ekpenyong, and E. Onggosanusi, "From homogeneous to heterogeneous networks: A 3GPP Long Term Evolution rel. 8/9 case study," in 45th Annu. Conf., Inform. Sci. and Syst. (CISS), Baltimore, MD, pp. 1-5, 2011. [10] H. Mahmoud, I .Guvenc,” A comparative study of different deployment modes for femtocell networks,” in IEEE Int. Symposium on Personal, Indoor and Mobile Radio Commun. , Palo Alto, USA, pp. 1–5, 2009. [11] Siemens, R1-060135, “Interference Mitigation by Partial Frequency Reuse,” 3GPP RAN WG1#42, London, UK, January 2006. [12] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network research,” Wireless Communications and Mobile Computing, vol. 2, pp. 483–502, Aug. 2002. [13] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, " A system-level simulation framework for LTE Femtocell," in Proc. of International Conference on Simulation Tools and Techniques(ICST), Desenzano, Italy, pp.1-3, 2012. [14] http://www.infoutils.com/frequency-reuse-in-ofdma-based-ltewimax-system/
  • 13. EXPLAINABLE AI FOR AUTONOMOUS NETWORK FUNCTIONS IN WIRELESS AND MOBILE NETWORKS Premnath K Narayanan1 and David K Harrison2 1LM Ericsson Ltd., SA OSS PDU OSS S&T Research & PCT, Athlone, Ireland 2School of Computing, Glasgow Caledonian University, Glasgow, United Kingdom ABSTRACT As the telecommunication network components and functions are getting commoditized, the complexity in configuration and optimization increases. Several automation techniques are evolving from traditional deterministic algorithms (pre-defined rulesets obtained from experience accumulated by humans) that were heuristic-based to more cognitive and stochastic-based algorithms. The aim of this paper is to introduce the seven layers in wireless telecommunication networks that uses stochastic or AI algorithms, explain the need for monitoring and possible potential biases in each layer of the stochastic algorithm stack and finally conclude with evaluation methods, techniques for detecting false positive and false negative proposals in autonomous network functions. The main subject of the paper is to provide a background on the need of explainable AI for autonomous network functions. The paper includes introduction of two models ANOBIA and INFEROBIA models that helps to achieve explainable AI for autonomous network functions in wireless and mobile networks. KEYWORDS Explainable AI; Machine Learning; Artificial Intelligence; Precision; Recall; BIAS; Variance; Algorithm and Mitigation methods Full Text: https://aircconline.com/ijwmn/V12N3/12320ijwmn03.pdf Volume Link: http://airccse.org/journal/jwmn_current20.html
  • 14. REFERENCES [1] Paulo Valente Klaine, Muhammad Ali Imran, OluwakayodeOnireti, Richard Demo Souza, "A Survey of Machine Learning Techniques Applied to Self-Organizing Cellular Networks," IEEE Communications Surveys and Tutorials, IEEE, Volume 19, issue 4, pp. 2392-2431, DOI: 10.1109/COMST.2017.2727878, 2017 [2] O-RAN alliance, “Operator Defined Next Generation RAN Architecture and Interfaces," https://www.o-ran.org/, 2019 (last accessed August 2019) [3] Matti Latva, Kari Leppanen, "Key drivers and research challenges for 6G ubiquitous wireless intelligence," http://jultika.oulu.fi/files/isbn9789526223544.pdf, 2019 (last accessed January 2020) [4] Willmott Cort J, Matsuura Kenji, "Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance," Climate Research, pp. 79-82, DOI:10.3354/cr030079, 2005 [5] Magee L, "R2 measures based on Wald and likelihood ratio joint significance tests". The American Statistician. 44. pp. 250–3. DOI:10.1080/00031305.1990.10475731, 1990 [6] de Myttenaere, B Golden, B Le Grand, F Rossi, "Mean absolute percentage error for regression models," Neurocomputing 2016 archived preprint, 2016 [7] Powers, David M W, "Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness& Correlation," Journal of Machine Learning Technologies, pp. 37–63, 2011 [8] Shen Yi, "Loss Functions For Binary Classification and Class Probability Estimation," University of Pennsylvania, 2005 [9] Kriegel Hans Peter, Schubert Erich, Zimek Arthur, "The (black) art of runtime evaluation: Are we comparing algorithms or implementations?", Knowledge and Information Systems, pp. 341–378, DOI:10.1007/s10115-016-1004-2, 2016 [10] Peter J Rousseeuw, "Silhouettes: a Graphical Aid to the Interpretation and Validation of Cluster Analysis." Computational and Applied Mathematics, pp. 53–65, DOI:10.1016/0377- 0427(87)90125- 7, 1987 [11] Glen Ford, “4 human-caused biases we need to fix for machine learning”, https://thenextweb.com/contributors/2018/10/27/4-human-caused-biases-machine-learning/, 2017 (last accessed October 2018) [12] Wald Abraham, “A Method of Estimating Plane Vulnerability Based on Damage of Survivors," Statistical Research Group, Columbia University, CRC 432 — reprint from July 1980, 1943 [13] Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng, Jörg Sander, "LOF: identifying densitybased local outliers," Vol. 29, No 2, pp. 93–104, ACM, May 2000. [14] Quinlan, J. R, "Programs for Machine Learning," Morgan Kaufmann Publishers, 1993. [15] Lundberg, S., Erion, G. and Lee, S.,“Consistent Individualized Feature Attribution For Tree Ensembles,” https://arxiv.org/pdf/1802.03888.pdf, 2019(last accessed June 2020)
  • 15. [16] Lundberg, S. and Lee, S., “A Unified Approach to Interpreting Model Predictions,” https://arxiv.org/pdf/1705.07874v2.pdf, 2017 (last accessed June 2020)
  • 16. A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform for Bluetooth Technology D.Sharmila1, R.Neelaveni2 1(Research Scholar), Associate Professor, Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu-638401. 2 Asst.Prof. PSG College of Technology, Coimbatore.Tamil Nadu -638401. ABSTRACT In this paper, a modified SAFER plus algorithm is presented. Additionally, a comparison with various security algorithms like pipelined AES, Triple DES, Elliptic curve Diffie Hellman and the existing SAFER plus are done. Performance of the algorithms is evaluated based on the data throughput, frequency and security level. The results show that the modified SAFER plus algorithm has enhanced security compared to the existing algorithms. KEYWORDS Secure And Fast Encryption Routine, Triple Data Encryption Standard, Pipelined Advanced Encryption Standard, Elliptic Curve Diffie Hellmann, Pseudo Hadamard Transform, Encryption and Decryption. Full Text: http://airccse.org/journal/jwmn/1109s6.pdf Volume Link: http://airccse.org/journal/j3current.html
  • 17. REFERENCES [1] Paraskevas kitos, Nicolas sklavos, Kyriakos Papadomanolakis and Odysseas Koufopavlou university of patras, Greece,” Hardware Implementation of Bluetooth Security” IEEE CS and IEEE Communications Society - January to March 2003. pp. 21 to 29. [2] Karen Scarfone John Padgette, “Guide to Bluetooth security “National Institute of standards and technology Special Publication 800-121, U.S. Department of Commerce 43 pages. [3] Vainio, Juha T. “Bluetooth Security,” Helsinki University of Technology, 25 May 2000 [4 ] Gyongsu Lee, ”Bluetooth Security Implementation based on Software Oriented Hardware-Software Partition” IEEE journal 2005. pp. 2070-2074. [5] Kardach, James, “Bluetooth Architecture Overview,” Intel Technology Journal, 2000 [6] Jyrki Oraskari, "Bluetooth versus wlan ieee 802.11x", Helsinki university of technology, october, 2001. [7] A. Laurie and B.Laurie. serious flaws in blue tooth security lead to disclosure of personal data. http://bluestumbler.com. [8] Brent A.Miller And Chatschik Bisdikian “Bluetooth revealed” – low price edition [9] Wikipedia.org, “Bluetooth,” Wikipedia.org, 5 March 2005, http://en.wikipedia.org/wiki/Bluetooth (21 February 2005) [10] Vrije Universiteit Brussel, “Bluetooth security” phd thesis December 2004 [11] Keijo M.J. Haataja Licentiate Thesis January 2007 University of Kuopio [12] J. L. Massey, “On the Optimality of SAFER+ Diffusion”, Second Advanced Encryption Standard Candidate Conference (AES2), Rome, Italy, March 22-23 online available at http://csrc.nist.gov/encryption/aes/round1/conf2/aes2conf.htm. [13] Wanli Ouyang, W.K. Cham,”Fast Algorithm for Walsh Hadamard Transform on Sliding Windows” IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, MANUSCRIPT ID TPAMI-2008-06-0328 [14] NIST: Advanced Encryption Standard (AES) The Federal Information Processing Standards Publication 197. NIST, November 26, 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf (20.9.2006) [15] NIST: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. NIST, May 2004. http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf (19.9.2006) [16] NIST: Data Encryption Standard (DES) The Federal Information Processing Standards Publication 46-3. NIST, October 1999. http://www.cerberussystems. com/INFOSEC/stds/fip46-3.htm (19.9.2006) [17]AlfonsoDeGregorio. Cryptographic Key ReliableLifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. In Fault Diagnosis and Tolerance in Cryptography, volume 4236 of LNCS, pages 144–158. Springer, 2006.
  • 18. [18] ARC Electronics (n.d.). DSSS and FHSS - Spread Spectrum modem. Retrieved March 24, 2004 from, Web site:http://www.arcelect.com/DSSS_FHSS-spead_spectrum.htm
  • 19. IMPLEMENTATION OF APPLICATION FOR HUGE DATA FILE TRANSFER Taner Arsan, Fatih Günay and Elif Kaya Department of Computer Engineering, Kadir Has University, Istanbul, Turkey ABSTRACT Nowadays big data transfers make people’s life difficult. During the big data transfer, people waste so much time. Big data pool grows everyday by sharing data. People prefer to keep their backups at the cloud systems rather than their computers. Furthermore considering the safety of cloud systems, people prefer to keep their data at the cloud systems instead of their computers. When backups getting too much size, their data transfer becomes nearly impossible. It is obligated to transfer data with various algorithms for moving data from one place to another. These algorithms constituted for transferring data faster and safer. In this Project, an application has been developed to transfer of the huge files. Test results show its efficiency and success. KEYWORDS Network Protocols, Resource Management in Networks, Internet and Web Applications, Network Based Applications. Full Text: http://airccse.org/journal/jwmn/6414ijwmn03.pdf Volume Link: http://airccse.org/journal/jwmn_current14.html
  • 20. REFERENCES [1] Information Storage and Management Storing, Managing, and Protecting Digital Information Edited by G. Somasundaram Alok Shrivastava, EMC Education Services, 27-29. [2] The Embedded Internet TCP/IP basics, implementation and applications Edited by Sergio Scaglia , 2007,225-228 [3] Computer Networking A Top-Down Approach Featuring the Internet third edition Edited by James F. Kurose, Keith W. Ross 96-98. [4] Data Transfer Linda Woodard Consultant Cornell CAC Workshop: Parallel Computing on Stampede: June 18, 2013, 2. [5] Managed File Transfer Solutions using DataPower and WebSphere MQ File Transfer Edition Edited by IBM,4-5. [6] Computing Community Consortium Version 8 : December 22 , 2008
  • 21. COMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES FOR OFDM SYSTEMS USING MATLAB Raghad K. Mohammed Department of Basic Sciences, College of Dentistry University of Baghdad, Baghdad, Iraq ABSTRACT This paper compares the performance of various channel estimation techniques for OFDM systems over quasi-static channels using MATLab. It compares the performance of five channel estimation techniques, these are: decision directed (DD), linear interpolation, second- order interpolation, discrete Fourier transform (DFT) interpolation, minimum mean square error (MMSE) interpolation. The performance is evaluated in terms of two widely-used performance measures, namely, bit-error rate (BER) and the mean square error (MSE) for different levels of signal-to-noise ratio (SNR). The OFDM model is explained and implemented using MATLab to run different simulations. The simulation results demonstrate that the DD channel estimation provides the lowest BER and MSE as compared to interpolation techniques, at the cost of extra processing delay and comparatively sensitive to channel variations between OFDM symbols. Also, the MMSE interpolation outperforms all other interpolation techniques. KEYWORDS OFDM, pilot-based channel estimation, pilot allocation, direct decision, interpolation channel estimation, LS, MMSE, MATLab Full Text: https://aircconline.com/ijwmn/V11N3/11319ijwmn02.pdf Volume Link: http://airccse.org/journal/jwmn_current19.html
  • 22. REFERENCES [1] Henrik Schulze and Christian Luders. Theory and Applications of OFDM and CDMA: Wideband Wireless Communications. John Wiley & Sons, 2006. [2] Yong Soo Cho, Jaekwon Kim, Won Young Yang, Chung G. Kang. MIMO-OFDM Wireless Communications with MATLAB, John Wiley & Sons, August 2010. [3] Mathuranathan Viswanathan. Digital Modulations using MATLab: Build Simulation Models from Scratch. E-book, June, 2017. [4] Srishtansh Pathak and Himanshu Sharma. Channel Estimation in OFDM Systems. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol.3, No.3, pp. 312-327, 2013. [5] Elizabeth A. Thompson, Charles McIntosh, James Isaacs, Eric Harmison, Ross Sneary. Robot Communication Link Using 802.11n or 900 MHz OFDM. Journal of Network and Computer Applications (JNCA), Vol. 52, Issue 6, pp. 37-51, June 2015. [6] Jeffrey G. Andrews, Arunabha Ghosh, and Rias Muhamed. Fundamentals of WiMAX- Understanding Broadband Wireless Networking. Prentice Hall, Second Edition, 2007. [7] Christopher Cox. An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications. John-Wiley & Sons, March 2012. [8] Mehdi Alasti, Behnam Neekzad, Jie Hui, and Rath Vannithamby. Quality of Service in WiMAX and LTE Networks. IEEE Communications Magazine, Vol. 48, Issue 5, May 2010. [9] Deepak Sharma and Praveen Srivastava. OFDM Simulator Using MATLAB. International Journal of Emerging Technology and Advanced Engineering, Vol. 3, Issue 9, pp. 493-496, September 2013. [10] S. S. Ghorpade and S. V. Sankpal. Behavior of OFDM System Using MATLAB Simulation. International Journal of Innovative Technology and Research (IJITR), Vol., No. 1, Issue No. 3, pp. 249 – 252, April - May 2013. [11] S. Sadinov, P. Daneva, and P. Kogias. Description and Simulation of OFDM Reception Process Journal of Engineering Science and Technology Review, Vol. 7, No. 4, pp. 18-22, 2014. [12] Orlandos Grigoriadis and H. Srikanth Kamath. BER Calculation Using MATLAB Simulation for OGDM Transmission. Proceedings of the International Multi-Conference of Engineers and Computer Scientists (IMECS), Vol II, Hong Kong, 19-21 March 2008. [13] Kala Praveen Bagadi and Susmita Das. MIMO-OFDM Channel Estimation Using Pilot Carries. International Journal of Computer Applications (0975 – 888 (IJCA), Vol. 2, No. 3, May 2010. [14] H. Sinha, R. Meshram, and G.R. Sinha. BER Performance Analysis of MIMO-OFDM over Wireless Channel. International Journal of Pure and Applied Mathematics (IJPAM), Vol. 118, No. 5, pp. 195- 206, 2018.
  • 23. [15] Pratima Manhas and M.K Soni. OFDM Performance Evaluation under Different Fading Channels using Matlab Simulink. Indonesian Journal of Electrical Engineering and Computer Science, Vol. 5, No. 2, pp. 260-266, 2017. [16] A. Z. M. Touhidul Islam. A Comparative Performance Study of OFDM System with the Implementation of Comb Pilot-Based MMSE Channel Estimation. International Journal on Computational Sciences & Applications (IJCSA), Vol.3, No.6, pp. 45-53, December 2013. [17] D. Khosla, S. Singh, R. Singh, and S. Goyal. OFDM Modulation Technique & its Applications: A Review. Proceedings of the International Conference on Innovations in Computing (ICIC 2017), pp. 101-105, 2017. [18] Fateme Salehi, Mohammad‐Hassan Majidi, and Naaser Neda. Channel Estimation Based on Learning Automata for OFDM Systems. International Journal of Communication Systems, Vol. 321, Issue 12, August, 2018. [19] Navjot Kaur and Neetu Gupta. Simulation and Analysis of OFDM and SC-FDMA with STBC using Different Modulation Techniques. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol. 4, Issue 11, pp. 4184-4189, November 2015. [20] Himanshi Jain and Vikas Nandal. A Comparison of Various Channel Estimation Techniques to Improve Fading Effects in MIMO over Different Fading Channels. International Journal of Current Engineering and Technology (IJCET), Vol. 6, No. 4, pp. 1382-1386, 2016. [21] Kussum Bhagat and Jyoteesh Malhotra. Performance Evaluation of Channel Estimation Techniques in OFDM-based Mobile Wireless System. International Journal of Future Generation Communication and Networking (IJFGCN), Vol. 8, No. 3, pp. 53-60, 2015. [22] Vishal Sharma and Harleen Kaur. On BER Evaluation of MIMO-OFDM Incorporated Wireless System. International Journal for Light and Electron Optics, Vol. 127, Issue 1, pp. 203-205, January 2016. [23] N. Kumar and Anuradha. BER Analysis of Conventional and Wavelet Based OFDM in LTE using Different Modulation Techniques. IEEE Engineering and Computational Sciences, March 2014. [24] M Divya. Bit Error Rate Performance of BPSK Modulation and OFDM-BPSK with Rayleigh Multiple Channel. International Journal of Engineering and Advanced Technology (IJEAT), Vol. 2, Issue 4, April 2013. [25] Song Wang, Jinli Cao, Jiankun Hu. A Frequency Domain Subspace Blind Channel Estimation Method for Trailing Zero OFDM Systems. Journal of Network and Computer Applications (JNCA), Vol. 34, Issue 1, pp. 116-120, January 2011. [26] Li Li. Advanced Channel Estimation and Detection Techniques for MIMO and OFDM Systems. PhD Thesis, University of York, UK, 2013. [27] S. Patil and A. N. Jadhav. Channel Estimation Using LS and MMSE Estimators. KIET International Journal of Communications & Electronics, Vol. 2, No.1, pp. 51-55, April 2014. [28] Anwar Yousef Al-Tarawneh. An Improved Performance OFDM Channel Estimation Using PilotSymbol-Aided Technique. MSc Thesis, Mutah University, Jordan, 2015.
  • 24. RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONS Ji Qi1, Xin Li1, Shivam Garg2, Fei Hu1, Sunil Kumar2 1Department of Electrical and Computer Engineering, University of Alabama, Tuscaloosa, AL 2Department of Electrical and Computer Engineering, San Diego State University, San Diego, CA ABSTRACT The paper presents a Riverbed simulator implementation with both routing and medium access control (MAC) protocols for mobile ad-hoc network wireless networks with multi- beam smart antennas (MBSAs). As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions / receptions in multiple directions/beams. Thus it can significantly improve the network throughput. However, so far there is still no accurate network simulator that can measure the MBSA-based routing/MAC protocol performance. In this paper, we describe the simulation models with the implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and multi- path pipe routing. We will analyze the network performance for those two scenarios and illustrate the advantages of using MBSAs in wireless networks. KEYWORDS Multi-beam Smart Antennas (MBSAs), Medium Access Control (MAC), Multi-path routing, Riverbed Modeler. Full Text: https://aircconline.com/ijwmn/V9N6/9617ijwmn01.pdf Volume Link: http://airccse.org/journal/jwmn_current17.html
  • 25. REFERENCES [1] J. Macker, “Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation considerations,” 1999. [2] E. M. Royer and C.-K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks,” IEEE personal communications, vol. 6, no. 2, pp. 46–55, 1999. [3] C. E. Perkins et al., Ad hoc networking. Addison-wesley Reading, 2001, vol. 1. [4] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (aodv) routing,” Tech. Rep., 2003. [5] T. Clausen and P. Jacquet, “Optimized link state routing protocol (olsr),” Tech. Rep., 2003. [6] O. Modeler, “Riverbed technology,” Inc. http://www. riverbed. com, 2016. [7] A. Zaballos, A. Vallejo, G. Corral, and J. Abella, “Adhoc routing performance study using opnet modeler,” OPNETWORK, Washington DC (United States) August, 2006. [8] N. Bilandi and H. K. Verma, “Comparative analysis of reactive, proactive and hybrid routing protocols in manet,” International Journal of Electronics and Computer Science Engineering, vol. 1, no. 3, pp. 1660– 1667, 2012. [9] S. G. Thorenoor, “Dynamic routing protocol implementation decision between eigrp, ospf and rip based on technical background using opnet modeler,” in Computer and Network Technology (ICCNT), 2010 Second International Conference on. IEEE, 2010, pp. 191–195. [10] V. Hnatyshin and H. Asenov, “Design and implementation of an opnet model for simulating geoaodv manet routing protocol,” in Proc. of the OPNETWORK 2010 International Conference, Session: Wireless Ad Hoc and Wireless Personal Area Networks, Washington DC, 2010. [11] R. Al-Maharmah, G. Bruck, and P. Jung, “Practical methodology for adding new manet routing protocols to opnet modeler,” in The 5th International Conference on Advances in System Simulation (SIMUL 2013), Vience, 2013, pp. 73–80. [12] J. Stine, “Modeling smart antennas in synchronous ad hoc networks using opnet’s pipeline stages,” The MITRE Corporation, Tech. Rep, 2005. [13] V. Jain, A. Gupta, and D. P. Agrawal, “On-demand medium access in multihop wireless networks with multiple beam smart antennas,” IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 4, pp. 489–502, 2008. [14] B. P. Crow, I. Widjaja, L. Kim, and P. T. Sakai, “Ieee 802.11 wireless local area networks,” IEEE Communications magazine, vol. 35, no. 9, pp. 116–126, 1997. [15] V. Kolar, S. Tilak, and N. B. Abu-Ghazaleh, “Avoiding head of line blocking in directional antenna [mac protocol],” in Local Computer Networks, 2004. 29th Annual IEEE International Conference on. IEEE, 2004, pp. 385–392. [16] A. Kalis and T. Antonakopoulos, “Direction finding in ieee802. 11 wireless networks,” IEEE Transactions on Instrumentation and Measurement, vol. 51, no. 5, pp. 940–948, 2002.
  • 26. [17] A. Gill et al., “Introduction to the theory of finite-state machines,” 1962. [18] N. Briscoe, “Understanding the osi 7-layer model,” PC Network Advisor, vol. 120, no. 2, 2000.
  • 27. VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SENSOR NETWORKS Vianney Kengne Tchendji1, Jean Frédéric Myoupo2, Pauline Laure Fotso3 and Ulrich Kenfack Zeukeng1 1Department of Mathematics and Computer Science, University of Dschang, Cameroon 2Lab-MIS, University of Picardie Jules Verne, 33 rue St Leu, 80039, Amiens, France 3Department of Computer Science, University of Yaounde 1, Cameroon ABSTRACT This paper proposes a virtual architecture for three-dimensional (3D) wireless sensor networks (WSNs), a dynamic coordinate system, and a scalable energy-efficient training protocol for collections of nodes deployed in the space that are initially anonymous, asynchronous, and unaware of their initial location. The 3D WSNs considered comprise massively deployed tiny energy-constrained commodity sensors and one or more sink nodes that provide an interface to the outside world. The proposed architecture is a generalization of a two-dimensional virtual architecture previously proposed in the literature, in which a flexible and intuitive coordinate system is imposed onto the deployment area and the anonymous nodes are partitioned into clusters where data can be gathered from the environment and synthesized under local control. The architecture solves the hidden sensors problem that occurs because of irregularities in rugged deployment areas or environments containing buildings by training the network of nodes arbitrarily dispersed in the 3D space. In addition, we derive two simple and energy-efficient routing protocols, respectively for dense and sparse networks, based on the proposed dynamic coordinate system. They are used to minimize the power expended in collecting and routing data to the sink node, thus increasing the lifetime of the network. KEYWORDS Wireless Sensor Network, Self-organization, Training protocol, Energy-efficient Routing Protocol. Full Text: https://aircconline.com/ijwmn/V9N5/9517ijwmn07.pdf Volume Link: http://airccse.org/journal/jwmn_current17.html
  • 28. REFERENCES [1] Akyildiz, I. F., Su, W., Y. Sankarasubramaniam, Y. and E. Cayirci, E. (2002) ‘Wireless sensor networks: A survey, Comput. Networks’, 38(4), 393-422. [2] Zhirnov, V. V. and Herr, D. J. (2001). ‘New frontiers: Self-assembly and nanoelectronics’., Computer, 34(1), pp. 34-43. [3] Agre, J. and Clare L. (2000). ‘An integrated architecture for cooperative sensing networks’, Computer, 33(5), pp. 106-108. [4] Dargie, W. W. and Poellabaurer, C. (2010) ‘Fundamentals of Wireless Sensor Networks: Theory and Practice,, Wiley. [5] Intanagonwiwat, C., R. Govindan,R. and D. Estrin, D. (2000) ‘Directed diffusion: A scalable and robust communication paradigm for sensor networks’. MOBICOM, pp. 56-67. [6] Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V. and Culler D. E. (2001) ‘Spins: Security protocols for sensor networks’, In: Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 189-199. [7] Shen, C. C., Srisathapornphat, C. and Jaikaeo, C. (2001) ‘Sensor information networking architecture and applications’, IEEE Pers. Commun., 8(4), 52-59. [8] Tilak, S., Abu-Ghazaleh, N. B. and Heinzelman, W.(2002) ‘A taxonomy of wireless micro-sensor network models’. ACM SIGMOBILE Mobile Computer Communication Review., 6(2), 28-36. [9] El Emary,I. M. M. and S. Ramakrishnan, S. (2013) ‘Wireless Sensor Networks: From Theory to Applications’, CRC Press. [10] Li, Y. and Thai, M. T. (2013). Wireless Sensor Networks and Applications, Springer. [11] Bar-Yehuda, R., Goldreich, O. and Itai, A. (1991) ‘Efficient emulation of single-hop radio network with collision detection on multi-hop radio network with no collision detection’. Distributed Computing, 5(2), pp. 67-71. [12] Bertzekas,D. and Gallager R. (1992) Data Networks, Second Edition, Prentice-Hall. [13] Li, C., Wang, Z. and Yang, C. (2011) ‘Secure Routing for Wireless Mesh Networks’, International Journal of Network Security, 13(2), 109-120. [14] Saroit, I. A., El-Zoghdy, S. F. and Matar, M. (2011) ‘A scalable and distributed security protocol for multicast communications’, International Journal of Network Security, 12(2), 61- 74. [15] Karlof, C., Sastry, N. and Wagner, D. (2000) ‘TinySec: A link layer security architecture for wireless sensor networks’, Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 162-175, ACM. [16] Boufares, N., Khoufi, I., Minet, P., Saidane, L. and Ben Saied, Y. (2015) ‘Three dimensional mobile wireless sensor networks redeployment based on virtual forces’, IEEE Wireless Communications and Mobile Computing Conference (IWCMC), pp.563-568.
  • 29. [17] A. Wadaa, A., S. Olariu, S., L. Wilson, L., M. Eltoweissy, M. and K. Jones K..(2005) ‘Training a wireless sensor network’, Mobile networks and Applications, 10(1-2), 151-168, 2005. [18] Bertossi, A. A., Olariu S., Pinotti M. C. (2008) ‘Efficient corona training protocols for sensor networks’, Theoretical Computer Science, 402(1): 2-15. [19] Olariu, S., Wadaa, A., Wilson, L. and Eltoweissy, M. (2004) ‘Wireless sensor networks: leveraging the virtual infrastructure’. IEEE Network 18(4): 51-56. [20] Howard, A., Mataric, M.J. and Sukhatme, G. S. (2002) ‘An Incremental Self- Deployment Algorithm for Mobile Sensor Networks’, Autonomous Robots, Special Issue on Intelligent Embedded Systems, 13(2), pp. 113-126. [21] Tamoghna, O., Manas, M. and Studip M..(2013) ‘Tic-Tac-Toe-Arch: a self-organising virtual architecture for Underwater Sensor Networks’. IET Wireless Sensor Systems, vo. 3, Issue: 4, pp. 307- 316. [22] Capella, J. V., Bonastre, A., Serrano, J. J. and Ors, R. (2009) ‘A New Robust, Energy- efficient and Scalable Wireless Sensor Networks Architecture Applied to a Wireless Fire Detection System’, International Conference on Wireless Networks and Information Systems, WNIS '09. pp. 395 – 398. [23] Miao, C., Dai, G., Zhao, X., Tang, Z. and Chen, Q (2014) ‘3D Self-Deployment Algorithm in Mobile Wireless Sensor Networks’, In: Sun L., Ma H., Fang D., Niu J., Wang W. (eds) Advances in Wireless Sensor Networks-CWSN 2014. pp. 27-41. [24] Chen, J., Qian, H. (2014) ‘Three-dimensional deployment algorithm based on ideal fluid dynamics model for mobile sensor networks’, Computer Modelling & New Technologies 18(9)12-18 [25] Huang, C-F., Tseng, Y-C. and Lo L-C. (2007) ‘The coverage problem in three- dimensional wireless sensor networks’, Journal of Interconnection Networks, 8, Issue 03, p. 209. [26] Langendoen, K.. and Reijers, N. (2003). ‘Distributed localization in wireless sensor networks: A quantitative comparison’, Computer Network, 43(4), 499-518. [27] Tanenbaum A. and Wetherall D. (2011) ‘Computer Networks’, Pearson Education, Inc/ Prentice Hall. [28] WSNet, [online]. http://wsnet.gforge.inria.fr. (2016 ). [29] A. Allirani, A. and M. Suganthi M.(2008) An energy sorting protocol (ESP) with low energy and low latency in wireless sensor networks. International Journal of Computer Science and Network Security, 8(11), pp. 208-214.