This article proposes a novel speed-based handover algorithm for mobility management between macrocells and femtocells in LTE networks. Existing handover decision algorithms are compared. The proposed algorithm uses a mobile's speed to determine whether to handover from a macrocell to a femtocell or vice versa. Simulation results show the performance of the proposed algorithm. The algorithm aims to guarantee efficient handovers between different cell types in a hierarchical LTE structure.
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Most Popular Browser Game Articles
1. Most Viewed Articles inWireless
& Mobile Networks
International Journal of Wireless & Mobile
Networks (IJWMN)
ISSN: 0975-3834 [Online]; 0975-4679 [Print]
http://airccse.org/journal/ijwmn.html
2. FAULT DETECTION AND RECOVERY IN WIRELESS SENSOR
NETWORK USING CLUSTERING
Abolfazl Akbari1, Arash Dana2, Ahmad Khademzadeh3 and Neda Beikmahdavi4
1Dept. of Computer Engineering, Islamic Azad University Ayatollah Amoli Branch, Amol,
Iran
2Islamic Azad University, Central Tehran Branch, Tehran, Iran
3Iran Telecom Research Center, Tehran, Iran
4 Islamic Azad University Ayatollah Amoli Branch, Amol, Iran
ABSTRACT
Some WSN by a lot of immobile node and with the limited energy and without further charge
of energy. Whereas extension of many sensor nodes and their operation. Hence it is normal.
unactive nodes miss their communication in network, hence split the network. For avoidance
split of network, we proposed a fault recovery corrupted node and Self Healing is necessary.
In this Thesis, we design techniques to maintain the cluster structure in the event of failures
caused by energy-drained nodes. Initially, node with the maximum residual energy in a
cluster becomes cluster heed and node with the second maximum residual energy becomes
secondary cluster heed. Later on, selection of cluster heed and secondary cluster heed will be
based on available residual energy. We use Matlab software as simulation platform
quantities. like, energy consumption at cluster and number of clusters is computed in
evaluation of proposed algorithm. Eventually we evaluated and compare this proposed
method against previous method and we demonstrate our model is better optimization than
other method such as Venkataraman, in energy consumption rate.
KEYWORDS
Sensor Networks, clustering, fault detection, fault recovery.
Full Text: http://airccse.org/journal/jwmn/0211ijwmn12.pdf
Volume Link: http://airccse.org/journal/jwmn_current11.html
3. REFERENCES
[1] A. Bharathidasas, and V. Anand, “Sensor networks: An overview”, Technical report,
Dept. of Computer Science, University of California at Davis, 2002
[2] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, "Next century challenges: Scalable
coordination in sensor networks", in Proceedings of ACM Mobicom, Seattle, Washington,
USA, August 1999, pp. 263-- 270, ACM.
[3] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor
Networks", IEEE Communications Magazine, pp. 102--114, August 2002.
[4] D. Estrin, L. Girod, G. Pottie, M. Srivastava, “Instrumenting the world with wireless
sensor networks”, In Proceedings of the International Conference on Acoustics, Speech and
Signal Processing (ICASSP 2001.
[5] E. S. Biagioni and G. Sasaki, “Wireless sensor placement for reliable and efficient data
collection”, in the 36th International Conference on Systems Sciences, Hawaii, January 2003.
[6] G. Gupta and M. Younis, “Load-Balanced Clustering in Wireless Sensor Networks”, in
the Proceedings of International Conference on Communication (ICC 2003), Anchorage, AK,
May 2003.
[7] J. Chen, S. Kher and A. Somani, “Distributed Fault Detection of Wireless Sensor
Networks”, in DIWANS'06. 2006. Los Angeles, USA: ACM Pres.
[8] F. Koushanfar, M. Potkonjak, A. Sangiovanni- Vincentelli, “Fault Tolerance in Wireless
Ad-hoc Sensor Networks”, Proceedings of IEEE Sensors 2002, June, 2002.
[9] W. L. Lee, A. Datta, and R. Cardell-Oliver, “Network Management in Wireless Sensor
Networks”, to appear in Handbook on Mobile Ad Hoc and Pervasive Communications, edited
by M. K. Denko and L. T.Yang, American Scientific Publishers.
[10] G. Venkataraman, S. Emmanuel and S.Thambipillai, “Energy-efficient cluster-based
scheme for failure management in sensor networks” IET Commun, Volume 2, Issue 4, April
2008 Page(s):528 – 537
[11] L. Paradis and Q. Han, “A Survey of Fault Management in Wireless Sensor Networks”,
Journal of Network and Systems Management, vol. 15, no. 2, pp. 171-190, 2007.
[12] L. M. S. D. Souza, H. Vogt and M. Beigl, “A survey on fault tolerance in wireless sensor
networks”, 2007.
[13] W. L Lee, A.D., R. Cordell-Oliver, WinMS: Wireless Sensor Network-Management
System, An Adaptive Policy-Based Management for Wireless Sensor Networks. 2006.
[14] L. B. Ruiz, I. G.Siqueira, L. B. Oliveira, H. C. Wong, J.M. S. Nigeria, and A. A. F.
Loureiro. “Fault management in event-driven wireless sensor networks”, MSWiM’04,
October 4-6, 2004, Venezia, Italy
[15] G. Gupta and M. Younis; Fault tolerant clustering of wireless sensor networks;
WCNC’03, pp. 1579.1584.
4. [16] M. Ding, D. Chen, K. Xing, and X. Cheng, “Localized fault-tolerant event boundary
detection in sensor networks”, in Proceedings of the 24th Annual Joint Conference of the
IEEE Computer and Communications Societies (INFOCOM '05), vol. 2, pp. 902–913,
Miami, Fla, USA, March 2005
[17] C. Hsin and M.Liu, “Self-monitoring of Wireless Sensor Networks”, Computer
Communications, 2005. 29: p. 462-478
[18] S. Chessa and P. Santi, “Crash faults identification in wireless sensor networks”,
Comput. Commun., 2002, 25, (14), pp. 1273-1282.
[19] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient
Communication Protocol for Wireless Microsensor Networks," Proc. Hawaii Int'l Conf.
System Sciences 2000.
[20] GUPTA G., YOUNIS M.: ‘Fault-tolerant clustering of wireless sensor networks’. Proc.
IEEE WCNC, New Orleans, USA,March 2003, vol. 3, p. 1579 – 1584
[21] N. Bulusu, J. Heidemann and D. Estrin, ”GPS-less Low Cost Outdoor Localization For
Very Small Devices”, IEEE Personal Communications, Special Issue on "Smart Spaces and
Environments", Vol. 7, No. 5, pp. 28-34, October 2000.
[22] Radhika Nagpal, ”Organizing a Global Coordinate System from Local Information on
anAmorphous Computer”, MIT AI Memo 1666, August 1999
5. BROWSER GAMES FOR ONLINE COMMUNITIES
Juha-Matti Vanhatupa
Department of Software Systems, Tampere University of Technology, Tampere, Finland
ABSTRACT
Games played directly inside the web browser have many benefits. Browser games do not
need software installation. Furthermore since the web has become the ultimate collaboration
environment, the games are available for numerous players that can play in collaborative
fashion. Through history online communities have birth alongside with browser games.
Nowadays online communities have achieved massive user numbers and those can be
important part of the browser game itself. This article targets at analyzing and categorizing of
browser games. We also discuss financial opportunities relating to browser games and
technologies used in those.
KEYWORDS
Browser Games, Game Analysis, Online Communities
Full Text: http://airccse.org/journal/jwmn/0203ijwmn03.pdf
Volume Link: http://airccse.org/journal/jwmn_current10.html
6. REFERENCES
[1] Facebook Social Utility, http://www.facebook.com/
[2] Travian Browser Game, http://www.travian.com/
[3] Hattrick Browser Game, http://www.hattrick.org/
[4] Vanhatupa Juha-Matti (2010) “Browser Games: The New Frontier of Social Gaming”, In
Proc of Second International Conference of Wireless & Mobile Networks. CCIS Vol. 84, pp.
349-355, Springer Berlin Heidenberg
[5] Barton Matt, (2008) Dungeons & Desktops, The History of Computer Role Playing
Games, A.K. Peters, pp. 37-43.
[6] Earth 2025 Browser Game, http://games.swirve.com/earth
[7] Facebook Statistics, http://www.facebook.com/press/info.php?statistics
[8] Mafia Wars Facebook application,
http://www.facebook.com/apps/application.php?id=10979261223
[9] Dogs of the Seas Browser Game, http://www.dogsoftheseas.com/
[10] DarkOrbit Browser Game, http://www.darkorbit.com/
[11] ForumWarz Browser Game, http://www.forumwarz.com/
[12] Stick Arena Browser Game, http://www.xgenstudios.com/play/stickarena
[13] Habbo Hotel Virtual World, http://www.habbo.com/
[14] Hattrick history, http://hattrick.org/Help/History.aspx
[15] Häsel Mathias, (2007) “Rich Internet Architectures for Browser-Based Multiplayer
Real-Time Games –Design and Implementation Issues of virtual-kicker.com”, In: Enokido,
T./Barolli, L./Takizawa, M. (Eds.), Network-Based Information Systems: First International
Conference, NBiS 2007. LNCS, vol. 4658, pp. 157-166, Berlin/Heidelberg: Springer-Verlag
[16] Mizanian Kiarash, Vasef Mehdi, Analoui Morteza, (2010) ”Bandwidth Modeling and
Estimation in Peer to Peer Networks”, International Journal of Computer Networks &
Communications (IJCNC), Vol. 2, No. 3.
[17] Klemm Alexander, Lindemann Christoph, Waldhorst Oliver P., (2003), “A Special-
Purpose Peer-to-Peer File Sharing System for Mobile ad hoc networks”, In Proc of Vehicular
Technology Conference, VTC2003, IEEE 58th Vol.4, pp. 2758-2763.
[18] Sharma Abhishek, Shi Hao, (2010) “Innovative Rated-Resource Peer-to-Peer Network”,
International Journal of Computer Networks & Communications (IJCNC), Vol. 2, No. 2.
[19] Foxtrick Hattrick web plugin, http://www.ht-foxtrick.com/forum/portal.php
[20] Facebook Advertising, http://www.facebook.com/advertising/
[21] The Continuum Browser Game, http://www.thecontinuum.com/
7. [22] Magic: The Gathering collectible card game,
http://www.wizards.com/magic/multiverse/default.aspx
[23] Club Penguin Browser Game, http://www.clubpenguin.com/
[24] Walmsley Andrew, Kids’ Virtual Worlds are Maturing Nicely,
http://www.marketingmagazine.co.uk/news/756021/
[25] Schultheiss Daniel, (2007) “Long-term Motivations to Play MMOGs: A Longitudinal
Study on Motivations, Experience and Behavior”, In Proc of the DiGRA 2007 - Situated
Play,Digital Games Research Association International Conference 2007, 344-348.
[26] Space Merchant Realms Browser Game, http://www.smrealms.de/
[27] Kabus Patrick, Terpstra Wesley, Cilia Mariano, Buchmann, Alejandro, (2005)
“Addressing Cheating in Distributed MMOGs”, In Proc of the 4th ACM SIGCOMM
workshop on Network and system support for games.
8. A NOVEL APPROACH FOR MOBILITY MANAGEMENT IN LTE
FEMTOCELLS
1Pantha Ghosal, 2Shouman Barua, 3Ramprasad Subramanian, 4Shiqi Xing and 5Kumbesan
Sandrasegaran
1,2,3,4,5,6Centre for Real-time Information Networks
School of Computing and Communications, Faculty of Engineering and Information
Technology, University of Technology Sydney, Sydney, Australia
ABSTRACT
LTE is an emerging wireless data communication technology to provide broadband
ubiquitous Internet access. Femtocells are included in 3GPP since Release 8 to enhance the
indoor network coverage and capacity. The main challenge of mobility management in
hierarchical LTE structure is to guarantee efficient handover to or from/to/between
Femtocells. This paper focuses, on different types of Handover and comparison performance
between different decision algorithms. Furthermore, a speed based Handover algorithm for
macro-femto scenario is proposed with simulation results
KEYWORDS
Femtocell Access Point (FAP), Handover Hysteresis Margin (HMM), Reference Signal
Received Power (RSRP), Reference Signal Received Quality (RSRQ), Signal to Interference
Plus Noise Ratio (SINR, Evolved NodeB (eNB), User equipment (UE).
Full Text: http://airccse.org/journal/jwmn/6514ijwmn04.pdf
Volume Link: http://airccse.org/journal/jwmn_current14.html
9. REFERENCES
[1] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access. Wiley, NewYork,
2008.
[2] E Dahlman, S Parkvall, J Skold, P Beming, 3G Evolution HSPA and LTE for Mobile
Broadband. Academia Press, USA, 2008.
[3] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, "On Accurate simulations of LTE
femtocells using an open source simulator," in EURASIP Journal on Wireless
Communication and Networking, 2012.
[4] Onyeije Consulting LLC, Solving the capacity crunch (2011).
[5] T. Zahir, K. Arshad, A. Nakata, K. Moessner,“Interference Management in Femtocells,”
in Commun. Surveys & Tutorials, vol. 15, pp. 293-311, 2013.
[6] www.en.wikipedia.org/wiki/Fixed_mobile_convergence/.
[7] R. Bendlin, V. Chandrasekhar, C. Runhua, A. Ekpenyong, and E. Onggosanusi, "From
homogeneous to heterogeneous networks: A 3GPP Long Term Evolution rel. 8/9 case study,"
in 45th Annu. Conf., Inform. Sci. and Syst. (CISS), Baltimore, MD, pp. 1-5, 2011.
[8] H. Mahmoud, I .Guvenc,” A comparative study of different deployment modes for
femtocell networks,” in IEEE Int. Symposium on Personal, Indoor and Mobile Radio
Commun. , Palo Alto, USA, pp. 1–5, 2009.
[9] D. Xenakis, N. Passas, L. Merakos, C. Verikoukis, “Mobility Management for Femtocells
in LTEAdvanced: Key Aspects and Survey of Handover Decision Algorithms” in IEEE
Commun. Surveys & Tutorials., vol. 16 pp. 2014.
[10] J. Moon, D. Cho, “Efficient handoff algorithm for inbound mobility in hierarchical
macro/femto cell networks”, IEEE Commun. Mag. Letters, vol.13, no.10, pp.755-757, Oct.
2009.
[11] P. Xu, X. Fang, R. He, Z. Xiang, “An efficient handoff algorithm based on received
signal strength and wireless transmission loss in hierarchical cell networks”, Telecom. Sys. J.,
Elsevier, pp. 1-9, Sept. 2011.
[12] D. Lopez-Perez, A. Valcarce, A. Ladanyi, G. de la Roche, J. Zhang, “Intracell handover
for interference and handover mitigation in OFDMA two-tier macrocell-femtocell networks”,
EURASIPJ. on Wirel. Com
[13] A. Ulvan, M. Ulvan, and R. Bestak, “The Enhancement of Handover Strategy by
Mobility Prediction in Broadband Wirel. Access”, Netw. and Electronic Commerce Research
Conf. (NAEC) 2009, TX: American Telecom. Sys. Mgmt. Assoc. Inc., pp. 266-276, 2009.
ISBN 978-0-9820958-2-9.
[14] A. Ulvan, R.Bestak, M.Ulvan,“Handover Scenario and Procedure in LTE-based
Femtocell Networks," UBICOMM 4th Intl. Conf. on mobile ubiquitous computing, system,
services and tech.Florance, Italy, 2010.
10. [15] H. Zhang, X. Wen, B. Wang, W. Zheng, Y. Sun, “A Novel Handover Mechanism
Between Femtocell and Macrocell for LTE Based Networks”, IEEE 2nd Internat. Conf. on
Comm. Softw. and Nets. 2010 (ICCSN), pp.228-231, Feb. 2010.
[16] D. Xenakis, N. Passas, and C. Verikoukis, “A Novel Handover Decision Policy for
Reducing Power Transmissions in the two-tier LTE network”, 2012 IEEE Internat. Comm.
Conf. (ICC), pp.1352-1356, June 2012.
[17] D. Xenakis, N. Passas, C. Verikoukis, “An energy-centric handover decisionalgorithm
for the integrated LTE macrocell-femtocell network”, Comp. Comm., Elsevier, 2012
[18] An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications,
First Edition, m Copyright John Wiley and Sons Ltd., Inc. 2012. Published by John Wiley &
Sons, Ltd, ISBN: 9781119970385
[19] G Piro, L Grieco, G Boggia, F Capozzi, P Camarda,”Simulating LTE cellular systems:
an opensource framework, ” in Vehicular Technology, IEEE Trans. vol. 60, pp. 498-513,
2011.
[20] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network
research,” Wireless Communications and Mobile Computing, vol. 2, pp. 483–502, Aug.
2002.
[21] R Subramanian, P Ghosal, S Barua, S Xing, S Cong, K Sandrasegaran,'' Survey of LTE
Downlink Schedulers Algorithm in Open Access Simulation Tolls NS-3 and LTE-Sim '',
Manuscript in International Journal of Wireless & Mobile Networks(IJWMN), November
2014.
11. SYSTEM LEVEL SIMULATION FOR TWO TIER MACRO-FEMTO
CELLULAR NETWORKS
1Shiqi Xing, 2 Pantha Ghosal, 3Shouman Barua, 4 Ramprasad Subramanian and 5Kumbesan
Sandrasegaran
Centre for Real-time Information Networks
School of Computing and Communications, Faculty of Engineering and Information
Technology, University of Technology Sydney, Sydney, Australia.
ABSTRACT
LTE is an emerging wireless communication technology to provide high- speed data service
for the mobile phones and data terminals. To improve indoor coverage and capacity
Femtocells are included in 3GPP since Release 8. There is no common simulation platform is
available for performance justification of LTEFemtocells. LTE-Sim is an object-oriented
open source simulator which incorporates a complete protocol stack can be used for
simulating two-tier macro-femto scenarios. To the best of our knowledge no paper provides
the guideline to perform system level simulation of Femtocell networks. Here, in this paper
Femtocells performance is evaluated in multi-Macrocells and multi-Femtocells environment
with interference from Microcells and Macrocell users along with the scripting.
KEYWORDS
Channel quality indicator (CQI), Femto Access Point (FAP), Macro eNodeB (MeNB),
Macrocell User Equepment (MUE), Moblity Management Entity(MME), Signal to
Interference Plus Noise Ratio(SINR), Physical Layer(PHY)
Full Text: http://airccse.org/journal/jwmn/6614ijwmn01.pdf
Volume Link: http://airccse.org/journal/jwmn_current14.html
13. EXPLAINABLE AI FOR AUTONOMOUS NETWORK FUNCTIONS IN
WIRELESS AND MOBILE NETWORKS
Premnath K Narayanan1 and David K Harrison2
1LM Ericsson Ltd., SA OSS PDU OSS S&T Research & PCT, Athlone, Ireland
2School of Computing, Glasgow Caledonian University, Glasgow, United Kingdom
ABSTRACT
As the telecommunication network components and functions are getting commoditized, the
complexity in configuration and optimization increases. Several automation techniques are
evolving from traditional deterministic algorithms (pre-defined rulesets obtained from
experience accumulated by humans) that were heuristic-based to more cognitive and
stochastic-based algorithms. The aim of this paper is to introduce the seven layers in wireless
telecommunication networks that uses stochastic or AI algorithms, explain the need for
monitoring and possible potential biases in each layer of the stochastic algorithm stack and
finally conclude with evaluation methods, techniques for detecting false positive and false
negative proposals in autonomous network functions. The main subject of the paper is to
provide a background on the need of explainable AI for autonomous network functions. The
paper includes introduction of two models ANOBIA and INFEROBIA models that helps to
achieve explainable AI for autonomous network functions in wireless and mobile networks.
KEYWORDS
Explainable AI; Machine Learning; Artificial Intelligence; Precision; Recall; BIAS;
Variance; Algorithm and Mitigation methods
Full Text: https://aircconline.com/ijwmn/V12N3/12320ijwmn03.pdf
Volume Link: http://airccse.org/journal/jwmn_current20.html
14. REFERENCES
[1] Paulo Valente Klaine, Muhammad Ali Imran, OluwakayodeOnireti, Richard Demo
Souza, "A Survey of Machine Learning Techniques Applied to Self-Organizing Cellular
Networks," IEEE Communications Surveys and Tutorials, IEEE, Volume 19, issue 4, pp.
2392-2431, DOI: 10.1109/COMST.2017.2727878, 2017
[2] O-RAN alliance, “Operator Defined Next Generation RAN Architecture and Interfaces,"
https://www.o-ran.org/, 2019 (last accessed August 2019)
[3] Matti Latva, Kari Leppanen, "Key drivers and research challenges for 6G ubiquitous
wireless intelligence," http://jultika.oulu.fi/files/isbn9789526223544.pdf, 2019 (last accessed
January 2020)
[4] Willmott Cort J, Matsuura Kenji, "Advantages of the mean absolute error (MAE) over the
root mean square error (RMSE) in assessing average model performance," Climate Research,
pp. 79-82, DOI:10.3354/cr030079, 2005
[5] Magee L, "R2 measures based on Wald and likelihood ratio joint significance tests". The
American Statistician. 44. pp. 250–3. DOI:10.1080/00031305.1990.10475731, 1990
[6] de Myttenaere, B Golden, B Le Grand, F Rossi, "Mean absolute percentage error for
regression models," Neurocomputing 2016 archived preprint, 2016
[7] Powers, David M W, "Evaluation: From Precision, Recall and F-Measure to ROC,
Informedness, Markedness& Correlation," Journal of Machine Learning Technologies, pp.
37–63, 2011
[8] Shen Yi, "Loss Functions For Binary Classification and Class Probability Estimation,"
University of Pennsylvania, 2005
[9] Kriegel Hans Peter, Schubert Erich, Zimek Arthur, "The (black) art of runtime evaluation:
Are we comparing algorithms or implementations?", Knowledge and Information Systems,
pp. 341–378, DOI:10.1007/s10115-016-1004-2, 2016
[10] Peter J Rousseeuw, "Silhouettes: a Graphical Aid to the Interpretation and Validation of
Cluster Analysis." Computational and Applied Mathematics, pp. 53–65, DOI:10.1016/0377-
0427(87)90125- 7, 1987
[11] Glen Ford, “4 human-caused biases we need to fix for machine learning”,
https://thenextweb.com/contributors/2018/10/27/4-human-caused-biases-machine-learning/,
2017 (last accessed October 2018)
[12] Wald Abraham, “A Method of Estimating Plane Vulnerability Based on Damage of
Survivors," Statistical Research Group, Columbia University, CRC 432 — reprint from July
1980, 1943
[13] Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng, Jörg Sander, "LOF:
identifying densitybased local outliers," Vol. 29, No 2, pp. 93–104, ACM, May 2000.
[14] Quinlan, J. R, "Programs for Machine Learning," Morgan Kaufmann Publishers, 1993.
[15] Lundberg, S., Erion, G. and Lee, S.,“Consistent Individualized Feature Attribution For
Tree Ensembles,” https://arxiv.org/pdf/1802.03888.pdf, 2019(last accessed June 2020)
15. [16] Lundberg, S. and Lee, S., “A Unified Approach to Interpreting Model Predictions,”
https://arxiv.org/pdf/1705.07874v2.pdf, 2017 (last accessed June 2020)
16. A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard
transform for Bluetooth Technology
D.Sharmila1, R.Neelaveni2
1(Research Scholar), Associate Professor, Bannari Amman Institute of Technology,
Sathyamangalam, Tamil Nadu-638401.
2 Asst.Prof. PSG College of Technology, Coimbatore.Tamil Nadu -638401.
ABSTRACT
In this paper, a modified SAFER plus algorithm is presented. Additionally, a comparison
with various security algorithms like pipelined AES, Triple DES, Elliptic curve Diffie
Hellman and the existing SAFER plus are done. Performance of the algorithms is evaluated
based on the data throughput, frequency and security level. The results show that the
modified SAFER plus algorithm has enhanced security compared to the existing algorithms.
KEYWORDS
Secure And Fast Encryption Routine, Triple Data Encryption Standard, Pipelined Advanced
Encryption Standard, Elliptic Curve Diffie Hellmann, Pseudo Hadamard Transform,
Encryption and Decryption.
Full Text: http://airccse.org/journal/jwmn/1109s6.pdf
Volume Link: http://airccse.org/journal/j3current.html
17. REFERENCES
[1] Paraskevas kitos, Nicolas sklavos, Kyriakos Papadomanolakis and Odysseas Koufopavlou
university of patras, Greece,” Hardware Implementation of Bluetooth Security” IEEE CS and
IEEE Communications Society - January to March 2003. pp. 21 to 29.
[2] Karen Scarfone John Padgette, “Guide to Bluetooth security “National Institute of
standards and technology Special Publication 800-121, U.S. Department of Commerce 43
pages.
[3] Vainio, Juha T. “Bluetooth Security,” Helsinki University of Technology, 25 May 2000
[4 ] Gyongsu Lee, ”Bluetooth Security Implementation based on Software Oriented
Hardware-Software Partition” IEEE journal 2005. pp. 2070-2074.
[5] Kardach, James, “Bluetooth Architecture Overview,” Intel Technology Journal, 2000
[6] Jyrki Oraskari, "Bluetooth versus wlan ieee 802.11x", Helsinki university of technology,
october, 2001.
[7] A. Laurie and B.Laurie. serious flaws in blue tooth security lead to disclosure of personal
data. http://bluestumbler.com.
[8] Brent A.Miller And Chatschik Bisdikian “Bluetooth revealed” – low price edition
[9] Wikipedia.org, “Bluetooth,” Wikipedia.org, 5 March 2005,
http://en.wikipedia.org/wiki/Bluetooth (21 February 2005)
[10] Vrije Universiteit Brussel, “Bluetooth security” phd thesis December 2004
[11] Keijo M.J. Haataja Licentiate Thesis January 2007 University of Kuopio
[12] J. L. Massey, “On the Optimality of SAFER+ Diffusion”, Second Advanced Encryption
Standard Candidate Conference (AES2), Rome, Italy, March 22-23 online available at
http://csrc.nist.gov/encryption/aes/round1/conf2/aes2conf.htm.
[13] Wanli Ouyang, W.K. Cham,”Fast Algorithm for Walsh Hadamard Transform on Sliding
Windows” IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE
INTELLIGENCE, MANUSCRIPT ID TPAMI-2008-06-0328
[14] NIST: Advanced Encryption Standard (AES) The Federal Information Processing
Standards Publication 197. NIST, November 26, 2001.
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf (20.9.2006)
[15] NIST: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block
Cipher. NIST, May 2004. http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf
(19.9.2006)
[16] NIST: Data Encryption Standard (DES) The Federal Information Processing Standards
Publication 46-3. NIST, October 1999. http://www.cerberussystems.
com/INFOSEC/stds/fip46-3.htm (19.9.2006)
[17]AlfonsoDeGregorio. Cryptographic Key ReliableLifetimes: Bounding the Risk of Key
Exposure in the Presence of Faults. In Fault Diagnosis and Tolerance in Cryptography,
volume 4236 of LNCS, pages 144–158. Springer, 2006.
18. [18] ARC Electronics (n.d.). DSSS and FHSS - Spread Spectrum modem. Retrieved March
24, 2004 from, Web site:http://www.arcelect.com/DSSS_FHSS-spead_spectrum.htm
19. IMPLEMENTATION OF APPLICATION FOR HUGE DATA FILE
TRANSFER
Taner Arsan, Fatih Günay and Elif Kaya
Department of Computer Engineering, Kadir Has University, Istanbul, Turkey
ABSTRACT
Nowadays big data transfers make people’s life difficult. During the big data transfer, people
waste so much time. Big data pool grows everyday by sharing data. People prefer to keep
their backups at the cloud systems rather than their computers. Furthermore considering the
safety of cloud systems, people prefer to keep their data at the cloud systems instead of their
computers. When backups getting too much size, their data transfer becomes nearly
impossible. It is obligated to transfer data with various algorithms for moving data from one
place to another. These algorithms constituted for transferring data faster and safer. In this
Project, an application has been developed to transfer of the huge files. Test results show its
efficiency and success.
KEYWORDS
Network Protocols, Resource Management in Networks, Internet and Web Applications,
Network Based Applications.
Full Text: http://airccse.org/journal/jwmn/6414ijwmn03.pdf
Volume Link: http://airccse.org/journal/jwmn_current14.html
20. REFERENCES
[1] Information Storage and Management Storing, Managing, and Protecting Digital
Information Edited by G. Somasundaram Alok Shrivastava, EMC Education Services, 27-29.
[2] The Embedded Internet TCP/IP basics, implementation and applications Edited by Sergio
Scaglia , 2007,225-228
[3] Computer Networking A Top-Down Approach Featuring the Internet third edition Edited
by James F. Kurose, Keith W. Ross 96-98.
[4] Data Transfer Linda Woodard Consultant Cornell CAC Workshop: Parallel Computing
on Stampede: June 18, 2013, 2.
[5] Managed File Transfer Solutions using DataPower and WebSphere MQ File Transfer
Edition Edited by IBM,4-5.
[6] Computing Community Consortium Version 8 : December 22 , 2008
21. COMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES
FOR OFDM SYSTEMS USING MATLAB
Raghad K. Mohammed
Department of Basic Sciences, College of Dentistry University of Baghdad, Baghdad, Iraq
ABSTRACT
This paper compares the performance of various channel estimation techniques for OFDM
systems over quasi-static channels using MATLab. It compares the performance of five
channel estimation techniques, these are: decision directed (DD), linear interpolation, second-
order interpolation, discrete Fourier transform (DFT) interpolation, minimum mean square
error (MMSE) interpolation. The performance is evaluated in terms of two widely-used
performance measures, namely, bit-error rate (BER) and the mean square error (MSE) for
different levels of signal-to-noise ratio (SNR). The OFDM model is explained and
implemented using MATLab to run different simulations. The simulation results demonstrate
that the DD channel estimation provides the lowest BER and MSE as compared to
interpolation techniques, at the cost of extra processing delay and comparatively sensitive to
channel variations between OFDM symbols. Also, the MMSE interpolation outperforms all
other interpolation techniques.
KEYWORDS
OFDM, pilot-based channel estimation, pilot allocation, direct decision, interpolation channel
estimation, LS, MMSE, MATLab
Full Text: https://aircconline.com/ijwmn/V11N3/11319ijwmn02.pdf
Volume Link: http://airccse.org/journal/jwmn_current19.html
22. REFERENCES
[1] Henrik Schulze and Christian Luders. Theory and Applications of OFDM and CDMA:
Wideband Wireless Communications. John Wiley & Sons, 2006.
[2] Yong Soo Cho, Jaekwon Kim, Won Young Yang, Chung G. Kang. MIMO-OFDM
Wireless Communications with MATLAB, John Wiley & Sons, August 2010.
[3] Mathuranathan Viswanathan. Digital Modulations using MATLab: Build Simulation
Models from Scratch. E-book, June, 2017.
[4] Srishtansh Pathak and Himanshu Sharma. Channel Estimation in OFDM Systems.
International Journal of Advanced Research in Computer Science and Software Engineering
(IJARCSSE), Vol.3, No.3, pp. 312-327, 2013.
[5] Elizabeth A. Thompson, Charles McIntosh, James Isaacs, Eric Harmison, Ross Sneary.
Robot Communication Link Using 802.11n or 900 MHz OFDM. Journal of Network and
Computer Applications (JNCA), Vol. 52, Issue 6, pp. 37-51, June 2015.
[6] Jeffrey G. Andrews, Arunabha Ghosh, and Rias Muhamed. Fundamentals of WiMAX-
Understanding Broadband Wireless Networking. Prentice Hall, Second Edition, 2007.
[7] Christopher Cox. An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile
Communications. John-Wiley & Sons, March 2012.
[8] Mehdi Alasti, Behnam Neekzad, Jie Hui, and Rath Vannithamby. Quality of Service in
WiMAX and LTE Networks. IEEE Communications Magazine, Vol. 48, Issue 5, May 2010.
[9] Deepak Sharma and Praveen Srivastava. OFDM Simulator Using MATLAB.
International Journal of Emerging Technology and Advanced Engineering, Vol. 3, Issue 9,
pp. 493-496, September 2013.
[10] S. S. Ghorpade and S. V. Sankpal. Behavior of OFDM System Using MATLAB
Simulation. International Journal of Innovative Technology and Research (IJITR), Vol., No.
1, Issue No. 3, pp. 249 – 252, April - May 2013.
[11] S. Sadinov, P. Daneva, and P. Kogias. Description and Simulation of OFDM Reception
Process Journal of Engineering Science and Technology Review, Vol. 7, No. 4, pp. 18-22,
2014.
[12] Orlandos Grigoriadis and H. Srikanth Kamath. BER Calculation Using MATLAB
Simulation for OGDM Transmission. Proceedings of the International Multi-Conference of
Engineers and Computer Scientists (IMECS), Vol II, Hong Kong, 19-21 March 2008.
[13] Kala Praveen Bagadi and Susmita Das. MIMO-OFDM Channel Estimation Using Pilot
Carries. International Journal of Computer Applications (0975 – 888 (IJCA), Vol. 2, No. 3,
May 2010.
[14] H. Sinha, R. Meshram, and G.R. Sinha. BER Performance Analysis of MIMO-OFDM
over Wireless Channel. International Journal of Pure and Applied Mathematics (IJPAM),
Vol. 118, No. 5, pp. 195- 206, 2018.
23. [15] Pratima Manhas and M.K Soni. OFDM Performance Evaluation under Different Fading
Channels using Matlab Simulink. Indonesian Journal of Electrical Engineering and Computer
Science, Vol. 5, No. 2, pp. 260-266, 2017.
[16] A. Z. M. Touhidul Islam. A Comparative Performance Study of OFDM System with the
Implementation of Comb Pilot-Based MMSE Channel Estimation. International Journal on
Computational Sciences & Applications (IJCSA), Vol.3, No.6, pp. 45-53, December 2013.
[17] D. Khosla, S. Singh, R. Singh, and S. Goyal. OFDM Modulation Technique & its
Applications: A Review. Proceedings of the International Conference on Innovations in
Computing (ICIC 2017), pp. 101-105, 2017.
[18] Fateme Salehi, Mohammad‐Hassan Majidi, and Naaser Neda. Channel Estimation Based
on Learning Automata for OFDM Systems. International Journal of Communication Systems,
Vol. 321, Issue 12, August, 2018.
[19] Navjot Kaur and Neetu Gupta. Simulation and Analysis of OFDM and SC-FDMA with
STBC using Different Modulation Techniques. International Journal of Advanced Research
in Computer Engineering & Technology (IJARCET), Vol. 4, Issue 11, pp. 4184-4189,
November 2015.
[20] Himanshi Jain and Vikas Nandal. A Comparison of Various Channel Estimation
Techniques to Improve Fading Effects in MIMO over Different Fading Channels.
International Journal of Current Engineering and Technology (IJCET), Vol. 6, No. 4, pp.
1382-1386, 2016.
[21] Kussum Bhagat and Jyoteesh Malhotra. Performance Evaluation of Channel Estimation
Techniques in OFDM-based Mobile Wireless System. International Journal of Future
Generation Communication and Networking (IJFGCN), Vol. 8, No. 3, pp. 53-60, 2015.
[22] Vishal Sharma and Harleen Kaur. On BER Evaluation of MIMO-OFDM Incorporated
Wireless System. International Journal for Light and Electron Optics, Vol. 127, Issue 1, pp.
203-205, January 2016.
[23] N. Kumar and Anuradha. BER Analysis of Conventional and Wavelet Based OFDM in
LTE using Different Modulation Techniques. IEEE Engineering and Computational
Sciences, March 2014.
[24] M Divya. Bit Error Rate Performance of BPSK Modulation and OFDM-BPSK with
Rayleigh Multiple Channel. International Journal of Engineering and Advanced Technology
(IJEAT), Vol. 2, Issue 4, April 2013.
[25] Song Wang, Jinli Cao, Jiankun Hu. A Frequency Domain Subspace Blind Channel
Estimation Method for Trailing Zero OFDM Systems. Journal of Network and Computer
Applications (JNCA), Vol. 34, Issue 1, pp. 116-120, January 2011.
[26] Li Li. Advanced Channel Estimation and Detection Techniques for MIMO and OFDM
Systems. PhD Thesis, University of York, UK, 2013.
[27] S. Patil and A. N. Jadhav. Channel Estimation Using LS and MMSE Estimators. KIET
International Journal of Communications & Electronics, Vol. 2, No.1, pp. 51-55, April 2014.
[28] Anwar Yousef Al-Tarawneh. An Improved Performance OFDM Channel Estimation
Using PilotSymbol-Aided Technique. MSc Thesis, Mutah University, Jordan, 2015.
24. RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM
CONCURRENT TRANSMISSIONS
Ji Qi1, Xin Li1, Shivam Garg2, Fei Hu1, Sunil Kumar2
1Department of Electrical and Computer Engineering, University of Alabama, Tuscaloosa,
AL
2Department of Electrical and Computer Engineering, San Diego State University, San
Diego, CA
ABSTRACT
The paper presents a Riverbed simulator implementation with both routing and medium
access control (MAC) protocols for mobile ad-hoc network wireless networks with multi-
beam smart antennas (MBSAs). As one of the latest promising antenna techniques, MBSAs
can achieve concurrent transmissions / receptions in multiple directions/beams. Thus it can
significantly improve the network throughput. However, so far there is still no accurate
network simulator that can measure the MBSA-based routing/MAC protocol performance. In
this paper, we describe the simulation models with the implementation of MBSA antenna
model in physical layer, MAC layer, and routing layer protocols, all in Riverbed Modeler.
We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and multi-
path pipe routing. We will analyze the network performance for those two scenarios and
illustrate the advantages of using MBSAs in wireless networks.
KEYWORDS
Multi-beam Smart Antennas (MBSAs), Medium Access Control (MAC), Multi-path routing,
Riverbed Modeler.
Full Text: https://aircconline.com/ijwmn/V9N6/9617ijwmn01.pdf
Volume Link: http://airccse.org/journal/jwmn_current17.html
25. REFERENCES
[1] J. Macker, “Mobile ad hoc networking (manet): Routing protocol performance issues and
evaluation considerations,” 1999.
[2] E. M. Royer and C.-K. Toh, “A review of current routing protocols for ad hoc mobile
wireless networks,” IEEE personal communications, vol. 6, no. 2, pp. 46–55, 1999.
[3] C. E. Perkins et al., Ad hoc networking. Addison-wesley Reading, 2001, vol. 1.
[4] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (aodv)
routing,” Tech. Rep., 2003.
[5] T. Clausen and P. Jacquet, “Optimized link state routing protocol (olsr),” Tech. Rep.,
2003.
[6] O. Modeler, “Riverbed technology,” Inc. http://www. riverbed. com, 2016.
[7] A. Zaballos, A. Vallejo, G. Corral, and J. Abella, “Adhoc routing performance study
using opnet modeler,” OPNETWORK, Washington DC (United States) August, 2006.
[8] N. Bilandi and H. K. Verma, “Comparative analysis of reactive, proactive and hybrid
routing protocols in manet,” International Journal of Electronics and Computer Science
Engineering, vol. 1, no. 3, pp. 1660– 1667, 2012.
[9] S. G. Thorenoor, “Dynamic routing protocol implementation decision between eigrp, ospf
and rip based on technical background using opnet modeler,” in Computer and Network
Technology (ICCNT), 2010 Second International Conference on. IEEE, 2010, pp. 191–195.
[10] V. Hnatyshin and H. Asenov, “Design and implementation of an opnet model for
simulating geoaodv manet routing protocol,” in Proc. of the OPNETWORK 2010
International Conference, Session: Wireless Ad Hoc and Wireless Personal Area Networks,
Washington DC, 2010.
[11] R. Al-Maharmah, G. Bruck, and P. Jung, “Practical methodology for adding new manet
routing protocols to opnet modeler,” in The 5th International Conference on Advances in
System Simulation (SIMUL 2013), Vience, 2013, pp. 73–80.
[12] J. Stine, “Modeling smart antennas in synchronous ad hoc networks using opnet’s
pipeline stages,” The MITRE Corporation, Tech. Rep, 2005.
[13] V. Jain, A. Gupta, and D. P. Agrawal, “On-demand medium access in multihop wireless
networks with multiple beam smart antennas,” IEEE Transactions on Parallel and Distributed
Systems, vol. 19, no. 4, pp. 489–502, 2008.
[14] B. P. Crow, I. Widjaja, L. Kim, and P. T. Sakai, “Ieee 802.11 wireless local area
networks,” IEEE Communications magazine, vol. 35, no. 9, pp. 116–126, 1997.
[15] V. Kolar, S. Tilak, and N. B. Abu-Ghazaleh, “Avoiding head of line blocking in
directional antenna [mac protocol],” in Local Computer Networks, 2004. 29th Annual IEEE
International Conference on. IEEE, 2004, pp. 385–392.
[16] A. Kalis and T. Antonakopoulos, “Direction finding in ieee802. 11 wireless networks,”
IEEE Transactions on Instrumentation and Measurement, vol. 51, no. 5, pp. 940–948, 2002.
26. [17] A. Gill et al., “Introduction to the theory of finite-state machines,” 1962.
[18] N. Briscoe, “Understanding the osi 7-layer model,” PC Network Advisor, vol. 120, no.
2, 2000.
27. VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING
PROTOCOLS FOR 3D WIRELESS SENSOR NETWORKS
Vianney Kengne Tchendji1, Jean Frédéric Myoupo2, Pauline Laure Fotso3 and Ulrich
Kenfack Zeukeng1
1Department of Mathematics and Computer Science, University of Dschang, Cameroon
2Lab-MIS, University of Picardie Jules Verne, 33 rue St Leu, 80039, Amiens, France
3Department of Computer Science, University of Yaounde 1, Cameroon
ABSTRACT
This paper proposes a virtual architecture for three-dimensional (3D) wireless sensor
networks (WSNs), a dynamic coordinate system, and a scalable energy-efficient training
protocol for collections of nodes deployed in the space that are initially anonymous,
asynchronous, and unaware of their initial location. The 3D WSNs considered comprise
massively deployed tiny energy-constrained commodity sensors and one or more sink nodes
that provide an interface to the outside world. The proposed architecture is a generalization of
a two-dimensional virtual architecture previously proposed in the literature, in which a
flexible and intuitive coordinate system is imposed onto the deployment area and the
anonymous nodes are partitioned into clusters where data can be gathered from the
environment and synthesized under local control. The architecture solves the hidden sensors
problem that occurs because of irregularities in rugged deployment areas or environments
containing buildings by training the network of nodes arbitrarily dispersed in the 3D space. In
addition, we derive two simple and energy-efficient routing protocols, respectively for dense
and sparse networks, based on the proposed dynamic coordinate system. They are used to
minimize the power expended in collecting and routing data to the sink node, thus increasing
the lifetime of the network.
KEYWORDS
Wireless Sensor Network, Self-organization, Training protocol, Energy-efficient Routing
Protocol.
Full Text: https://aircconline.com/ijwmn/V9N5/9517ijwmn07.pdf
Volume Link: http://airccse.org/journal/jwmn_current17.html
28. REFERENCES
[1] Akyildiz, I. F., Su, W., Y. Sankarasubramaniam, Y. and E. Cayirci, E. (2002) ‘Wireless
sensor networks: A survey, Comput. Networks’, 38(4), 393-422.
[2] Zhirnov, V. V. and Herr, D. J. (2001). ‘New frontiers: Self-assembly and
nanoelectronics’., Computer, 34(1), pp. 34-43.
[3] Agre, J. and Clare L. (2000). ‘An integrated architecture for cooperative sensing
networks’, Computer, 33(5), pp. 106-108.
[4] Dargie, W. W. and Poellabaurer, C. (2010) ‘Fundamentals of Wireless Sensor Networks:
Theory and Practice,, Wiley.
[5] Intanagonwiwat, C., R. Govindan,R. and D. Estrin, D. (2000) ‘Directed diffusion: A
scalable and robust communication paradigm for sensor networks’. MOBICOM, pp. 56-67.
[6] Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V. and Culler D. E. (2001) ‘Spins: Security
protocols for sensor networks’, In: Proceedings of the 7th Annual ACM/IEEE International
Conference on Mobile Computing and Networking, pp. 189-199.
[7] Shen, C. C., Srisathapornphat, C. and Jaikaeo, C. (2001) ‘Sensor information networking
architecture and applications’, IEEE Pers. Commun., 8(4), 52-59.
[8] Tilak, S., Abu-Ghazaleh, N. B. and Heinzelman, W.(2002) ‘A taxonomy of wireless
micro-sensor network models’. ACM SIGMOBILE Mobile Computer Communication
Review., 6(2), 28-36.
[9] El Emary,I. M. M. and S. Ramakrishnan, S. (2013) ‘Wireless Sensor Networks: From
Theory to Applications’, CRC Press.
[10] Li, Y. and Thai, M. T. (2013). Wireless Sensor Networks and Applications, Springer.
[11] Bar-Yehuda, R., Goldreich, O. and Itai, A. (1991) ‘Efficient emulation of single-hop
radio network with collision detection on multi-hop radio network with no collision
detection’. Distributed Computing, 5(2), pp. 67-71.
[12] Bertzekas,D. and Gallager R. (1992) Data Networks, Second Edition, Prentice-Hall.
[13] Li, C., Wang, Z. and Yang, C. (2011) ‘Secure Routing for Wireless Mesh Networks’,
International Journal of Network Security, 13(2), 109-120.
[14] Saroit, I. A., El-Zoghdy, S. F. and Matar, M. (2011) ‘A scalable and distributed security
protocol for multicast communications’, International Journal of Network Security, 12(2), 61-
74.
[15] Karlof, C., Sastry, N. and Wagner, D. (2000) ‘TinySec: A link layer security architecture
for wireless sensor networks’, Proceedings of the 2nd International Conference on Embedded
Networked Sensor Systems, pp. 162-175, ACM.
[16] Boufares, N., Khoufi, I., Minet, P., Saidane, L. and Ben Saied, Y. (2015) ‘Three
dimensional mobile wireless sensor networks redeployment based on virtual forces’, IEEE
Wireless Communications and Mobile Computing Conference (IWCMC), pp.563-568.
29. [17] A. Wadaa, A., S. Olariu, S., L. Wilson, L., M. Eltoweissy, M. and K. Jones K..(2005)
‘Training a wireless sensor network’, Mobile networks and Applications, 10(1-2), 151-168,
2005.
[18] Bertossi, A. A., Olariu S., Pinotti M. C. (2008) ‘Efficient corona training protocols for
sensor networks’, Theoretical Computer Science, 402(1): 2-15.
[19] Olariu, S., Wadaa, A., Wilson, L. and Eltoweissy, M. (2004) ‘Wireless sensor networks:
leveraging the virtual infrastructure’. IEEE Network 18(4): 51-56.
[20] Howard, A., Mataric, M.J. and Sukhatme, G. S. (2002) ‘An Incremental Self-
Deployment Algorithm for Mobile Sensor Networks’, Autonomous Robots, Special Issue on
Intelligent Embedded Systems, 13(2), pp. 113-126.
[21] Tamoghna, O., Manas, M. and Studip M..(2013) ‘Tic-Tac-Toe-Arch: a self-organising
virtual architecture for Underwater Sensor Networks’. IET Wireless Sensor Systems, vo. 3,
Issue: 4, pp. 307- 316.
[22] Capella, J. V., Bonastre, A., Serrano, J. J. and Ors, R. (2009) ‘A New Robust, Energy-
efficient and Scalable Wireless Sensor Networks Architecture Applied to a Wireless Fire
Detection System’, International Conference on Wireless Networks and Information Systems,
WNIS '09. pp. 395 – 398.
[23] Miao, C., Dai, G., Zhao, X., Tang, Z. and Chen, Q (2014) ‘3D Self-Deployment
Algorithm in Mobile Wireless Sensor Networks’, In: Sun L., Ma H., Fang D., Niu J., Wang
W. (eds) Advances in Wireless Sensor Networks-CWSN 2014. pp. 27-41.
[24] Chen, J., Qian, H. (2014) ‘Three-dimensional deployment algorithm based on ideal fluid
dynamics model for mobile sensor networks’, Computer Modelling & New Technologies
18(9)12-18
[25] Huang, C-F., Tseng, Y-C. and Lo L-C. (2007) ‘The coverage problem in three-
dimensional wireless sensor networks’, Journal of Interconnection Networks, 8, Issue 03, p.
209.
[26] Langendoen, K.. and Reijers, N. (2003). ‘Distributed localization in wireless sensor
networks: A quantitative comparison’, Computer Network, 43(4), 499-518.
[27] Tanenbaum A. and Wetherall D. (2011) ‘Computer Networks’, Pearson Education, Inc/
Prentice Hall.
[28] WSNet, [online]. http://wsnet.gforge.inria.fr. (2016 ).
[29] A. Allirani, A. and M. Suganthi M.(2008) An energy sorting protocol (ESP) with low
energy and low latency in wireless sensor networks. International Journal of Computer
Science and Network Security, 8(11), pp. 208-214.