SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal on AdHoc Networking
Systems (IJANS)
ISSN : 2249 - 0175 [Online] ; 2249 - 2682 [Print]
Current Issue
April 2019, Volume 9, Number ½
http://airccse.org/journal/ijans/ijans.html
FRAMEWORK, IMPLEMENTATION AND ALGORITHM
FOR ASYNCHRONOUS POWER SAVING OF UWBMAC
WITH STEERABLE DIRECTIONAL ANTENNA IN MANETS
Murtala Muhammad1 , AbubakarGidadoHalilu2 and Sanusi Mohammed Bunu3
1Department of Computer Science, Adamawa State University, Mubi, Adamawa State,
Nigeria.
2 School of Computing, Science and Engineering, University of Salford, Manchester. M5
4WT
3Department of Computer Science, Adamawa State Polytechnic, Yola, Adamawa State,
Nigeria.
ABSTRACT
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile
Ad hoc Networks to conserve more energy in the system. This technique when combined
with other power saving systems like Ultra WideBand System and the use of Directional
antenna in MANETs provides astonishing result. In designing Medium Access Control
(MAC), developing a framework and giving a detailed implementation procedure are among
the factors that hinder the process; specifically in MANETs not to mention the Algorithm.
This paper aimed at exploring a standard framework, implementation procedure and
Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access
Control (UWB-MAC) in MANETs using directional antenna. An implementation procedure
that comprises of transmission, channelization, and receiver pattern of the Physical layer is
specified in this research work. The paper concludes with an algorithm for an Asynchronous
Power Saving UWB-MAC using a Steerable Directional antenna in MANETs.
KEYWORDS
MANETs, UWB-MAC, Asynchronous Power Saving, Steerable Directional Antenna
For More Details: http://aircconline.com/ijans/V9N2/9219ijans01.pdf
Volume Link: http://airccse.org/journal/ijans/ijans.html
REFERENCES:
[1] K. M. Thotahewa, J. Y. Khan, and M. R. Yuce, "Power efficient ultra wide band based wireless body area
networks with narrowband feedback path," IEEE Transactions on Mobile Computing, vol. 13,no. 8, pp. 1829-
1842, 2014.
[2] V. K. Sachan, S. A. Imam, and M. Beg, "Energy-efficient communication methods in wireless sensor
networks: A critical review," International Journal of Computer Applications, vol. 39, no. 17, 2012.
[3] V. Sharma and R. Kumar, "Cooperative frameworks and network models for flying ad hoc networks: a
survey," Concurrency and Computation: Practice and Experience, vol. 29, no. 4, p. e3931, 2017.
[4] D. Triantafyllopoulou, K. Moessner, M. Alam, A. Radwan, and J. Rodriguez, "Cognitive Means Smart:
Knowledge Saves Power," in Energy Efficient Smart Phones for 5G Networks: Springer, 2015, pp. 141-166.
[5] M. U. Anyaegbu, "Clock synchronisation for UWB and DECT communication networks," HeriotWatt
University, 2013.
[6] J. A. Stankovic and T. He, "Energy management in sensor networks," Phil. Trans. R. Soc. A, vol.370, no.
1958, pp. 52-67, 2012.
[7] P. Bahl, R. Chandra, T. Moscibroda, G. S. H. Narlanka, Y. Wu, and Y. Yuan, "Media access control(MAC)
protocol for cognitive wireless networks," ed: Google Patents, 2014.
[8] E. A. Jorswieck, L. Badia, T. Fahldieck, E. Karipidis, and J. Luo, "Spectrum sharing improves the network
efficiency for cellular operators," IEEE Communications Magazine, vol. 52, no. 3, pp. 129-136, 2014.
[9] S. K. Gupta and P. Sinha, "Overview of wireless sensor network: a survey," Telos, vol. 3, no. 15µW,p.
38mW, 2014.
[10] S. Sun, T. S. Rappaport, R. W. Heath, A. Nix, and S. Rangan, "MIMO for millimeter-wave wireless
communications: Beamforming, spatial multiplexing, or both?," IEEE Communications Magazine, vol. 52, no.
12, pp. 110-121, 2014.
[11] S. Varade and K. Kulat, "BER comparison of Rayleigh fading, Rician fading and AWGN channel using
chaotic communication based MIMO-OFDM system," International Journal of Soft Computing and
Engineering, vol. 1, no. 6, 2012.
[12] A. E. M. HAMZAH, "DISTRIBUTED MULTI-HOP RESERVATION SCHEME FOR WIRELESS
PERSONAL AREA ULTRA-WIDEBAND NETWORKS," 2018.
[13] X. Xu, T. Xia, A. Venkatachalam, and D. Huston, "Development of high-speed ultrawideband ground-
penetrating radar for rebar detection," Journal of Engineering Mechanics, vol. 139, no. 3, pp. 272-285, 2012.
[14] T. H. Nguyen, T. H. Nguyen, V. T. Tran, and B. G. T. Vu, "A scheme of dual carrier modulation with soft-
decoding for MB-OFDM MIMO systems," in Advanced Technologies for Communications (ATC), 2011
International Conference on, 2011, pp. 220-223: IEEE.

More Related Content

What's hot

Chapter 2 wireless sensor
Chapter 2 wireless sensorChapter 2 wireless sensor
Chapter 2 wireless sensorAhmed Tememe
 
Analysis of Energy in Wireless Sensor Networks An Assessment
Analysis of Energy in Wireless Sensor Networks An AssessmentAnalysis of Energy in Wireless Sensor Networks An Assessment
Analysis of Energy in Wireless Sensor Networks An Assessmentijtsrd
 
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...ijwmn
 
Java localization-based radio model calibration for fault-tolerant wireless ...
Java  localization-based radio model calibration for fault-tolerant wireless ...Java  localization-based radio model calibration for fault-tolerant wireless ...
Java localization-based radio model calibration for fault-tolerant wireless ...Ecway Technologies
 
Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...ijtsrd
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKJournal For Research
 
Modeling and Analysis of Energy Efficient Cellular Networks
Modeling and Analysis of Energy Efficient Cellular NetworksModeling and Analysis of Energy Efficient Cellular Networks
Modeling and Analysis of Energy Efficient Cellular Networksijtsrd
 
Wireless power transmission original ppt
Wireless power transmission original pptWireless power transmission original ppt
Wireless power transmission original pptmuk198
 
Review: Dual Band Microstrip Antennas for Wireless Applications
Review: Dual Band Microstrip Antennas for Wireless ApplicationsReview: Dual Band Microstrip Antennas for Wireless Applications
Review: Dual Band Microstrip Antennas for Wireless ApplicationsIJAAS Team
 

What's hot (18)

Chapter 2 wireless sensor
Chapter 2 wireless sensorChapter 2 wireless sensor
Chapter 2 wireless sensor
 
Analysis of Energy in Wireless Sensor Networks An Assessment
Analysis of Energy in Wireless Sensor Networks An AssessmentAnalysis of Energy in Wireless Sensor Networks An Assessment
Analysis of Energy in Wireless Sensor Networks An Assessment
 
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
 
Java localization-based radio model calibration for fault-tolerant wireless ...
Java  localization-based radio model calibration for fault-tolerant wireless ...Java  localization-based radio model calibration for fault-tolerant wireless ...
Java localization-based radio model calibration for fault-tolerant wireless ...
 
fibers
fibersfibers
fibers
 
Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...Performance Analysis of Different Combination of Mimo Antenna System using Di...
Performance Analysis of Different Combination of Mimo Antenna System using Di...
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...
 
464 & 489
464 & 489464 & 489
464 & 489
 
DANISHPPT123
DANISHPPT123DANISHPPT123
DANISHPPT123
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
 
L45016771
L45016771L45016771
L45016771
 
4 abstract
4 abstract4 abstract
4 abstract
 
Modeling and Analysis of Energy Efficient Cellular Networks
Modeling and Analysis of Energy Efficient Cellular NetworksModeling and Analysis of Energy Efficient Cellular Networks
Modeling and Analysis of Energy Efficient Cellular Networks
 
Indranil Acharya Resume
Indranil Acharya ResumeIndranil Acharya Resume
Indranil Acharya Resume
 
short cv
short cvshort cv
short cv
 
Wireless power transmission original ppt
Wireless power transmission original pptWireless power transmission original ppt
Wireless power transmission original ppt
 
Seminar pressentation
Seminar pressentationSeminar pressentation
Seminar pressentation
 
Review: Dual Band Microstrip Antennas for Wireless Applications
Review: Dual Band Microstrip Antennas for Wireless ApplicationsReview: Dual Band Microstrip Antennas for Wireless Applications
Review: Dual Band Microstrip Antennas for Wireless Applications
 

Similar to Current Issue-Table of Contents-April 2019, Volume 9, Number ½

ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSIAEME Publication
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSIAEME Publication
 
Design and implementation of grid based clustering in WSN using dynamic sink ...
Design and implementation of grid based clustering in WSN using dynamic sink ...Design and implementation of grid based clustering in WSN using dynamic sink ...
Design and implementation of grid based clustering in WSN using dynamic sink ...journalBEEI
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...IJECEIAES
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...IJECEIAES
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
 
Top 10 reseach articles for academia - International Journal of peer-to-peer ...
Top 10 reseach articles for academia - International Journal of peer-to-peer ...Top 10 reseach articles for academia - International Journal of peer-to-peer ...
Top 10 reseach articles for academia - International Journal of peer-to-peer ...ijp2p
 
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Smart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasipSmart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasipvilla1451
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachEswar Publications
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2prjpublications
 
3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)IAESIJEECS
 
Design And Analysis for Millimeter Wave Networks using Antenna Arrays
Design And Analysis for Millimeter Wave Networks using Antenna ArraysDesign And Analysis for Millimeter Wave Networks using Antenna Arrays
Design And Analysis for Millimeter Wave Networks using Antenna Arrayssanthoshkumarecegnit
 
IRJET- Isolation Enhancement of Miniaturized Mimo Antenna with Slotted Gr...
IRJET-  	  Isolation Enhancement of Miniaturized Mimo Antenna with Slotted Gr...IRJET-  	  Isolation Enhancement of Miniaturized Mimo Antenna with Slotted Gr...
IRJET- Isolation Enhancement of Miniaturized Mimo Antenna with Slotted Gr...IRJET Journal
 
An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...IJECEIAES
 
Reconfigurable antenna for research work
Reconfigurable antenna for research workReconfigurable antenna for research work
Reconfigurable antenna for research workpradeep kumar
 

Similar to Current Issue-Table of Contents-April 2019, Volume 9, Number ½ (20)

Ijetcas14 615
Ijetcas14 615Ijetcas14 615
Ijetcas14 615
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
 
Ijetcas14 615
Ijetcas14 615Ijetcas14 615
Ijetcas14 615
 
Design and implementation of grid based clustering in WSN using dynamic sink ...
Design and implementation of grid based clustering in WSN using dynamic sink ...Design and implementation of grid based clustering in WSN using dynamic sink ...
Design and implementation of grid based clustering in WSN using dynamic sink ...
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
 
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
 
Top 10 reseach articles for academia - International Journal of peer-to-peer ...
Top 10 reseach articles for academia - International Journal of peer-to-peer ...Top 10 reseach articles for academia - International Journal of peer-to-peer ...
Top 10 reseach articles for academia - International Journal of peer-to-peer ...
 
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Smart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasipSmart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasip
 
Green radio (final)
Green radio (final)Green radio (final)
Green radio (final)
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient Approach
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
 
3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)
 
Design And Analysis for Millimeter Wave Networks using Antenna Arrays
Design And Analysis for Millimeter Wave Networks using Antenna ArraysDesign And Analysis for Millimeter Wave Networks using Antenna Arrays
Design And Analysis for Millimeter Wave Networks using Antenna Arrays
 
IRJET- Isolation Enhancement of Miniaturized Mimo Antenna with Slotted Gr...
IRJET-  	  Isolation Enhancement of Miniaturized Mimo Antenna with Slotted Gr...IRJET-  	  Isolation Enhancement of Miniaturized Mimo Antenna with Slotted Gr...
IRJET- Isolation Enhancement of Miniaturized Mimo Antenna with Slotted Gr...
 
An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...
 
Reconfigurable antenna for research work
Reconfigurable antenna for research workReconfigurable antenna for research work
Reconfigurable antenna for research work
 

More from pijans

Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...pijans
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Networkpijans
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -pijans
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETpijans
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platformpijans
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...pijans
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXpijans
 

More from pijans (20)

Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Network
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routing
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANET
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platform
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Current Issue-Table of Contents-April 2019, Volume 9, Number ½

  • 1. International Journal on AdHoc Networking Systems (IJANS) ISSN : 2249 - 0175 [Online] ; 2249 - 2682 [Print] Current Issue April 2019, Volume 9, Number ½ http://airccse.org/journal/ijans/ijans.html
  • 2. FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBMAC WITH STEERABLE DIRECTIONAL ANTENNA IN MANETS Murtala Muhammad1 , AbubakarGidadoHalilu2 and Sanusi Mohammed Bunu3 1Department of Computer Science, Adamawa State University, Mubi, Adamawa State, Nigeria. 2 School of Computing, Science and Engineering, University of Salford, Manchester. M5 4WT 3Department of Computer Science, Adamawa State Polytechnic, Yola, Adamawa State, Nigeria. ABSTRACT Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc Networks to conserve more energy in the system. This technique when combined with other power saving systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing result. In designing Medium Access Control (MAC), developing a framework and giving a detailed implementation procedure are among the factors that hinder the process; specifically in MANETs not to mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control (UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of transmission, channelization, and receiver pattern of the Physical layer is specified in this research work. The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable Directional antenna in MANETs. KEYWORDS MANETs, UWB-MAC, Asynchronous Power Saving, Steerable Directional Antenna For More Details: http://aircconline.com/ijans/V9N2/9219ijans01.pdf Volume Link: http://airccse.org/journal/ijans/ijans.html
  • 3. REFERENCES: [1] K. M. Thotahewa, J. Y. Khan, and M. R. Yuce, "Power efficient ultra wide band based wireless body area networks with narrowband feedback path," IEEE Transactions on Mobile Computing, vol. 13,no. 8, pp. 1829- 1842, 2014. [2] V. K. Sachan, S. A. Imam, and M. Beg, "Energy-efficient communication methods in wireless sensor networks: A critical review," International Journal of Computer Applications, vol. 39, no. 17, 2012. [3] V. Sharma and R. Kumar, "Cooperative frameworks and network models for flying ad hoc networks: a survey," Concurrency and Computation: Practice and Experience, vol. 29, no. 4, p. e3931, 2017. [4] D. Triantafyllopoulou, K. Moessner, M. Alam, A. Radwan, and J. Rodriguez, "Cognitive Means Smart: Knowledge Saves Power," in Energy Efficient Smart Phones for 5G Networks: Springer, 2015, pp. 141-166. [5] M. U. Anyaegbu, "Clock synchronisation for UWB and DECT communication networks," HeriotWatt University, 2013. [6] J. A. Stankovic and T. He, "Energy management in sensor networks," Phil. Trans. R. Soc. A, vol.370, no. 1958, pp. 52-67, 2012. [7] P. Bahl, R. Chandra, T. Moscibroda, G. S. H. Narlanka, Y. Wu, and Y. Yuan, "Media access control(MAC) protocol for cognitive wireless networks," ed: Google Patents, 2014. [8] E. A. Jorswieck, L. Badia, T. Fahldieck, E. Karipidis, and J. Luo, "Spectrum sharing improves the network efficiency for cellular operators," IEEE Communications Magazine, vol. 52, no. 3, pp. 129-136, 2014. [9] S. K. Gupta and P. Sinha, "Overview of wireless sensor network: a survey," Telos, vol. 3, no. 15µW,p. 38mW, 2014. [10] S. Sun, T. S. Rappaport, R. W. Heath, A. Nix, and S. Rangan, "MIMO for millimeter-wave wireless communications: Beamforming, spatial multiplexing, or both?," IEEE Communications Magazine, vol. 52, no. 12, pp. 110-121, 2014. [11] S. Varade and K. Kulat, "BER comparison of Rayleigh fading, Rician fading and AWGN channel using chaotic communication based MIMO-OFDM system," International Journal of Soft Computing and Engineering, vol. 1, no. 6, 2012. [12] A. E. M. HAMZAH, "DISTRIBUTED MULTI-HOP RESERVATION SCHEME FOR WIRELESS PERSONAL AREA ULTRA-WIDEBAND NETWORKS," 2018. [13] X. Xu, T. Xia, A. Venkatachalam, and D. Huston, "Development of high-speed ultrawideband ground- penetrating radar for rebar detection," Journal of Engineering Mechanics, vol. 139, no. 3, pp. 272-285, 2012. [14] T. H. Nguyen, T. H. Nguyen, V. T. Tran, and B. G. T. Vu, "A scheme of dual carrier modulation with soft- decoding for MB-OFDM MIMO systems," in Advanced Technologies for Communications (ATC), 2011 International Conference on, 2011, pp. 220-223: IEEE.