Multi-hop routing protocol in cognitive radio mobile ad hoc networks (CRMANETs) is a critical issue. Furthermore, the routing metric used in multi-hop CRMANETs should reflect the bands availability, the links quality, the PU activities and quality of service (QoS) requirements of SUs. For the best of our knowledge, many of researchers investigated the performance of the different routing protocols in a homogeneous environment only. In this paper, we propose a heterogeneous cognitive radio routing protocol (HCR) operates in heterogeneous environment (i.e. the route from source to destination utilize the licensed and unlicensed spectrum bands). The proposed routing protocol is carefully developed to make a tradeoff between the channel diversity of the routing path along with the CRMANETs throughput. Using simulations, we discuss the performance of the proposed HCR routing protocol and compare it with the AODV routing protocol using a discrete-event simulation which we developed using JAVA platform.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVEditor IJMTER
Mobile Ad-hoc networks are a key in the evolution of wireless networks. In mobile
ad hoc networks, there is no centralized infrastructure to monitor or allocate the resources
used by the mobile nodes. The absence of any central coordinator makes the routing a
complex one compared to cellular networks. The Ad hoc On Demand Distance Vector
(AODV) routing algorithm is a routing protocol designed for ad hoc mobile devices. AODV
uses an on demand approach for finding routes .A class of routing protocols called ondemand protocols has recently found attention because of their low routing overhead. The ondemand protocols depend on query floods to discover routes whenever a new route is needed.
Such floods take up a substantial portion of network bandwidth. The routing in Mobile ad hoc
network is difficult and number of reactive routing protocols like AODV, DSR, and DSDV
has been implemented. In this paper, an attempt has been made to thoroughly study all
AODVs and a new AODV is proposed called AR-AODV
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
In Wireless Sensors Networks (WSN) based application, a large number of sensor devices must be deployed. Energy efficiency and network lifetime are the two most challenging issues in WSN. As a consequence, the main goal is to reduce the overall energy consumption using clustering protocols which have to ensure reliability and connectivity in large-scale WSN. This work presents a new clustering and routing algorithm based on the properties of the sensor networks. The main goal of this work is to extend the network lifetime via charge equilibration in the WSN. According to many errors with sensing devices and to have greater data accuracy, we use a quorum mechanism. The proposed algorithms are evaluated widely and the results are compared with related works. The experimental results show that the proposed algorithm provides an effective improvement in terms of energy consumption, data accuracy and network lifetime.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVEditor IJMTER
Mobile Ad-hoc networks are a key in the evolution of wireless networks. In mobile
ad hoc networks, there is no centralized infrastructure to monitor or allocate the resources
used by the mobile nodes. The absence of any central coordinator makes the routing a
complex one compared to cellular networks. The Ad hoc On Demand Distance Vector
(AODV) routing algorithm is a routing protocol designed for ad hoc mobile devices. AODV
uses an on demand approach for finding routes .A class of routing protocols called ondemand protocols has recently found attention because of their low routing overhead. The ondemand protocols depend on query floods to discover routes whenever a new route is needed.
Such floods take up a substantial portion of network bandwidth. The routing in Mobile ad hoc
network is difficult and number of reactive routing protocols like AODV, DSR, and DSDV
has been implemented. In this paper, an attempt has been made to thoroughly study all
AODVs and a new AODV is proposed called AR-AODV
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
In Wireless Sensors Networks (WSN) based application, a large number of sensor devices must be deployed. Energy efficiency and network lifetime are the two most challenging issues in WSN. As a consequence, the main goal is to reduce the overall energy consumption using clustering protocols which have to ensure reliability and connectivity in large-scale WSN. This work presents a new clustering and routing algorithm based on the properties of the sensor networks. The main goal of this work is to extend the network lifetime via charge equilibration in the WSN. According to many errors with sensing devices and to have greater data accuracy, we use a quorum mechanism. The proposed algorithms are evaluated widely and the results are compared with related works. The experimental results show that the proposed algorithm provides an effective improvement in terms of energy consumption, data accuracy and network lifetime.
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
The aim of equipping a wireless network with a mobile relay node is to support broadband wireless communications for vehicular users and their devices. The high mobility of vehicular users, possibly at a very high velocity in the area in which two cells overlap, could cause the network to suffer from a reduced handover success rate and, hence, increased radio link failure. The combined impact of these problems is service interruptions to vehicular users. Thus, the handover schemes are crucial in solving these problems. In this work, we first present the adaptive handover hysteresis scheme for the wireless network with mobile relay nodes in the high-speed train scenario. Specifically, our proposed adaptive hysteresis scheme is based on the velocity of the train. Second, the handover call dropping probability is reduced by introducing a modified call admission control scheme to support radio resource reservation for handover calls that prioritizes handover calls of mobile relay over the other calls. The proposed solution in which adaptive parameter is combined with call admission control is evaluated by system level simulation. Our simulation results illustrate an increased handover success rate and reduced radio link failures.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Performance Evaluation Cognitive Medium Access Control Protocolsijtsrd
A comprehensive study and an accurate comparison are introduced about what are the integrated features of medium access control protocols for cognitive radio ad hoc wireless networks. This study Also provides comparison of thirty medium access control protocols designs according to the mentioned features. Finally, we evaluate the performance of two systems for medium access control protocols common control multi channels cognitive medium access control protocol and non common control multi channels cognitive medium access control protocol using Network Simulator 2. This study shows the impact of increasing the packet size on the performance metrics such as network throughput and the packet delivery ratio. Simulation results prove that common control multi channels cognitive medium access control protocol outperforms non common control multi channels cognitive medium access control protocol in all aspects of performance metrics with increasing the packet size. Shimaa Abdzaher | Imane Saroit ""Performance Evaluation: Cognitive Medium Access Control Protocols"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29894.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/29894/performance-evaluation-cognitive-medium-access-control-protocols/shimaa-abdzaher
Improved aodv based on energy strength and dropping ratioIJLT EMAS
Wireless Sensor Networks are the latest trends in the
market due to the demand for communication and networking
among the wireless network devices. The routing protocols are
used in the Wireless Sensor Networks for efficient
communication of data between sensor nodes. The designs of
routing protocols in Wireless Sensor Networks are very concern
because they are influenced by many challenging factors. To
design the networks, the factors needed to be considered are the
coverage area, mobility, energy power consumption,
communication capabilities etc.. Broadcasting is an inevitable
operation in the route discovery phase of AODV protocol. A
probability based AODV is proposed, it uses nodes remaining
energy and threshold random delay to generate the
rebroadcasting of route request packet. The route request packet
of AODV is modified to gather nodes remaining energy strength.
The performance of probability based AODV is compared with
AODV over packet delivery fraction, normalized routing
overhead, delay and average acquisition latency.
NS-2 based simulator is used to evaluate the performance of
routing protocol.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
The aim of equipping a wireless network with a mobile relay node is to support broadband wireless communications for vehicular users and their devices. The high mobility of vehicular users, possibly at a very high velocity in the area in which two cells overlap, could cause the network to suffer from a reduced handover success rate and, hence, increased radio link failure. The combined impact of these problems is service interruptions to vehicular users. Thus, the handover schemes are crucial in solving these problems. In this work, we first present the adaptive handover hysteresis scheme for the wireless network with mobile relay nodes in the high-speed train scenario. Specifically, our proposed adaptive hysteresis scheme is based on the velocity of the train. Second, the handover call dropping probability is reduced by introducing a modified call admission control scheme to support radio resource reservation for handover calls that prioritizes handover calls of mobile relay over the other calls. The proposed solution in which adaptive parameter is combined with call admission control is evaluated by system level simulation. Our simulation results illustrate an increased handover success rate and reduced radio link failures.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Performance Evaluation Cognitive Medium Access Control Protocolsijtsrd
A comprehensive study and an accurate comparison are introduced about what are the integrated features of medium access control protocols for cognitive radio ad hoc wireless networks. This study Also provides comparison of thirty medium access control protocols designs according to the mentioned features. Finally, we evaluate the performance of two systems for medium access control protocols common control multi channels cognitive medium access control protocol and non common control multi channels cognitive medium access control protocol using Network Simulator 2. This study shows the impact of increasing the packet size on the performance metrics such as network throughput and the packet delivery ratio. Simulation results prove that common control multi channels cognitive medium access control protocol outperforms non common control multi channels cognitive medium access control protocol in all aspects of performance metrics with increasing the packet size. Shimaa Abdzaher | Imane Saroit ""Performance Evaluation: Cognitive Medium Access Control Protocols"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd29894.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/29894/performance-evaluation-cognitive-medium-access-control-protocols/shimaa-abdzaher
Improved aodv based on energy strength and dropping ratioIJLT EMAS
Wireless Sensor Networks are the latest trends in the
market due to the demand for communication and networking
among the wireless network devices. The routing protocols are
used in the Wireless Sensor Networks for efficient
communication of data between sensor nodes. The designs of
routing protocols in Wireless Sensor Networks are very concern
because they are influenced by many challenging factors. To
design the networks, the factors needed to be considered are the
coverage area, mobility, energy power consumption,
communication capabilities etc.. Broadcasting is an inevitable
operation in the route discovery phase of AODV protocol. A
probability based AODV is proposed, it uses nodes remaining
energy and threshold random delay to generate the
rebroadcasting of route request packet. The route request packet
of AODV is modified to gather nodes remaining energy strength.
The performance of probability based AODV is compared with
AODV over packet delivery fraction, normalized routing
overhead, delay and average acquisition latency.
NS-2 based simulator is used to evaluate the performance of
routing protocol.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
Routing in Cognitive Radio Networks - A SurveyIJERA Editor
Cognitive Radio Networks (CRNs) have been emerged as a revolutionary solution to migrate the spectrum
scarcity problem in wireless networks. Due to increasing demand for additional spectrum resources, CRNs have
been receiving significant research to solve issues related with spectrum underutilization. This technology
brings efficient spectrum usage and effective interference avoidance, and also brings new challenges to routing
in multi-hop Cognitive Radio Networks. In CRN, unlicensed users or secondary users are able to use
underutilized licensed channels, but they have to leave the channel if any interference is caused to the primary or
licensed users. So CR technology allows sharing of licensed spectrum band in opportunistic and non-interfering
manner. Different routing protocols have been proposed recently based on different design goals under different
assumptions.
A comparative study in wireless sensor networksijwmn
Sensor networks consist of a large number of small, low-powered wireless nodes with limited computation,
communication, and sensing abilities, in a battery-powered sensor network, energy and communication
bandwidth are a precious resources. Thus, there is a need to adapt the networking process to match the
application in order to minimize the resources consumed and extend the life of the network. In this paper,
we introduce a comparative study in different routing algorithms that propose vital solutions to the most
important issues that should be taken into account when designing wireless network which are reliability,
lifetime, communication bandwidth, transmission rand, and finally the limited energy issue, so we will
introduce their algorithms and discuss how did they propose to solve such of these challenges and finally
we will do some evaluation to each approach.
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...IJERA Editor
In present days the wireless communications are widely increases because of this reason spectrum utilization can be rapidly increased.For efficient usage of spectrum we can implement the Vacate on demand algorithm in different networks. CR users also need to sense the spectrum and vacate the channel upon the detection of the PU‟s presence to protectPUs from harmful interference. To achieve these fundamental CR functions, CR users usually coordinate with each other by using a common medium for control message exchange ensuring a priority of PUs over CR users. This paper presents the Vacate on Demand (VD) algorithm which enables dynamic spectrum access and ensures to vacate the assigned channel in case of PU activity and move the CR user to some other vacant channel to make spectrum available to PUs as well as to CR users. The basic idea is to use a ranking table of the available channels based on the PU activity detected on each channel. To improve the spectrum efficiency we can implement the Vacate on demand algorithm in MANET Network.
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary
network without the use of any existing network infrastructure or centralized administration. A
cognitive radio is a radio that can change its transmitter parameters based on interaction with
the environment in which it operates. The basic idea of cognitive radio networks is that the
unlicensed devices (cognitive radio users or secondary users) need to vacate the spectrum band
once the licensed device (primary user) is detected. Cognitive capability and reconfigurability
are the key characteristics of cognitive radio. Routing is an important issue in Mobile
Cognitive Radio Ad Hoc Networks (MCRAHNs). In this paper, a survey of routing protocols for
mobile cognitive radio ad networks is discussed.
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
We consider models of telecommunication systems that incorporate probability, dense real-time and data.
We present a new formal abstraction method for computing minimum and maximum reachability
probabilities for such models. Our approach uses strictly local formal abstract steps to reduce both the size
of abstract specifications generated and the complexity of operations needed, in comparison to previous
approaches of this kind. A selection of large case studies are implemented the techniques and evaluate,
which include some infinite-state probabilistic real time models, demonstrating improvements over existing
tools in several cases. The capacity of metro and access networks are extended the reach and split ratio of
the conventional Long - Reach Passive Optical Networks (LR-PONs). The efficient solutions of LR-PONs
are appeared in feeder distances around 100km and high split ratios up to 1000-way . Among many
existing approaches, one of the most effective options to improve network performance in LR-PONs are the
multi-thread based dynamic bandwidth allocation (DBA) scheme where several bandwidth allocation
processes are performed in parallel is considered. Without proper intercommunication between the
overlapped threads, multi-thread DBA may lose efficiency and even perform worse than the conventional
single thread algorithm. Real Time Probabilistic Systems are used to evaluate a typical PON systems
performance. This approach is more convenient, flexible, and lower cost than the former simulation method,
which do not need develop special hardware and software tools. Moreover, how changes in performance
depend on changes in the particular modes can be easily analysis by supplying ranges for parameter values.
The proposed algorithm with traditional DBA is compared, and shows its advantage on average packet
delay. The key parameters of the algorithm are analysed and optimized, such as initiating and tuning
multiple threads, inter -thread scheduling, and fairness among users. The algorithms advantage in
numerical results are decreased the average packet delay and improve network throughput under varying
offered loads.
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...csandit
In recent years, multi-channel multi-radio Wireless Mesh network has become one of the most important technologies in the evolution of next-generation networks. Its multi-hop, selforganization,self-healing and simple deployment is an effective way to solve the bottleneck problem of last mile. In this paper, we propose a new routing metric called WAEED, deployed in JCWAEED protocol, a joint channel assignment and weighted average expected end-to-end delay routing protocol which considers both interference suppression with factor IF and end-toend delay. Additionally, we give the exact calculation formula of transmission delay and queuing delay. Simulations results demonstrate that JCWAEED outperforms other joint design routing protocols in terms of throughput, end-to-end delay and packet loss rate.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding
environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in
volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks
(WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end
delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover
multipath and sending data via these different paths improve the bandwidth and decrease the end to end
delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive
multipath routing protocol establishing three paths with awareness of node’s residual energy and distance.
ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for
multimedia data in terms of end to end delay and packet delivery ratio.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
The present paper describes a novel Raspberry Pi and Arduino UNO architecture used as a meteorological station. One of the advantages of the proposed architecture is the huge quantity of sensors developed for its usage; practically one can find them for any application, and weather sensing is not an exception. The principle followed is to configure Raspberry as a collector for measures obtained from Arduino, transmitting occurs via USB; meanwhile, Raspberry broadcasts them via a web page. For such activity is possible thanks to Raspbian, a Linux-based operating system. It has a lot of libraries and resources available, among them Apache Web Server, that gives the possibility to host a web-page. On it, the user can observe temperature, humidity, solar radiance, and wind speed and direction. Information on the web-page is refreshed each five minute; however, measurements arrive at Raspberry every ten seconds. This low refreshment rate was determined because weather variables normally do not abruptly change. As an additional feature, system stores all information on the log file, this gives the possibility for future analysis and processing.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay. Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...ijdpsjournal
The key concern on the bandwidth allocation and scheduling for non real time traffic are the fulfillment of its minimum throughput requirement and improvement of bandwidth utilization with acceptable delay. This paper proposes a simple and efficient scheduling framework for allocating bandwidth to non real time
polling service (nrtPS) users in IEEE 802.16 networks. In this framework, jointly selective repeat ARQ at the MAC layer and adaptive modulation and coding techniques at the physical are considered. Numerical simulations demonstrate that the proposed scheduling approach provides a graceful compromise between bandwidth utilization and packet delivery delay while maintaining the minimum throughput requirements of nrtPS applications. Thus proves the efficiency of the proposed framework. The simulation is done for unicast scenario.
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...IJCNCJournal
This paper analyzes the performance of cooperative amplify-and-forward (CAF) relay networks that
employ adaptive M-ary quadrature amplitude modulation (M-QAM)/M-ary phase shift keying (M-PSK)
digital modulation techniques in Nakagami-m fading channel. In particular, we present and compared the
analysis of CAF relay networks with different cooperative diversity and opportunistic routing strategies
such as regular Maximal Ratio Combining (MRC), Selection Diversity Combining (SDC), Opportunistic
Relay Selection with Maximal Ratio Combining (ORS-MRC) and Opportunistic Relay Selection with
Selection Diversity Combining (ORS-SDC). We advocate a simple yet unified numerical approach based on
the marginal moment generating function (MGF) of the total received SNR to compute the average symbol
error rate (ASER), mean achievable spectral efficiency, and outage probability performance metrics.
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
The routing protocols play an important role in Mobile Ad-Hoc Network (MANET) because of the dynamically change of its topology. Optimized Link State Routing (OLSR), unawareness of Quality of Service (QoS) and power-consumed protocol, is an example of a widely-used routing protocol in MANET.
The Multi-Point Relays (MPR) selection algorithm is very crucial in OLSR. Therefore, firstly, we propose a heuristic method to select the best path based on two parameters; Bit Error Rate (BER) derived from the physical layer and Weighted Connectivity Index (CI) adopted from the network layer. This can be done via the cross-layer design scheme. This is anticipated to enhance the performance of OLSR, provide QoS
guarantee and improve the power consumption. The performances of the proposed scheme are investigated
by simulation of two types of traffics: CBR and VBR (MPEG-4), evaluated by metrics namely Throughput, Packet Delivery Ratio (PDR), Average End-to-End Delay, Control Overhead and Average Total Power Consumption.We compare our results with the typical OLSR and OLSR using only Weighted CI. It is
obvious that our proposed scheme provides superior performances to the typical OLSR and OLSR using only Weighted CI, especially, at high traffic load.
Similar to Design and analysis of routing protocol for cognitive radio ad hoc networks in Heterogeneous Environment (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 314 - 351
342
Routing protocols in traditional wireless multi-hop networks cannot be efficiently applied in CR
Mobile Networks (CRMNET) [5, 6]. To fully unleash the potentials of such networks, new challenges must
be addressed and solved at the network layer. In particular, effective routing metrics able to account for the
distinguishable properties of the CRMNET are needed [3, 7]. The routing metrics for CR can be classified
into two classes. 1) The metrics originally proposed for multi-channel environments and then adapted to CR
networks. 2) The metrics specifically designed for CR networks. In this paper, based on the expected busy
period of both the LCs and unlicensed channels (UCs), a new routing protocol based on the accumulative
expected busy period metric will be introduced in heterogeneous environment. Through simulations,
we highlight the performance of our proposed routing protocol and compare it to the previous works. The
remaining of the paper are organized as follows. In section 2, a related work is introduced. The system model
is illustrated in section 3. In section 4, the proposed HCR routing protocol is described. We evaluate the
performance of the proposed HCR routing protocol in section 5. Finally, the paper is concluded in section 6.
2. RELATED WORK
Most related researches of CRMNET are focused on the homogeneous environment [8]-[11]
(i.e. licensed spectrum only). A joint operation of a routing and a channel assignment has been already
proposed in many literature mainly based on the centralized approaches leveraging the graph theory. Delay
based routing has been proposed in [9, 12, 13], to achieve lower cumulative delay caused by channel
switching, queuing and collisions. However, the algorithm is under assumption that the node has the global
knowledge of the networks. In [12], a multi-radio multi-channel on-demand solution that is able to
effectively manage the transmission activities of cognitive and primary users in investigated. The routing
metric was carefully developed in order to provide a tradeoff between the channel diversity of the routing
path and the end-to-end delay. In [14], the authors were proposed a novel spectrum aware routing scheme
that is a distributed routing con- sidering some key characteristics of the cognitive radio mesh networks.
However, the routing metrics which used to select best route among all routes was chosen as a function of the
LC usage.
In [15], the authors proposed Opportunistic Service Differentiation outing Protocol (OSDRP).
The proposed OSDRP finds the minimum-delay maximum stability route in dynamic CRNs by considering
spectrum availability and queueing/switching delay across PU channels. Service differentiation is achieved
through power control and opportunistic routing. In that approach, the channel with the maximum expected
available transmission time is selected among all common available data channels. However, the quality of
the selected channel may be relatively bad. In other words, the transmission time of this channel may be
longer than its availability time, which may negatively affect the achieved CRMANET throughput.
In [16], the authors present the expected transmission count metric (ETX), which finds high-
throughput paths on multi-hop wireless networks. The ETX selects routes with knowledge of the delivery
ratios which is more pertinent information than the hop count metric, thus increasing the throughput and
improving the network utilization. However, ETX has the disadvantage of only considering the link loss rate
and not the link data transmission rate (related to the transmission delay). In [17], a new metric for routing in
multi-radio, multi-hop wireless networks is proposed. The proposed metric assigns weights to individual
links based on the Expected Trans-mission Time (ETT) of a packet over the link. However, the ETT metric
focus on wireless networks with stationary nodes, such as community wireless networks. In [18] and [19], the
authors categorized routing metrics into three types and derived new metrics of each type. By considering the
primary usage pattern and maximum CR link hold-time, they derived three new metrics MET, RH and
METRH to capture different end-to-end performances.
3. SYSTEM MODEL
3.1. Assumptions
In this paper, a distributed multi-hop CRMANET consisting of Np PUs and Ns SUs nodes is
assumed. Let Cp and Cs denoting the number of LCs and UCs respectively, where each channel has its own
infinite buffer. The buffer of a LC can hold both the PUs and SUs packets while the buffer of a UC can hold
the SU packets only. We assume that the PUs packets follow the first-come-first-served (FCFS) scheduling
policy. The PU has the preemptive priority to use the LC and can interrupt the transmission of the SU users.
In addition, each SU is equipped with a common control channel (CCC). The CCC is assumed to be
implemented through dedicated hardware with time sharing over the main transceiver hardware and used for
transmitting and receiving control messages (routing, spectrum sensing), where different data transceivers are
used for transmission and reception.
3. Int J Elec & Comp Eng ISSN: 2088-8708
Design and analysis of routing protocol for cognitive radio ad hoc networks… (Hassan Al-Mahdi)
343
3.2. Primary channel model
The LC is viewed as an ON-OFF random process, where a LC experiences a sequence of busy (ON)
and idle (OFF) periods. An ON busy period represents the corresponds LC is busy with a PU. An OFF idle
period represents the corresponds LC is idle and can be utilized by a SU.
3.3. Busy period analysis
In this section, the expected busy period of LC is derived. The analysis will likely be carried out in
steady state. Let the time axis is split into identical intervals named slots. Every single slot is exactly
equivalent to the transmitting time of a single packet. In each slot k = 0,1,2,3, …, either a random variable
(RV) patch A = 1,2,3, … of PU packets arrives at the buffer attached to the LC c , j = 1,2,3, ⋯ C , with
probability λ or not arrives with probability λ = 1 − λ . In other words, λ is the batch arrival rate of PU
packets at the LC c . The PU patch arrival at the LC is assumed to be Bernoulli process. Let a and A (z) be
the common distribution and the probability generating function (PGF) of A . That is, a = lim
→
Pr A = n
and 𝐴 (𝑧) = ∑ 𝑎 𝑧 . Let 𝐵 = 1,2,3, ⋯ be a RV denoting the busy period of the LC 𝑐 generated by a
given PU. Let 𝐵 (𝑧) = ∑ 𝑃 𝐵 = 𝑘 𝑧 be the PGF of 𝐵 . The busy period 𝐵 of the LC 𝑐 is started with
the arrival of nonzero batch of PU packets at that LC 𝑐 while it is in the OFF state. We call the packets of
this patch as "leading packets" and denotes it size by the RV 𝐿 = 1,2,3, …. All the PU packets arrivals at the
buffer of the LC 𝑐 are served using last come first service (LCFS) discipline. Note that, the service order has
no bearing on the distribution of the busy period. The first come first service (FCFS) and the LCFS
disciplines lead to the same result. Let us label the "leading packets" packets as 𝑝𝑘𝑡 , 𝑝𝑘𝑡 , 𝑝𝑘𝑡 , … , 𝑝𝑘𝑡 .
Let 𝑋 𝑖 = 1,2,3, … , 𝐿 be a RV denoting the service time of 𝑝𝑘𝑡 . Because of the LCFS order, all the PU
packets that arrive at the buffer while the 𝑝𝑘𝑡 in service will be served before 𝑝𝑘𝑡 . It is clear that, each
leading packet will generate its own sub-busy period. The sub-busy period generated by the packet 𝑝𝑘𝑡
consists of its service time plus the service time of all packets that arrive at the buffer of channel 𝑐 during its
service time. Let 𝑊 be a RV denoting the sub-busy period of the packet 𝑝𝑘𝑡 . The RVs 𝑊 𝑖 = 1,2,3, … , 𝐿
are identically independent distribution (iid) with the common distribution w and PGF W (z). The total
busy period B of the LC c is given as B = ∑ W . Let L (z) be the PGF of the RV L . In such case, the
PGF B (z) can be written as
𝐵 (𝑧) = 𝐸 𝑧 = 𝐸 𝑧∑
= 𝐿 𝑊 (𝑧)
(1)
The PGF of the RV L is related to the PGF A (z) as follows.
𝐿 (𝑧) =
∑ 𝑎 𝑧
1 − 𝑃𝑟 𝑎
=
∑ 𝑎 𝑧 − 𝑃𝑟 𝑎
1 − 𝑃𝑟 𝑎
=
𝐴 (𝑧) − 𝐴 (0)
1 − 𝐴 (0)
(2)
Substituting from (2) into (1), we get
𝐵 (𝑧) =
𝐴 𝑊 (𝑧) − 𝐴 (0)
1 − 𝐴 (0)
This gives
𝐴 𝑊 (𝑧) = 𝐵 (𝑧) 1 − 𝐴 (0) + 𝐴 (0) (3)
where i = 1,2,3, … , L and j = 1,2,3, ⋯ C. Now the expression of the PGF W (z) can be derived as follows.
The sub-busy period W of the pkt starts with service time X . While the the pkt is in service, a number of
PU packets arrive at the LC c . Let N be a RV denoting these packets. It is clear that, the value of N is
given as
𝑁 = 𝐴 (4)
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 314 - 351
344
where Φ = ∑ I is the number of batches that arrive at the LC c during the service time X and I = 0,1 is
an indicator RV denoting the number of PU patches that arrive at the LC c in the n the slot of X . Let us refer
to these N packets as "follower packets". Let us refer to the first packet of N as f and the second packet as
f and so on. Since of the LCFS discipline, all packets that arrive at the buffer of the LC c will be serviced
after f and before f . Hence, the packet f will generates its own a sub-busy period consists of its service time
plus the service times of all arrival packets during its service time. Let F be a RV denoting the sub-busy
period of the follower packets f . The other all the remaining follower packets will generate its own sub-busy
period F (n = 1,2,3, … N ) in similar fashion. The sub-busy periods F (n = 1,2,3, … N ) are iid RVs with
common PGF W (z). The sub-busy period F can be expressed as F = X + ∑ F and hence the PGF
W (z) can be written as
𝑊 (𝑧) = 𝐸[𝑧 ] = 𝐸 𝑧 ∑
= 𝐸 𝑧 𝑊 (𝑧)
Substituting for N from (4), we get
𝑊 (𝑧) = 𝐸 𝑧 𝑊 (𝑧)
∑
= 𝐸 𝑧 𝐴 𝑊 (𝑧)
By substituting for Φ, yields
𝑊 (𝑧) = 𝐸 𝑧 𝐴 𝑊 (𝑧)
∑
= 𝐸 𝑧 𝐼 𝐴 𝑊 (𝑧)
= 𝐸 𝑧𝐼 𝐴 𝑊 (𝑧) = 𝑋 𝑧𝐼 𝐴 𝑊 (𝑧)
(5)
Substituting from (3) into (5), we get
𝑊 (𝑧) = 𝐸 𝑧 𝐴 𝑊 (𝑧)
∑
= 𝑋 𝑧𝐼 𝐵 (𝑧) 1 − 𝐴 (0) + 𝐴 (0)
Substituting for W (z) into 1, yields
𝐵 (𝑧) = 𝐿 𝑋 𝑧𝐼 𝐵 (𝑧) 1 − 𝐴 (0) + 𝐴 (0)
Finally, substituting for L (z) from (2), yields the final expression of the PGF for the busy period of the LC c
as follows.
𝐵 (𝑧) =
𝐴 𝑋 𝑧𝐼 𝐵 (𝑧) 1 − 𝐴 (0) + 𝐴 (0) − 𝐴 (0)
1 − 𝐴 (0)
4. PROTOCOL DESCRIPTION
In this section, the description of the suggested HCR protocol is going to be presented depending on
the well known routing protocol AODV. First, we present our path metric after which we explained the HCR
protocol in details. In CRMANETs routing protocols, the route between a source and a destination of the SUs
needs to be selected within a robust method to ensure that the SUs’ traffic does not disrupt the PUs’ traffic.
For this propose, the routing mechanism must obtain the LCs occupancy information about the physical layer
and include the spectrum assignment inside the path selection so that the nodes would have to follow the
designated spectrum and path [20]. In this paper, the expected busy periods of the LCs are used as a metric to
determine if the idle LC will be included in the route between the source and destination of the SUs or not.
5. Int J Elec & Comp Eng ISSN: 2088-8708
Design and analysis of routing protocol for cognitive radio ad hoc networks… (Hassan Al-Mahdi)
345
4.1. Modified routing metric
The hop count routing metric employed by the AODV routing protocol does not take into account
the activity in the PUs [21]. Moreover, the busy period of a LC is not regarded in route discovery process.
As a result, a lot of the data packets are discarded because of the PU weighty usage of that LC. Therefore,
the expected busy period of the LC should be regarded while discovering the route. For simplicity, we are
going to refer to our expected busy period of time metric as EBP within the sequel. We have modified the
minimum hop count routing metric to consider the effect of the EBP in route discovery process, where a hop
count metric will be used for route selection only when all the available routes have equal EBP values.
For any two SUs communicating with each other, there should be one or more idle LC amongst their
respective readily available LCs sets. If there is several idle LCs between two SUs, the best LC should be
chosen according to channel selection metric. The channel choice metric EBP which suggested in this paper
is defined as the minimum value of the expected busy periods amongst of selected idle LCs sets by a SU.The
expression of EBP can be derived as follows. During each time slot, the SU labeled as 𝑙 = 1, 2, 3, …, 𝑁 will
select an idle LC 𝑐ℎ 𝑘 = 1, 2, 3, … , 𝐶 − 𝑖 with probability 𝑊 ,
given as
𝑊 ,
= 𝑃𝑟[𝑙 𝑠𝑒𝑙𝑒𝑐𝑡 𝑐ℎ ] =
1
𝐶 − 𝑖
, 𝑖 = 1,2,3, … , 𝐶
where i is the number of ongoing PUs. Let S be a RV denoting the number of idle LCs discovered by the SU
l. It is clear that the RVS has the following binomial distribution,
𝑃𝑟[𝑆 = 𝑗 ∣ 𝑃 = 𝑖] =
𝐶 − 𝑖
𝑗
𝑊 ,
1 − 𝑊 ,
where P be a RV denoting the PU system occupancy (i.e, the number of ongoing PUs) and j ≤ C − i.
During the route establishment process, when there are more than one idle LC discovered by the SU, the best
LC should be chosen based on the channel choice metric EBP according to the following expression
𝐸𝐵𝑃 = 𝑚𝑖𝑛 𝐸[𝐵 ], 𝐸[𝐵 ], … , 𝐸 𝐵 × 𝑃𝑟[𝑆 = 𝑗 ∣ 𝑃 = 𝑖]𝑃𝑟[𝑃 = 𝑖]
4.2. Spectrum sensing
A significant component of the suggested protocol is the spectrum sensing. A cognitive radio is
made to be aware of and sensitive to the changes in its environment. The spectrum sensing functionality is
utilized to recognize unused LCs [2]. Three strategies are often utilized for the transmitter detection
according to the hypothesis model. These three strategies are matched filter detection, energy detection and
cycle stationary feature. The coordination between both transceivers can be described as follows:
a. The SUs uses energy detection as a spectrum sensing technique to detect the idle LCs.
b. The SUs will inform other neighbors about the availability of these LCs during the route establishment
process.
4.3. Spectrum allocation
Spectrum allocation strategy should be efficient, because without efficient spectrum allocation the
routing protocol cannot perform well [4]. Every single node identifies the best possible spectrum band, as
well as the favored channels inside of that band during spectrum allocation phase. To enable this, we use the
proposed accumulative EBP metric combined with the number of hop count form source to destination.
Based on the gathered sensing information, the spectrum allocation data structures, residing in each node
(i.e. SU), make an adaptive decision on the order of operating LCs according to the activities of PUs in its
vicinity. Where each SU is equipped with data structures called Free Hopping Channel List (FHCL).
The FHCL data structure is used to record the list of all idle LCs and UCs list order. FHCL is predefined
sequences used by each SU to determine the order in which the free LCs and UCs are to be visited in the case
of suddenly appearance of the PU. This step can be done by applying the reactive channel selection strategy
is used [24]. In this strategy, SUs monitors the spectrum for PU activity and whenever PU activity is
detected, this information is passed to other SUs and then SUs switch to another available LC or UC
according to the sequences defined in the FHCL data structure. The UCs are randomly ordered and visited
after visiting all the LCs order list. The data structure for the FLCH at each node can be described as follows:
FLCH(i).type denotes the channel type, where its value is set to 1 for LC and 2 for UC. FLCH(i).priority
denotes the priority of the idle LC i. FLCH(i).subpriority denotes the priority of the LC i within the LCs set
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 314 - 351
346
with same EBP values. The visited order of the free LCs with the same priority are selected based on the
subpriority value. The priority of each LC is assigned based on the proposed EBP metric.
The LC with minimum expected busy period is given the highest priority. Figure 1-a illustrates a
simple example of a network topology with six PUs labeled as PU1 through PU2, where each PU operates on
different spectrum with different coverage area. Seven SUs, labeled as A through F, share spectrum with PUs.
The nodes A, B and C are within the same transmission range and share the UC 8. While nodes A and G are
within the same transmission range and share the UC 7. According to the FHCL data structure at node A in
Figure 1-a, the LCs with indices 1 and 3 have the same EBP values with FLCH(1).priority = 1 and
FLCH(3).priority = 1. In such case, the sub priorities of LCs 1 and 3 are chosen randomly using function
rand(1,2, … n), where n denotes the size of LCs set with same EBP values. In this example
FLCH(1).subpriority = rand(1,2) = 2 and FLCH(3).subpriority = rand(1,2) = 1. Since the LC number 6
has the highest value of EBP among the LCs 1, 3 and 6 then FLCH(6).priority = 3 and
FLCH(6).subpriority = 𝑟and(1) = 1. Thus the visited order of the free LCs will be 3, 1, 6, 7, 8. Beside the
FLCH data structure, each node contains a special field called Accumulative Expected Busy Period (AEBP).
This field contains the summation of EBP of all links which constitute the route from the current node to a
destination. The proposed routing protocol has three phases, namely neighbor discovery, route discovery and
route maintenance phase. The route discovery phase needs information of next-hop node and the data of LC
information of next-hop. Each of these phases is described in the subsequent sections.
4.4. Neighbor discovery
In this phase, we assume that, not all nodes within the transmission range of a given node are
neighbors. Only nodes with at least a common free LC with that node are considered to be neighbors.
The neighbor discovery phase in our protocol is similar to the neighbor discovery phase of AODV protocol
expect a few modifications are made to fit the requirement of our proposed protocol. On bootstrap process,
all SUs broadcast a ND_REQ message (as Hello message in AODV) with format: <source_ip, broadcast_ip,
FLCH> where broadcast_ip denoting the broadcast address of the network. Upon reception of ND_REQ
message, each SU within the transmission range of the sender node matches its FLCH with the FLCH
included in the received ND_REQ message. If there is at least one common free LC then it replies with
unicast ND_REP message to the sender in the following format: <source_ip, destination_ip, has_FLC>.
The field has_FLC = 1 if a neighbor has at least either a free common LC or UC with the source node.
Otherwise it set to 0. When a SU receives a ND_REP message it constructs its a neighbors table (i.e.,
precursors). This table containing the IP addresses of its neighbors that are likely to use it as a next hop
towards each destination. These precursors will receive notifications from the node on CCC in the case of
suddenly appearance of the PU on one of the common free LCs. Figure 1-b represents 4 SUs and 4 PUs
nodes. The SUs A, B, C and D are in the same transmission range. The primary users PU1, PU2, PU3 and
PU4 represent the available LCs 1, 2, 3 and 4 respectively with different transmission ranges. The LCs 3 and
4 are busy while the LCs 1 and 2 are idle. As shown in Figure 1-b, after the neighbor discovery step, the 4
SUs nodes have a list of neighbors that are likely to use it as a next hop. When state of any LC within the
transmission range of a given node is changed, a notification from that node will be sent to all its neighbors
on CCC. As a result, all its neighbors update their neighbor tables.
(a). The free hopping channel list of node A (b). The neighbor discovery process
Figure 1. Spectrum allocation and neighbor discovery process
7. Int J Elec & Comp Eng ISSN: 2088-8708
Design and analysis of routing protocol for cognitive radio ad hoc networks… (Hassan Al-Mahdi)
347
If the destination node within the transmission range of the source node then it negotiates with
destination node about the LCs and UCs FHS. To complete the negotiation process, the source node sends a
unicast RREQ message to the destination node. The RREQ message contains a special field called
REQ_type. If the destination node is a neighbor of the source node then the value of this field is 0. Otherwise,
its value is set to 1. In addition, a new field is added to the traditional RREQ message of the AODV to fit the
requirement of the cognitive radio environment. This field contains the FLCH at the source node. In such
case, source node transmits RREQ message to the destination with format: <source_ip, destination_ip,
FLCH, REG_type=0>. Upon receiving the RREQ message, the destination matches its FLCH with the FLCH
in the RREQ message. If there is still at least one common LC or UC then it replies with a Route Reply
(RREP) message to the source with format: <source_ip, destination_ip, FHS>, where FHS denoting the
hopping sequence data structure which contains all the common idle LCs ordered according to their priority
and subpriorty fields. In addition, it contains list of the common idle UCs at the end of the LCs order list.
A node disseminates a RREQ message with format: <source_ip, destination_ip, FLCH, REG_type=1>.
When it determines that it needs a route to a destination and does not have one available. This can
happen if the destination is previously unknown to the node, or if a previously valid route to the destination
expires or is marked as invalid [22]. In discover a route phase, unlike to the AODV routing protocol, a source
node multicasting a Route Request (RREQ) message to all the nodes in its neighbor table which constructed
in the neighbor discovery phase with has_FLC = 1. The reason for multicasting message is that the other SUs
neighbors nodes with has_FLC = 0 have no at least a common free idle with the source node. This strategy
will minimize the bandwidth consumed for establishing a route to a destination. The source node waits for a
certain amount of time for the arrival of RREP messages, otherwise the node considers the destination node
to be unreachable and drops the packet. If the source node receives a RREP message, then it updates the
routing table. The following changes are made to the routing RREQ and RREP mechanism within the AODV
routing protocol. On reception of RREQ message, all the neighbors of the source node follow these steps:
1. If a neighbor has forwarded this RREQ before from the source then it just drops it which resulted in the
loops avoidance.
2. If a neighbor has no an active route to the destination, it rebroadcasts the RREQ to its own neighbors after
increasing the hop count.
3. If it has an active route to the destination, then it compares its FLCH with the FLCH included in the
received RREQ message. Upon the comparison process, one of the following cases will be happens:
a. Case 1: If there is still at least one common free with the source node then it can respond to the RREQ
by unicasting a Route Reply (RREP) to the source node through the reverse path with following
format: ⟨source_ip, destination_ip, FHS, hop_count, AEBP⟩. As aforementioned, the field AEBP
contains the summation of EBP of all LCs links which constitute the route from the current node to a
destination. The current node updates its routing table by adding a valid route to the source node.
b. Case 2: If there is no at least one common free channel with the source node then it drops the RREQ
message.
4. If the source node receives multiple RREP then it selects one with the minimum value of the field AEBP.
If all route have the same value of field AEBP, then it selects the node with the minimum number of hops.
During the route discovery process, the collected information are stored in a tabular form in a node.
This table is called routing table. The information stored in the routing table includes the following data:
<destination_ip, next_hop, FHS, AEBPhop_count, sequence_number, TTL, lifetime>. The sequence number
is used to detect duplicate RREQ packets. TTL prevents RREQ packets from flooding through the network.
For each of the node in the network there is one entry in the table. The next_hop field specifies the IP address
of the next node of the path. The FHS specifies the frequency hopping sequence of the next hop node. The
sequence_no is included to avoid the looping of paths. The lifetime field indicates the period for which a path
is valid. As shown in Figure 2-a, there are three alternatives routes from node A to node S. When node A
receives the RREP messages from the nodes B, C and E, it selects the route via node B because this route has
the lowest AEBP values between the other routes. The routes via the nodes C and E are maintained in the
routing table as backup routes in the case of route failure. These routes are sorted based on the value of
AEBP and the hop count number.
4.5. Route maintenance
A route maintenance and recovery is far more complex in multi-hop CR ad hoc networks than that
in traditional multi-hop multi-channel ad hoc Networks (missing citation). As shown in Figure 2-b, when a
link between two nodes A and B is disconnected with the PU appearance, both nodes change to the second
free LC according to the FHS. If the second channel is busy, they switch to the third and so on. Should they
reach to the last LC in FHS list and that channel is busy, they search for the UCs in the FHS. If there is no
free channel in FHS, node A searches its routing table for another route to destination. If there is no route, the
session is ended and a RERR (Route Error) message is delivered to the source node. The later searches its
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 314 - 351
348
routing table for another route to destination or re-initiates RREQ if there is no route to the destination in its
routing table.
(a). Route discovery for node A (b). Route maintenance mechanism
Figure 2. The Process of route discovery and maintenance
5. SIMULATION ANS DISCUSSION
In this section, the performance of the proposed HCR protocol is evaluated through a simulation
study. We implement HCR via a discrete-event simulation which we developed using JAVA platform.
Figure 3 illustrates the network topology used in conducted simulation experiment. First, we illustrate th
simulation parameters. Second, we evaluate our HCR protocol through comparing it with the Ad hoc on-
demand distance vector (AODV) protocol.
Figure 3. Simulation network topology
5.1. Simulation parameters
In Figure 3, the simulation region is square with 300 × 300m , in which 10 SUs and 7 PUs are
randomly distributed. Four PU base stations (BSs) are installed to serve four different areas. Each BS utilizes
affixed number of LCs in random manner. In addition, each SU has set of data UCs shared with other SUs
within the same transmission range. We assume that each SU has always a packet with fixed-size to be send.
The packets at each SU is generated using ftp/TCP traffic model. The expected busy period of LCs are
calculated using the modified routing metric derived section 4.1.
9. Int J Elec & Comp Eng ISSN: 2088-8708
Design and analysis of routing protocol for cognitive radio ad hoc networks… (Hassan Al-Mahdi)
349
5.2. Simulation results
The performance of the proposed HCR routing protocol is evaluated in terms of number of failed
connections, link maintenance probability, number of successful connections and SU throughput. Figure 4-a
illustrates the number of successful connections against the PU traffic load. It is shown that the packet
number of successful connections of SUs decreases in both HCR and AODV protocols with increasing the
PU traffic load. Moreover, the proposed HCR protocol achieve higher number of successful connections
compared to the AODV routing protocol. Figure 4-b illustrates the number of failed connections against the
PU traffic load. In this Figure, when the homogeneous environment is used (i.e., LCs only), the number of
failed connection increases. On the other hand, when HCR protocol is used, the number of failed connection
increases but outperforms the performance of the AODV by 62%. Figures 5-a and 5-b illustrate SU
throughput (Kbps) against both the PU and SU traffic load respectively. To make a fair comparison between
HCR and AODV, we use the same number of channels for each protocol. However, the type of channel will
be different from one protocol to another. For AODV, 𝐶 = 10 and 𝐶 = 0 are used since this protocol
operates over the LCs only. For the HCR protocol, 𝐶 = 6 and 𝐶 = 4. The Figures illustrate that the
performance of the HCR protocol outperforms AODV in both PU and SU different traffic load. Finally,
Figures 6-a and 6-b show the maintenance in our experiments. In the HCR routing protocol, upon a node
detects a certain route becomes unavailable, it initiates a local routing process to maintain an alternative route
to the next hop. From the Figures, we note that the proposed HCR routing protocol outperforms the AODV
routing protocol in both fixed and variant the OU traffic load.
(a). Successful connections (b). Failure connections
Figure 4. Nnumber of successful and failure connections
(a). SU throughput versus the PU traffic load (b). SU throughput versus the SU traffic load
Figure 5. SU throughput versus the SU and PU traffic load
10. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 314 - 351
350
(a). SU link maintenance vrs. the PU traffic load (b). SU link maintenance vrs. the SU traffic load
Figure 6. Link maintenance versus diffrent users traffic load
6. CONCLUSION
In this paper, we developed the HCR routing protocol that formulates and selects stable route based
on both licensed and unlicensed spectrum to avoid the interruption of the SUs transmissions due to the
sudden appearance of the PUs in the CRMANETs. The details of the HCR and a transmission cost metric
based on the LCs busy period are introduced. A mathematical for the PU channel traffic and busy period are
introduced. Simulation experiments show that, the proposed HCR outperforms The AODV routing protocol
in terms of number of the failed connections, link maintenance probability delay, number of successful
connections and SU throughput. From the obtained results, we concluded that, using a combination of
channels from LCs and UCs in a route formulation is a better than using homogeneous spectrum
(i.e., LC only).
REFERENCES
[1] Simon Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE journal on selected areas in
communications, vol. 23, no. 2, pp. 201–220, 2005.
[2] Ian F Akyildiz, Won-Yeol Lee, Mehmet C Vuran, and Shantidev Mohanty, “Next generation/dynamic spectrum
access/cognitive radio wireless networks: A survey,” Computer networks, vol. 50, no. 13, pp. 2127–2159, 2006.
[3] Matteo Cesana, Francesca Cuomo, and Eylem Ekici, “Routing in cognitive radio networks: Challenges and solu-
tions,” Ad Hoc Networks, vol. 9, no. 3, pp. 228–248, 2011.
[4] Li, Shenghong, et al. “Spectrum Sensing for Cognitive Radios with Unknown Noise Variance and Time-variant
Fading Channels,” IEEE Access 5, pp. 21992-22003, 2017.
[5] Banerjee, Avik, Anal Paul, and Santi Prasad Maity. “Joint power allocation and route selection for outage mini-
mization in multihop cognitive radio networks with energy harvesting,” IEEE Transactions on Cognitive
Communications and Networking, 4.1, 82-92, 2018.
[6] Xu, Chi, et al. “End-to-end throughput maximization for underlay multi-hop cognitive radio networks with RF
energy harvesting,” IEEE Transactions on Wireless Communications 16.6, 3561-3572, 2017.
[7] Guirguis, Arsany, et al. “Primary User-aware Optimal Discovery Routing for Cognitive Radio Networks,” IEEE
Transactions on Mobile Computing, 2018.
[8] Geng Cheng, Wei Liu, Yunzhao Li, and Wenqing Cheng, “Spectrum aware on-demand routing in cognitive radio
networks,” in New Frontiers in Dynamic Spectrum Access Networks, 2007. DySPAN 2007. 2nd IEEE
International Symposium on, pp. 571–574. IEEE, 2007. pp. 603–609, 2016.
[9] Shih-Chun Lin and Kwang-Cheng Chen, “Spectrum aware opportunistic routing in cognitive radio networks,”
in Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, pp. 1–6. IEEE, 2010.
[10] Feilong ’Tang, Can Tang, Yanqin Yang, Laurence T Yang, Tong Zhou, Jie Li, and Minyi Guo, “Delay-minimized
routing in mobile cognitive networks for time-critical applications,” IEEE Transactions on Industrial Informatics,
vol. 13, no. 3, pp. 1398–1409, 2017.
[11] Wang, Jie, et al. “Spectrum-aware anypath routing in multi-hop cognitive radio networks,” IEEE Transactions on
Mobile Computing 16.4, 1176-1187, 2017.
11. Int J Elec & Comp Eng ISSN: 2088-8708
Design and analysis of routing protocol for cognitive radio ad hoc networks… (Hassan Al-Mahdi)
351
[12] Pin-Yu Chen, Shin-Ming Cheng, Weng Chon Ao, and Kwang-Cheng Chen, “Multi-path routing with end-to-end
statistical qos provisioning in underlay cognitive radio networks,” in Computer Communications Workshops
(INFOCOM WKSHPS), pp. 7–12. IEEE, 2011.
[13] Salameh, Haythem A. Bany, and Rawan El-Khatib. “Spectrum-Aware Routing in Full-Duplex Cognitive Radio
Networks: An Optimization Framework.” IEEE Systems Journal (2018).
[14] Geng Cheng, Wei Liu, Yunzhao Li, and Wenqing Cheng, “Joint on-demand routing and spectrum assignment in
cognitive radio networks,” ICC’07. IEEE International Conference on Communications, pp. 6499–6503, 2007.
[15] Kiam Cheng How, Maode Ma, and Yang Qin, “outing and qos provisioning in cognitive radio networks,”
Computer Networks, vol. 55, no. 1, pp. 330–342, 2011.
[16] Douglas SJ De Couto, Daniel Aguayo, John Bicket, and Robert Morris, “A high-throughput path metric for multi-
hop wireless routing,” Wireless networks, vol. 11, no. 4, pp. 419–434, 2005.
[17] Richard Draves, Jitendra Padhye, and Brian Zill, “Routing in multi-radio, multi-hop wireless mesh networks,” the
10th annual international conference on Mobile computing and networking, pp. 114–128. ACM, 2004.
[18] Marcello Caleffi, Ian F Akyildiz, and Luigi Paura, ”Opera: Optimal routing metric for cognitive radio ad hoc
networks,” IEEE Transactions on Wireless Communications, vol. 11, no. 8, pp. 2884–2894, 2012.
[19] Uzuki, Tsubasa, and Takeo Fujii. “Joint Routing and Spectrum Allocation for Multi-hop Inter-Vehicle Commu-
nication in Cognitive Radio Networks,” International Journal of Intelligent Transportation Systems Research 15.1
(2017): 39-49.
[20] Reddy, CV Subhaskara, M. V. Subramanyam, and P. Ramana Reddy. “Implementation and performance evalu-
ation of various multicast routing protocols in cognitive radio ad-hoc network: A performance review,” Wireless
Communications, Signal Processing and Networking (WiSPNET), 2017.
[21] Kaushik R Chowdhury and Ian F Akyildiz, “Crp: A routing protocol for cognitive radio ad hoc networks,” IEEE
Journal on Selected Areas in Communications, vol. 29, no. 4, pp. 794–804, 2011.
[22] Charles Perkins, Elizabeth Belding-Royer, and Samir Das. “Ad hoc on-demand distance vector (aodv) routing,”
tech. rep., 2003.
[23] Baoming Sun, Jianfeng Zhang, Wei Xie, Ning Li, and Youyun Xu, “A novel spectrum-aware routing protocol for
multi-hop cognitive radio ad hoc networks,” in Wireless Communications & Signal Processing (WCSP), 2012,
pp. 1–5, 2012.
[24] Payal Jadhav and Rachna Satao, “A survey on opportunistic routing protocols for wireless sensor networks,”
Procedia Computer Science, vol. 79, pp. 603–609, 2016.
BIOGRAPHIES OF AUTHORS
Hassan Al-Mahdi: He obtained BSc in Computing Science, MSc in Computer Science and PHD in
Wireless Networks from the Faculty of Science, Suez Canal University, Egypt in 1994, 2001 and 2005,
respectively. He is a Full Professor at the Faculty of Computer and Informatics, Suez Canal University,
Egypt. His researches are in fields of ad hoc networks, mobile cellular communications, cognitive radio
networks and the performance evaluation of computer networks. He has many international papers
mostly in the area of data communication performance evaluation of computer networks and
Cryptography. Currently, he is a associate professor at Jouf university, Suadi Arabia
Yasser Fouad: He obtained BSc in Computing Science, MSc in Computer Science and PHD in Wireless
Networks from the Faculty of Science, Suez Canal University, Egypt in 1994, 2003 and 2010,
respectively. He is a Full Assistance Professor at the Faculty of Computer and Informatics, Suez
University, Egypt. His researches are in fields of ad hoc networks and performance.