SlideShare a Scribd company logo
Effects of Location Awareness on Concurrent Transmissions for
Cognitive Ad Hoc Networks Overlaying Infrastructure-Based
Systems

(Synopsis)

8
ABSTRACT

Through wideband spectrum sensing, cognitive radio (CR) can identify
the opportunity of reusing the frequency spectrum of other wireless
systems. To save time and energy of wideband spectrum, we
investigate to what extent a CR system incorporating the location
awareness capability can establish a scanning-free region where a
peer-to-peer ad hoc network can overlay on an infrastructure-based
network. Based on the carrier sense multiple access with collision
avoidance (CSMA/CA) medium access control (MAC) protocol, the
concurrent transmission probability of a peer-to-peer connection and
an infrastructure-based connection is computed. It is shown that the
frequency band of the legacy system can be reused up to 45 percent
by the overlaying cognitive ad hoc network when CR users have the
location information of the primary and secondary users.

8
OBJECTIVE OF THE PROJECT
EXISTING SYSTEM

The existing things are consider the coexistence issue of the hybrid
infrastructure-based and overlaying ad hoc networks has been
addressed but in different scenarios. The idea of combining ad hoc link
and infrastructure based link was proposed mainly to extend the
coverage area of the infrastructure-based network. That is, the
coverage area of ad hoc networks is not overlapped with that of the
infrastructure-based

network.

In

the

present

hybrid

ad

hoc/infrastructure-based network, which maintain the peer-to-peer
cognitive radio (CR) users are located within the coverage area of the
existing legacy wireless network. In this, to further improve the
throughput of a wireless local area network (WLAN), it was suggested
that an access point (AP) could dynamically switch between the
infrastructure mode and the ad hoc mode.

8
PROPOSED SYSTEM

In this project, we are trying to provide the basic idea of utilizing
location awareness to facilitate frequency sharing in a concurrent
transmission manner. Specific achievements are summarized in the
following:
•

We are going to show that a CR device having location
information of other nodes can concurrently transmit a peer-topeer data in the presence of an infrastructure based connection
in some region. We also dimension the concurrent transmission
(or the scanning-free) region for CR users. Nevertheless, the
wideband spectrum sensing procedure is still needed but is
initiated only when the CR user is outside the concurrent
transmission region. Therefore, the energy consumption of CR
systems with location awareness capability can be reduced
significantly.

•

Based on the CSMA/CA MAC protocol, a physical/MAC cross-layer
analytical model is developed to compute the coexistence
probability of a peer-to-peer connection and an infrastructurebased connection. Based on this analytical model, we find that
concurrent transmission of the secondary CR users and the
primary users in the legacy system can significantly enhance the
total throughput over the pure legacy system.

8
INTRODUCTION
FEASIBILITY STUDY

All projects are feasible given unlimited resources and infinite
time. But the development of software is plagued by the scarcity of
resources and difficult delivery rates. It is both necessary and prudent
to evaluate the feasibility of a project at the earliest possible time.
Three key considerations are involved in the feasibility analysis.
Economic Feasibility:
This procedure is to determine the benefits and savings that are
expected from a candidate system and compare them with costs. If
benefits outweigh costs, then the decision is made to design and
implement the system.

Otherwise, further justification or alterations

in proposed system will have to be made if it is to have a chance of
being approved. This is an ongoing effort that improves in accuracy at
each phase of the system life cycle.
Technical Feasibility:
Technical feasibility centers on the existing computer system
(hardware, software, etc.,) and to what extent it can support the
proposed addition. If the budget is a serious constraint, then the
project is judged not feasible.
Operational Feasibility:
People are inherently resistant to change, and computers have been
known to facilitate change. It is understandable that the introduction

8
of a candidate system requires special effort to educate, sell, and train
the staff on new ways of conducting business.

ALGORITHM & EXPLANATION

The above figure is an illustrative example for the coexistence of two CR devices establishing a peer-topeer ad hoc link and a primary user connecting to the infrastructure-based network, where all the devices
(MS1, MS2, and MS3) use the same spectrum simultaneously.

The above figure illustrates a hybrid ad hoc/infrastructure-based
network consisting of two CR devices (MS1 and MS2) and a primary
user MS3. Assume that the secondary CR users MS1 and MS2 try to
make a peer-to-peer connection, and the n primary user MS3 has been
connected to the base station (BS) or AP of the legacy infrastructurebased system. In the figure, MS1, MS2, and MS3 are located at (r1,
θ1), (r2, θ2), and (r3, θ3), respectively; the coverage area of the BS
is πr2. All the primary and secondary users stay fixed or hardly move.
We assume that the CR devices can perform the positioning technique
to acquire their relative or absolute position by using GPS or detecting

8
the signal strength from the BSs of legacy systems. The location
information is broadcasted by using the geographical routing protocols.
Although both the positioning and geographical routing may waste
time and consume energy, they have no need to be processed for
every data transmission. They are only performed when a new node
joins or the node changes its position. Furthermore, with the help of
upper layers, the location information is already stored in the device.
Therefore, compared to the spectrum sensing at every transmission,
we believe that the additional energy consumption and memory space
due to the positioning and location update is relatively small.
Based on the CSMA/CA MAC protocol, multiple users contend the
channel, and only one mobile station within the coverage of the BS can
establish an infrastructure-based communication link at any instant. To
set up an extra peer to peer ad hoc connection in the same frequency
band of the primary user, the secondary users not only require
ensuring that the current infrastructure-based link quality cannot be
degraded but also has to win the contentions between other feasible
secondary users. Here, we consider that both primary and secondary
users have identical transmit power. It is reasonable to assume that
only one secondary user can establish a link after the contention at
one instance due to the similar interference range. Denote SIRi and
SIRa as the received signal-to-interference ratios (SIRs) of the
infrastructure-based and ad hoc links, respectively.
Then, we can define the coexistence (or concurrent transmission)
probability (PCT) of the infrastructure-based link and CR-based ad hoc
link in an overlapped area as follows:

8
Where zi and za are the required SIR thresholds for the infrastructurebased and ad hoc links, respectively. To obtain the concurrent
transmission region, it is crucial to calculate the coexistence probability
of both the infrastructure and ad hoc links. If the link quality of the
primary user cannot be guaranteed, CR devices have to sense and
change to other frequency bands.
We consider the two-ray ground reflection model in which there exist
two paths between the transmitter and receiver. One is the line-ofsight, and the other is reflected from ground. Thus, the received power
can be written as

Where Pr and Pt are the received and transmitted power levels at a
mobile station, respectively; hbs and hms represent the antenna heights
of the BS and the mobile station, respectively; Gbs and Gms stand for
the antenna gains of the BS and the mobile station, respectively; r is
the distance between the transmitter and receiver; α is the path loss
exponent; and 10ξ/10 is the logs normally distributed shadowing
component.

In our project, we are going to create an environment as a base
station, some cognitive radios and some users. We are going to place
some video frames in the base station for simulating the concept
overlaying. Whenever, the user wants to retrieve a file with the carrier
frequency through cognitive radios. For each GUI window as consider
as a system. Also we will monitor the status of every cognitive radio.
Software Requirements:

8
# OPERATING SYSTEM

:

Windows XP

# TECHNOLOGY

:

J2SDK1.4.1

And

above

Hardware Requirements:

# PROCESSOR

:

Pentium III

# CLOCK SPEED

:

550 MHz

# HARD DISK

:

20GB

# RAM

:

128MB

# CACHE MEMORY
# OPERAING SYSEM

:
:

512KB
Windows

2000

Professional
# MONITOR

:

Color Monitor

# KEYBOARD

:

104Keys

# MOUSE

:

3Buttons

MODULE DESCRIPTION

8
 Base Station:

Cognitive device must be able to detect

very reliably whether it is far enough away from a primary
base station and/or whether this primary base station is
silent at a given point in time. For an individual detector
this is very difficult due to different radio propagation
paths and it may need to sense primary user signals
buried deep under the noise floor.
 Cognitive Radio:

A cognitive radio transceiver is able to

adapt to the dynamic radio environment and the network
parameters to maximize the utilization of the limited radio
resources while providing flexibility in wireless access. In
this project, we show that a CR device having location
information of other nodes can concurrently transmit a
peer-to-peer data in the presence of an infrastructure
based connection in some region. We also dimension the
concurrent transmission (or the scanning-free) region for
CR users. Note that a concurrent transmission region of a
CR system is equivalent to a scanning-free region. A
Cognitive Radio is a radio that can change its transmitter
parameters based on interaction with the environment in
which it operates.
 Users: The identity of the users of radios who wish to join
a network needs to be assured. In the CSMA/CA MAC
protocol, multiple users contend the channel, and only one
mobile station within the coverage of the BS can establish
an infrastructure-based communication link at any instant.
To set up an extra peer-to-peer ad hoc connection in the

8
same frequency band of the primary user, the secondary
users

not

only

require

ensuring

that

the

current

infrastructure-based link quality cannot be degraded but
also has to win the contentions between other feasible
secondary users. Here, we consider that both primary and
secondary users have identical transmit power. It is
reasonable to assume that only one secondary user can
establish a link after the contention at one instance due to
the similar interference range.

 Multimedia frames: Wireless multimedia applications
require significant bandwidth and often have to satisfy
relatively tight delay constraints. Radio spectrum is a
scarce resource. Limited available bandwidth is considered
one of the major bottlenecks for high-quality multimedia
wireless services. A reason for this is the fact that a major
portion of the spectrum has already been allocated. On the
other hand, actual measurements taken on the 0–6 GHz
band and other spectrum occupancy measurements on
licensed bands, such as TV bands, show the significant
under utilization of the spectrum. Since Cognitive Radio
can operate in different frequency bands which provides
multimedia services.

8

More Related Content

What's hot

M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
Vijay Karan
 
J1102026164
J1102026164J1102026164
J1102026164
IOSR Journals
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
IJARIIT
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Performance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay StationPerformance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay Station
idescitation
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
Eswar Publications
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
Mukundhan Elumalai
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocol
chirag bhatt
 
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
CSCJournals
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
eSAT Journals
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
cscpconf
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
IOSRJECE
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
szhb
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
IEEEGLOBALSOFTTECHNOLOGIES
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
eSAT Journals
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
Vijay Karan
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projects
Vijay Karan
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
IEEEGLOBALSOFTTECHNOLOGIES
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETS
IJCNCJournal
 

What's hot (20)

M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
 
J1102026164
J1102026164J1102026164
J1102026164
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Performance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay StationPerformance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay Station
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocol
 
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
 
40520130101003
4052013010100340520130101003
40520130101003
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projects
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETS
 

Viewers also liked

One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)Mumbai Academisc
 
Web based development
Web based developmentWeb based development
Web based development
Mumbai Academisc
 
An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)Mumbai Academisc
 
Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Mumbai Academisc
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
Mumbai Academisc
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Mumbai Academisc
 
Engineering
EngineeringEngineering
Engineering
Mumbai Academisc
 
Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)Mumbai Academisc
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 
Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)Mumbai Academisc
 
Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Mumbai Academisc
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
Mumbai Academisc
 
Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...Mumbai Academisc
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Mumbai Academisc
 
Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Mumbai Academisc
 
A geometric approach to improving active packet loss measurement(synopsis)
A geometric approach to improving active packet loss measurement(synopsis)A geometric approach to improving active packet loss measurement(synopsis)
A geometric approach to improving active packet loss measurement(synopsis)Mumbai Academisc
 
Noise reduction by fuzzy image filtering(synopsis)
Noise reduction by fuzzy image filtering(synopsis)Noise reduction by fuzzy image filtering(synopsis)
Noise reduction by fuzzy image filtering(synopsis)Mumbai Academisc
 
Multiple routing configurations for fast ip network recovery(synopsis)
Multiple routing configurations for fast ip network recovery(synopsis)Multiple routing configurations for fast ip network recovery(synopsis)
Multiple routing configurations for fast ip network recovery(synopsis)Mumbai Academisc
 

Viewers also liked (18)

One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)
 
Web based development
Web based developmentWeb based development
Web based development
 
An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)
 
Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)
 
Engineering
EngineeringEngineering
Engineering
 
Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)
 
Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)
 
A geometric approach to improving active packet loss measurement(synopsis)
A geometric approach to improving active packet loss measurement(synopsis)A geometric approach to improving active packet loss measurement(synopsis)
A geometric approach to improving active packet loss measurement(synopsis)
 
Noise reduction by fuzzy image filtering(synopsis)
Noise reduction by fuzzy image filtering(synopsis)Noise reduction by fuzzy image filtering(synopsis)
Noise reduction by fuzzy image filtering(synopsis)
 
Multiple routing configurations for fast ip network recovery(synopsis)
Multiple routing configurations for fast ip network recovery(synopsis)Multiple routing configurations for fast ip network recovery(synopsis)
Multiple routing configurations for fast ip network recovery(synopsis)
 

Similar to Effects of location awareness on concurrent transmissions for cognitive ad hoc networks overlayin(synopsis)

Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
IJECEIAES
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
IJSRD
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
Vijay Karan
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projects
Vijay Karan
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
cscpconf
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
Vijay Karan
 
Execution Evaluation of Routing Protocols for Cognitive Radio Network
	Execution Evaluation of Routing Protocols for Cognitive Radio Network	Execution Evaluation of Routing Protocols for Cognitive Radio Network
Execution Evaluation of Routing Protocols for Cognitive Radio Network
IJSRED
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
Nexgen Technology
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
IJCNCJournal
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
IJCNCJournal
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
Nexgen Technology
 
Air Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsAir Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM Configurations
Malik Saad
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velachery
Senthilvel S
 
Performance Evaluation Cognitive Medium Access Control Protocols
Performance Evaluation Cognitive Medium Access Control ProtocolsPerformance Evaluation Cognitive Medium Access Control Protocols
Performance Evaluation Cognitive Medium Access Control Protocols
ijtsrd
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networks
IJCNCJournal
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
IRJET Journal
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
IJCNCJournal
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
IJSRED
 
Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...
tsysglobalsolutions
 
Enhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems usingEnhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems using
eSAT Publishing House
 

Similar to Effects of location awareness on concurrent transmissions for cognitive ad hoc networks overlayin(synopsis) (20)

Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projects
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 
Execution Evaluation of Routing Protocols for Cognitive Radio Network
	Execution Evaluation of Routing Protocols for Cognitive Radio Network	Execution Evaluation of Routing Protocols for Cognitive Radio Network
Execution Evaluation of Routing Protocols for Cognitive Radio Network
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
Air Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsAir Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM Configurations
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velachery
 
Performance Evaluation Cognitive Medium Access Control Protocols
Performance Evaluation Cognitive Medium Access Control ProtocolsPerformance Evaluation Cognitive Medium Access Control Protocols
Performance Evaluation Cognitive Medium Access Control Protocols
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networks
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
 
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksPerformance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio Networks
 
Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...
 
Enhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems usingEnhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems using
 

More from Mumbai Academisc

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
Mumbai Academisc
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
Mumbai Academisc
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
Mumbai Academisc
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
Mumbai Academisc
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
Mumbai Academisc
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
Mumbai Academisc
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
Mumbai Academisc
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
Mumbai Academisc
 
Spring ppt
Spring pptSpring ppt
Spring ppt
Mumbai Academisc
 
Ejb notes
Ejb notesEjb notes
Ejb notes
Mumbai Academisc
 
Java web programming
Java web programmingJava web programming
Java web programming
Mumbai Academisc
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
Mumbai Academisc
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
Mumbai Academisc
 
Jdbc
JdbcJdbc
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
Mumbai Academisc
 
Jsp
JspJsp
Project list
Project listProject list
Project list
Mumbai Academisc
 
Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Mumbai Academisc
 
Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Mumbai Academisc
 

More from Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Jsp
JspJsp
Jsp
 
Project list
Project listProject list
Project list
 
Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...
 
Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 

Effects of location awareness on concurrent transmissions for cognitive ad hoc networks overlayin(synopsis)

  • 1. Effects of Location Awareness on Concurrent Transmissions for Cognitive Ad Hoc Networks Overlaying Infrastructure-Based Systems (Synopsis) 8
  • 2. ABSTRACT Through wideband spectrum sensing, cognitive radio (CR) can identify the opportunity of reusing the frequency spectrum of other wireless systems. To save time and energy of wideband spectrum, we investigate to what extent a CR system incorporating the location awareness capability can establish a scanning-free region where a peer-to-peer ad hoc network can overlay on an infrastructure-based network. Based on the carrier sense multiple access with collision avoidance (CSMA/CA) medium access control (MAC) protocol, the concurrent transmission probability of a peer-to-peer connection and an infrastructure-based connection is computed. It is shown that the frequency band of the legacy system can be reused up to 45 percent by the overlaying cognitive ad hoc network when CR users have the location information of the primary and secondary users. 8
  • 3. OBJECTIVE OF THE PROJECT EXISTING SYSTEM The existing things are consider the coexistence issue of the hybrid infrastructure-based and overlaying ad hoc networks has been addressed but in different scenarios. The idea of combining ad hoc link and infrastructure based link was proposed mainly to extend the coverage area of the infrastructure-based network. That is, the coverage area of ad hoc networks is not overlapped with that of the infrastructure-based network. In the present hybrid ad hoc/infrastructure-based network, which maintain the peer-to-peer cognitive radio (CR) users are located within the coverage area of the existing legacy wireless network. In this, to further improve the throughput of a wireless local area network (WLAN), it was suggested that an access point (AP) could dynamically switch between the infrastructure mode and the ad hoc mode. 8
  • 4. PROPOSED SYSTEM In this project, we are trying to provide the basic idea of utilizing location awareness to facilitate frequency sharing in a concurrent transmission manner. Specific achievements are summarized in the following: • We are going to show that a CR device having location information of other nodes can concurrently transmit a peer-topeer data in the presence of an infrastructure based connection in some region. We also dimension the concurrent transmission (or the scanning-free) region for CR users. Nevertheless, the wideband spectrum sensing procedure is still needed but is initiated only when the CR user is outside the concurrent transmission region. Therefore, the energy consumption of CR systems with location awareness capability can be reduced significantly. • Based on the CSMA/CA MAC protocol, a physical/MAC cross-layer analytical model is developed to compute the coexistence probability of a peer-to-peer connection and an infrastructurebased connection. Based on this analytical model, we find that concurrent transmission of the secondary CR users and the primary users in the legacy system can significantly enhance the total throughput over the pure legacy system. 8
  • 5. INTRODUCTION FEASIBILITY STUDY All projects are feasible given unlimited resources and infinite time. But the development of software is plagued by the scarcity of resources and difficult delivery rates. It is both necessary and prudent to evaluate the feasibility of a project at the earliest possible time. Three key considerations are involved in the feasibility analysis. Economic Feasibility: This procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system. Otherwise, further justification or alterations in proposed system will have to be made if it is to have a chance of being approved. This is an ongoing effort that improves in accuracy at each phase of the system life cycle. Technical Feasibility: Technical feasibility centers on the existing computer system (hardware, software, etc.,) and to what extent it can support the proposed addition. If the budget is a serious constraint, then the project is judged not feasible. Operational Feasibility: People are inherently resistant to change, and computers have been known to facilitate change. It is understandable that the introduction 8
  • 6. of a candidate system requires special effort to educate, sell, and train the staff on new ways of conducting business. ALGORITHM & EXPLANATION The above figure is an illustrative example for the coexistence of two CR devices establishing a peer-topeer ad hoc link and a primary user connecting to the infrastructure-based network, where all the devices (MS1, MS2, and MS3) use the same spectrum simultaneously. The above figure illustrates a hybrid ad hoc/infrastructure-based network consisting of two CR devices (MS1 and MS2) and a primary user MS3. Assume that the secondary CR users MS1 and MS2 try to make a peer-to-peer connection, and the n primary user MS3 has been connected to the base station (BS) or AP of the legacy infrastructurebased system. In the figure, MS1, MS2, and MS3 are located at (r1, θ1), (r2, θ2), and (r3, θ3), respectively; the coverage area of the BS is πr2. All the primary and secondary users stay fixed or hardly move. We assume that the CR devices can perform the positioning technique to acquire their relative or absolute position by using GPS or detecting 8
  • 7. the signal strength from the BSs of legacy systems. The location information is broadcasted by using the geographical routing protocols. Although both the positioning and geographical routing may waste time and consume energy, they have no need to be processed for every data transmission. They are only performed when a new node joins or the node changes its position. Furthermore, with the help of upper layers, the location information is already stored in the device. Therefore, compared to the spectrum sensing at every transmission, we believe that the additional energy consumption and memory space due to the positioning and location update is relatively small. Based on the CSMA/CA MAC protocol, multiple users contend the channel, and only one mobile station within the coverage of the BS can establish an infrastructure-based communication link at any instant. To set up an extra peer to peer ad hoc connection in the same frequency band of the primary user, the secondary users not only require ensuring that the current infrastructure-based link quality cannot be degraded but also has to win the contentions between other feasible secondary users. Here, we consider that both primary and secondary users have identical transmit power. It is reasonable to assume that only one secondary user can establish a link after the contention at one instance due to the similar interference range. Denote SIRi and SIRa as the received signal-to-interference ratios (SIRs) of the infrastructure-based and ad hoc links, respectively. Then, we can define the coexistence (or concurrent transmission) probability (PCT) of the infrastructure-based link and CR-based ad hoc link in an overlapped area as follows: 8
  • 8. Where zi and za are the required SIR thresholds for the infrastructurebased and ad hoc links, respectively. To obtain the concurrent transmission region, it is crucial to calculate the coexistence probability of both the infrastructure and ad hoc links. If the link quality of the primary user cannot be guaranteed, CR devices have to sense and change to other frequency bands. We consider the two-ray ground reflection model in which there exist two paths between the transmitter and receiver. One is the line-ofsight, and the other is reflected from ground. Thus, the received power can be written as Where Pr and Pt are the received and transmitted power levels at a mobile station, respectively; hbs and hms represent the antenna heights of the BS and the mobile station, respectively; Gbs and Gms stand for the antenna gains of the BS and the mobile station, respectively; r is the distance between the transmitter and receiver; α is the path loss exponent; and 10ξ/10 is the logs normally distributed shadowing component. In our project, we are going to create an environment as a base station, some cognitive radios and some users. We are going to place some video frames in the base station for simulating the concept overlaying. Whenever, the user wants to retrieve a file with the carrier frequency through cognitive radios. For each GUI window as consider as a system. Also we will monitor the status of every cognitive radio. Software Requirements: 8
  • 9. # OPERATING SYSTEM : Windows XP # TECHNOLOGY : J2SDK1.4.1 And above Hardware Requirements: # PROCESSOR : Pentium III # CLOCK SPEED : 550 MHz # HARD DISK : 20GB # RAM : 128MB # CACHE MEMORY # OPERAING SYSEM : : 512KB Windows 2000 Professional # MONITOR : Color Monitor # KEYBOARD : 104Keys # MOUSE : 3Buttons MODULE DESCRIPTION 8
  • 10.  Base Station: Cognitive device must be able to detect very reliably whether it is far enough away from a primary base station and/or whether this primary base station is silent at a given point in time. For an individual detector this is very difficult due to different radio propagation paths and it may need to sense primary user signals buried deep under the noise floor.  Cognitive Radio: A cognitive radio transceiver is able to adapt to the dynamic radio environment and the network parameters to maximize the utilization of the limited radio resources while providing flexibility in wireless access. In this project, we show that a CR device having location information of other nodes can concurrently transmit a peer-to-peer data in the presence of an infrastructure based connection in some region. We also dimension the concurrent transmission (or the scanning-free) region for CR users. Note that a concurrent transmission region of a CR system is equivalent to a scanning-free region. A Cognitive Radio is a radio that can change its transmitter parameters based on interaction with the environment in which it operates.  Users: The identity of the users of radios who wish to join a network needs to be assured. In the CSMA/CA MAC protocol, multiple users contend the channel, and only one mobile station within the coverage of the BS can establish an infrastructure-based communication link at any instant. To set up an extra peer-to-peer ad hoc connection in the 8
  • 11. same frequency band of the primary user, the secondary users not only require ensuring that the current infrastructure-based link quality cannot be degraded but also has to win the contentions between other feasible secondary users. Here, we consider that both primary and secondary users have identical transmit power. It is reasonable to assume that only one secondary user can establish a link after the contention at one instance due to the similar interference range.  Multimedia frames: Wireless multimedia applications require significant bandwidth and often have to satisfy relatively tight delay constraints. Radio spectrum is a scarce resource. Limited available bandwidth is considered one of the major bottlenecks for high-quality multimedia wireless services. A reason for this is the fact that a major portion of the spectrum has already been allocated. On the other hand, actual measurements taken on the 0–6 GHz band and other spectrum occupancy measurements on licensed bands, such as TV bands, show the significant under utilization of the spectrum. Since Cognitive Radio can operate in different frequency bands which provides multimedia services. 8