The present paper addresses the equity issue among the secondary users in a cognitive radio network. After using a multi scheduler algorithm and a fairness metric namely Jain’s Equity Index; we enhance the equity between the secondary users’ transfer rates by 0.64 in average, relative to a previous work.
Channel Aware Mac Protocol for Maximizing Throughput and FairnessIJORCS
The proper channel utilization and the queue length aware routing protocol is a challenging task in MANET. To overcome this drawback we are extending the previous work by improving the MAC protocol to maximize the Throughput and Fairness. In this work we are estimating the channel condition and Contention for a channel aware packet scheduling and the queue length is also calculated for the routing protocol which is aware of the queue length. The channel is scheduled based on the channel condition and the routing is carried out by considering the queue length. This queue length will provide a measurement of traffic load at the mobile node itself. Depending upon this load the node with the lesser load will be selected for the routing; this will effectively balance the load and improve the throughput of the ad hoc network.
A MULTIPURPOSE MATRICES METHODOLOGY FOR TRANSMISSION USAGE, LOSS AND RELIABIL...ecij
In the era of power system restructuring there is a need of simplified method which provides a complete allocation of usage, transmission losses and transmission reliability margin. In this paper, authors presents a combined multipurpose matrices methodology for Transmission usage, transmission loss and transmission reliability margin allocation. Proposed methodology is simple and easy to implement on large power system. A modified Kirchhoff matrix is used for allocation purpose. A sample 6 bus system is used to demonstrate the feasibility of proposed methodology.
Generalized optimal placement of PMUs considering power system observability,...IJECEIAES
This paper presents a generalized optimal placement of Phasor Measurement Units (PMUs) considering power system observability, reliability, Communication Infrastructure (CI), and latency time associated with this CI. Moreover, the economic study for additional new data transmission paths is considered as well as the availability of predefined locations of some PMUs and the preexisting communication devices (CDs) in some buses. Two cases for the location of the Control Center Base Station (CCBS) are considered; predefined case and free selected case. The PMUs placement and their required communication network topology and channel capacity are co-optimized simultaneously. In this study, two different approaches are applied to optimize the objective function; the first approach is combined from Binary Particle Swarm Optimization-Gravitational Search Algorithm (BPSOGSA) and the Minimum Spanning Tree (MST) algorithm, while the second approach is based only on BPSOGSA. The feasibility of the proposed approaches are examined by applying it to IEEE 14-bus and IEEE 118-bus systems.
Energy efficient resources allocations for wireless communication systemsTELKOMNIKA JOURNAL
The energy consumption level of the telecommunication process has become a new
consideration in resource management scheme. It is becoming a new parameter in the resource
management scheme besides throughput, spectral efficiency, and fairness. This work proposes a power
control scheme and user grouping method to keep the rational energy consumption level of the resource
management scheme. Inverse water-filling power allocation is a power allocation scheme that optimizes
the energy efficiency by giving the power to the user which have good channel conditions. The user
grouping method becomes the solution for carrier aggregation (CA) scheme that prevents edge cell user
get the resources from the high-frequency carrier. This can prevent energy wastage in the transmission
process. This power control scheme and user grouping method can optimize the spectral and energy
efficiency without increasing the time complexity of the system.
Q-learning vertical handover scheme in two-tier LTE-A networks IJECEIAES
Global mobile communication necessitates improved capacity and proper quality assurance for services. To achieve these requirements, small cells have been deployed intensively by long term evolution (LTE) networks operators beside conventional base station structure to provide customers with better service and capacity coverage. Accomplishment of seamless handover between Macrocell layer (first tier) and Femtocell layer (second tier) is one of the key challenges to attain the QoS requirements. Handover related information gathering becomes very hard in high dense femtocell networks, effective handover decision techniques are important to minimize unnecessary handovers occurred and avoid Ping-Pong effect. In this work, we proposed and implemented an efficient handover decision procedure based on users’ profiles using Q-learning technique in an LTE-A macrocellfemtocell networks. New multi-criterion handover decision parameters are proposed in typical/dense femtocells in microcells environment to estimate the target cell for handover. The proposed handover algorithms are validated using the LTE-Sim simulator under an urban environment. The simulation results showed noteworthy reduction in the average number of handovers.
Channel Aware Mac Protocol for Maximizing Throughput and FairnessIJORCS
The proper channel utilization and the queue length aware routing protocol is a challenging task in MANET. To overcome this drawback we are extending the previous work by improving the MAC protocol to maximize the Throughput and Fairness. In this work we are estimating the channel condition and Contention for a channel aware packet scheduling and the queue length is also calculated for the routing protocol which is aware of the queue length. The channel is scheduled based on the channel condition and the routing is carried out by considering the queue length. This queue length will provide a measurement of traffic load at the mobile node itself. Depending upon this load the node with the lesser load will be selected for the routing; this will effectively balance the load and improve the throughput of the ad hoc network.
A MULTIPURPOSE MATRICES METHODOLOGY FOR TRANSMISSION USAGE, LOSS AND RELIABIL...ecij
In the era of power system restructuring there is a need of simplified method which provides a complete allocation of usage, transmission losses and transmission reliability margin. In this paper, authors presents a combined multipurpose matrices methodology for Transmission usage, transmission loss and transmission reliability margin allocation. Proposed methodology is simple and easy to implement on large power system. A modified Kirchhoff matrix is used for allocation purpose. A sample 6 bus system is used to demonstrate the feasibility of proposed methodology.
Generalized optimal placement of PMUs considering power system observability,...IJECEIAES
This paper presents a generalized optimal placement of Phasor Measurement Units (PMUs) considering power system observability, reliability, Communication Infrastructure (CI), and latency time associated with this CI. Moreover, the economic study for additional new data transmission paths is considered as well as the availability of predefined locations of some PMUs and the preexisting communication devices (CDs) in some buses. Two cases for the location of the Control Center Base Station (CCBS) are considered; predefined case and free selected case. The PMUs placement and their required communication network topology and channel capacity are co-optimized simultaneously. In this study, two different approaches are applied to optimize the objective function; the first approach is combined from Binary Particle Swarm Optimization-Gravitational Search Algorithm (BPSOGSA) and the Minimum Spanning Tree (MST) algorithm, while the second approach is based only on BPSOGSA. The feasibility of the proposed approaches are examined by applying it to IEEE 14-bus and IEEE 118-bus systems.
Energy efficient resources allocations for wireless communication systemsTELKOMNIKA JOURNAL
The energy consumption level of the telecommunication process has become a new
consideration in resource management scheme. It is becoming a new parameter in the resource
management scheme besides throughput, spectral efficiency, and fairness. This work proposes a power
control scheme and user grouping method to keep the rational energy consumption level of the resource
management scheme. Inverse water-filling power allocation is a power allocation scheme that optimizes
the energy efficiency by giving the power to the user which have good channel conditions. The user
grouping method becomes the solution for carrier aggregation (CA) scheme that prevents edge cell user
get the resources from the high-frequency carrier. This can prevent energy wastage in the transmission
process. This power control scheme and user grouping method can optimize the spectral and energy
efficiency without increasing the time complexity of the system.
Q-learning vertical handover scheme in two-tier LTE-A networks IJECEIAES
Global mobile communication necessitates improved capacity and proper quality assurance for services. To achieve these requirements, small cells have been deployed intensively by long term evolution (LTE) networks operators beside conventional base station structure to provide customers with better service and capacity coverage. Accomplishment of seamless handover between Macrocell layer (first tier) and Femtocell layer (second tier) is one of the key challenges to attain the QoS requirements. Handover related information gathering becomes very hard in high dense femtocell networks, effective handover decision techniques are important to minimize unnecessary handovers occurred and avoid Ping-Pong effect. In this work, we proposed and implemented an efficient handover decision procedure based on users’ profiles using Q-learning technique in an LTE-A macrocellfemtocell networks. New multi-criterion handover decision parameters are proposed in typical/dense femtocells in microcells environment to estimate the target cell for handover. The proposed handover algorithms are validated using the LTE-Sim simulator under an urban environment. The simulation results showed noteworthy reduction in the average number of handovers.
AC-Based Differential Evolution Algorithm for Dynamic Transmission Expansion ...TELKOMNIKA JOURNAL
This work proposes a method based on a mixed integer nonlinear non-convex programming
model to solve the multistage transmission expansion planning (TEP). A meta-heuristic algorithm by the
means of differential evolution algorithm (DEA) is employed as an optimization tool. An AC load flow model
is used in solving the multistage TEP problem, where accurate and realistic results can be obtained.
Furthermore, the work considers the constraints checking and system violation such as real and power
generation limits, possible number of lines added, thermal limits and bus voltage limits. The proposed
technique is tested on well known and realistic test systems such as the IEEE 24 bus-system and the
Colombian 93-bus system. The method has shown high capability in considering the active and reactive
power in the same manner and solving the TEP problem. The method produced improved good results in
a fast convergence time for the test systems.
GPS Enabled Energy Efficient Routing for ManetCSCJournals
In this paper, we propose an energy aware reactive approach by introducing energy and distance based threshold criteria. Cross Layer interaction is exploited the performance of physical layer which leads to significant improvement in the energy efficiency of a network.
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks IJECEIAES
Today, science and technology is developing, particularly the internet of things (IoT), there is an increasing demand in the sensor field to serve the requirements of individuals within modern life. Wireless sensor networks (WSNs) was created to assist us to modernize our lives, saving labor, avoid dangers, and that bring high efficiency at work. There are many various routing protocols accustomed to increase the ability efficiency and network lifetime. However, network systems with one settled sink frequently endure from a hot spots issue since hubs close sinks take a lot of vitality to forward information amid the transmission method. In this paper, the authors proposed combining the colony optimization algorithm ant colony optimization (ACO) routing algorithm and mobile sink to deal with that drawback and extend the network life. The simulation results on MATLAB show that the proposed protocol has far better performance than studies within the same field.
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs cscpconf
A mobile ad-hoc network (MANETs) is an infrastructure less network in which the mobile nodes
communicate with each other. Due to its various characteristics like highly dynamic topology
and limited battery power of the nodes, routing is one of the key issue. Also, it is not possible to
give a significant amount of power to the mobile nodes of ad-hoc networks. Because of all this
the energy consumption is also an important issue. Due to limited battery power, some other
issues like if some node gets fail, which results in loss of data packets and no reliable data
transfer has been raised. In this paper, an algorithm is proposed for data transmission which
detects the node failure (due to energy) before it actually happens. Because of this network
lifetime gets improved. The proposed routing algorithm is energy efficient as compared to
AODV routing algorithm. The performance is analyzed on the basis of various performance
metrics like Energy Consumption, Packet Delivery Ratio, Network Life Time, Network Routing
Overhead and number of Exhausted nodes in the network by using the NS2 Simulator.
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
In Wireless Sensors Networks (WSN) based application, a large number of sensor devices must be deployed. Energy efficiency and network lifetime are the two most challenging issues in WSN. As a consequence, the main goal is to reduce the overall energy consumption using clustering protocols which have to ensure reliability and connectivity in large-scale WSN. This work presents a new clustering and routing algorithm based on the properties of the sensor networks. The main goal of this work is to extend the network lifetime via charge equilibration in the WSN. According to many errors with sensing devices and to have greater data accuracy, we use a quorum mechanism. The proposed algorithms are evaluated widely and the results are compared with related works. The experimental results show that the proposed algorithm provides an effective improvement in terms of energy consumption, data accuracy and network lifetime.
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
Nowadays, Vehicular Ad-Hoc Network (VANET) has got more attention from the researchers. The researchers have studied numerous topics of VANET, such as the routing protocols of VANET and the MAC protocols of VANET. The aim of their works is to improve the network performance of VANET, either in terms of energy consumption or packet delivery ratio (PDR) and delay. For this research paper, the main goal is to find the coefficient of a, b and c of three non-linear equations by using a Newton- Raphson method. Those three non-linear equations are derived from a different value of Medium Access Control (MAC) protocol's parameters. After that, those three coefficient is then will be used in optimization of the VANET in terms of energy, PDR, and delay.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
Performance Evaluation of Consumed Energy-Type-Aware Routing (CETAR) For Wire...ijwmn
This work evaluates the performance of Consumed-Energy-Type-Aware Routing (CETAR) which incorporates the amount of energy consumed per type of operation for routing decision to extend the lifetime of the Wireless Sensor Networks (WSNs). CETAR makes routing decision using statistics of the energy consumed for each type of node activities including sensing, data processing, data transmission as a source node, and routing operations. In particular, CETAR encourages a node which seldom plays a role of source node as a routing node to preserve the energy of active source nodes to prolong the functionality of the WSNs. Extensive simulation study demonstrates that the lifetime of the Geographic and Energy Aware Routing (GEAR) can be significantly extended with CETAR. With its adaptability to deployed sensor node behaviors, the significance of CETAR to extend the lifetime of WSNs is clear.
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM I...IJCNCJournal
One of the most important issues discussed in Wireless Sensor Networks (WSNs) is how to transfer information from nodes within the network to the base station and select the best possible route for transmission of this information, taking into account energy consumption for the network lifetime with
maximum reliability and security. Hence, it would be useful to provide a suitable method that would have the features mentioned. This paper uses an Ad-hoc On-demand Multipath Distance Vector (AOMDV) as a routing protocol. This protocol has high energy consumption due to its multipath. However, it is a big challenge if it can reduce AOMDV energy consumption. Therefore, clustering operations for nodes are of high priority to determine the head of clusters which LEACH protocol and fuzzy logic and Particle Swarm Optimization (PSO) algorithm are used for this purpose. Simulation results represent 5% improvement in energy consumption in a WSN compared to AOMDV method.
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
Positioning techniques have been a common objective since the early development of wireless networks. However, current positioning methods in cellular networks, for instance, are still primarily focused on the use of the Global Navigation Satellite System (GNSS), which has several limitations, like high power drainage and failure in indoor scenarios. This study introduces a novel approach employing standard LTE signaling in order to provide high accuracy positioning estimation. The proposed technique is designed in analogy to the human sound localization system, eliminating the need of having information from three spatially diverse Base Stations (BSs). This is inspired by the perfect human 3D sound localization with two ears. A field study is carried out in a dense urban city to verify the accuracy of the proposed technique, with more than 20 thousand measurement samples collected. The achieved positioning accuracy is meeting the latest Federal Communications Commission (FCC) requirements in the planner dimension.
MPR selection to the OLSR quality of service in MANET using minmax algorithmIJECEIAES
Optimized link state routing (OLSR) is a routing protocol that has a small delay, low traffic control, support the application of denser networks, and adopts the concept of multipoint relays (MPR). The problem of OLSR is routing table updating which continually causes excessive packet delivery, and energy consumption becomes increased. This article proposes the improvement of OLSR performance using the min-max algorithm based on the quality of service (QoS) with considering the density of the node. The Min-max algorithm works in selecting MPR nodes based on the largest signal range. The QoS parameters analyzed with a different number of nodes are packet delivery ratio (PDR), throughput, delay, energy consumption, and topology control (TC). Simulation result of network simulator version 2 (NS-2) shows that OLSR performance using the min-max algorithm can increase PDR of 91.17%, packet loss of 60.77% and reduce topology control packet of 8.07%, energy consumption of 16.82% compared with standard OLSR.
Optimum Network Reconfiguration using Grey Wolf OptimizerTELKOMNIKA JOURNAL
Distribution system Reconfiguration is the process of changing the topology of the distribution
network by opening and closing switches to satisfy a specific objective. It is a complex, combinatorial
optimization problem involving a nonlinear objective function and constraints. Grey Wolf Optimizer (GWO)
is a recently developed metaheuristic search algorithm inspired by the leadership hierarchy and hunting
strategy of grey wolves in nature. The objective of this paper is to determine an optimal network
reconfiguration that presents the minimum power losses, considering network constraints, and using GWO
algorithm. The proposed algorithm was tested using some standard networks (33 bus, 69 bus, 84 bus and
118 bus), and the obtained results reveal the efficiency and effectiveness of the proposed approach.
OPTIMIZATION OF A TWO-HOP NETWORK WITH ENERGY CONFERENCING RELAYSijwmn
This paper considers a two-hop network consisting of a source, two parallel half-duplex relay nodes, and
two destinations. While the destinations have an adequate power supply, the source and relay nodes
rely on harvested energy for data transmission. Different from all existing works, the two relay nodes
can also transfer their harvested energy to each other. For such a system, an optimization problem is
formulated with the objective of maximizing the total data rate and conserving the source and relays
transmission energy, where any extra energy saved in the current transmission cycle can be used in
the next cycle. It turns out that the optimal solutions for this problem can be either found in a closedform
or through one-dimensional searches, depending on the scenario. Simulation results based on both
the average data rate and the outage probability show that energy cooperation between the two relays
consistently improves the system performance.
Kalman Filter Estimation of Impedance Parameters for Medium Transmission LineTELKOMNIKA JOURNAL
Accurate knowledge of impedance parameters in transmission line helps to improve the system efficiency and performance. Nowadays, the estimation of impedance parameters in transmission line has become possible with the availability of computational method. This paper aims to develop Kalman filter model by using Matlab simulink to estimate accurate values of resistance (R), reactance (X), and susceptance (B) in medium transmission line. The accuracy of the parameters can be improved by reducing the unknown errors in the system. To demonstrate the effectiveness of the Kalman filter method, a case study of simulated medium transmission line is presented and comparison between Kalman Filter (KF) and Linear Least Square (LLS) method is also considered to evaluate their performances.
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
In recent years, a new wireless network called vehicular ad-hoc network (VANET), has become a popular research topic. VANET allows communication among vehicles and with roadside units by providing information to each other, such as vehicle velocity, location and direction. In general, when many vehicles likely to use the common route to proceed to the same destination, it can lead to a congested route that should be avoided. It may be better if vehicles are able to predict accurately the traffic congestion and then avoid it. Therefore, in this work, the deep reinforcement learning in VANET to enhance the ability to predict traffic congestion on the roads is proposed. Furthermore, different types of neural networks namely Convolutional Neural Network (CNN), Multilayer Perceptron (MLP) and Long Short-Term Memory (LSTM) are investigated and compared in this deep reinforcement learning model to discover the most effective one. Our proposed method is tested by simulation. The traffic scenarios are created using traffic simulator called Simulation of Urban Mobility (SUMO) before integrating with deep reinforcement learning model. The simulation procedures, as well as the programming used, are described in detail. The performance of our proposed method is evaluated using two metrics; the average travelling time delay and average waiting time delay of vehicles. According to the simulation results, the average travelling time delay and average waiting time delay are gradually improved over the multiple runs, since our proposed method receives feedback from the environment. In addition, the results without and with three different deep learning algorithms, i.e., CNN, MLP and LSTM are compared. It is obvious that the deep reinforcement learning model works effectively when traffic density is neither too high nor too low. In addition, it can be concluded that the effective algorithms for traffic congestion prediction models in descending order are MLP, CNN, and LSTM, respectively.
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...IJECEIAES
The clustering approach is considered as a vital method for wireless sensor networks (WSNs) by organizing the sensor nodes into specific clusters. Consequently, saving the energy and prolonging network lifetime which is totally dependent on the sensors battery, that is considered as a major challenge in the WSNs. Classification algorithms such as K-means (KM) and Fuzzy C-means (FCM), which are two of the most used algorithms in literature for this purpose in WSNs. However, according to the nature of random nodes deployment manner, on certain occasions, this situation forces these algorithms to produce unbalanced clusters, which adversely affects the lifetime of the network. Based for our knowledge, there is no study has analyzed the performance of these algorithms in terms clusters construction in WSNs. In this study, we investigate in KM and FCM performance and which of them has better ability to construct balanced clusters, in order to enable the researchers to choose the appropriate algorithm for the purpose of improving network lifespan. In this study, we utilize new parameters to evaluate the performance of clusters formation in multi-scenarios. Simulation result shows that our FCM is more superior than KM by producing balanced clusters with the random distribution manner for sensor nodes.
A novel k-means powered algorithm for an efficient clustering in vehicular ad...IJECEIAES
Considerable attention has recently been given to the routing issue in vehicular ad-hoc networks (VANET). Indeed, the repetitive communication failures and high velocity of vehicles reduce the efficacy of routing protocols in VANET. The clustering technique is considered an important solution to overcome these difficulties. In this paper, an efficient clustering approach using an adapted k-means algorithm for VANET has been introduced to enhance network stability in a highway environment. Our approach relies on a clustering scheme that accounts for the network characteristics and the number of connected vehicles. The simulation indicates that the proposed approach is more efficient than similar schemes. The results obtained appear an overall increase in constancy, proven by an increase in cluster head lifetime by 66%, and an improvement in robustness clear in the overall reduction of the end-to-end delay by 46% as well as an increase in throughput by 74%.
AC-Based Differential Evolution Algorithm for Dynamic Transmission Expansion ...TELKOMNIKA JOURNAL
This work proposes a method based on a mixed integer nonlinear non-convex programming
model to solve the multistage transmission expansion planning (TEP). A meta-heuristic algorithm by the
means of differential evolution algorithm (DEA) is employed as an optimization tool. An AC load flow model
is used in solving the multistage TEP problem, where accurate and realistic results can be obtained.
Furthermore, the work considers the constraints checking and system violation such as real and power
generation limits, possible number of lines added, thermal limits and bus voltage limits. The proposed
technique is tested on well known and realistic test systems such as the IEEE 24 bus-system and the
Colombian 93-bus system. The method has shown high capability in considering the active and reactive
power in the same manner and solving the TEP problem. The method produced improved good results in
a fast convergence time for the test systems.
GPS Enabled Energy Efficient Routing for ManetCSCJournals
In this paper, we propose an energy aware reactive approach by introducing energy and distance based threshold criteria. Cross Layer interaction is exploited the performance of physical layer which leads to significant improvement in the energy efficiency of a network.
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks IJECEIAES
Today, science and technology is developing, particularly the internet of things (IoT), there is an increasing demand in the sensor field to serve the requirements of individuals within modern life. Wireless sensor networks (WSNs) was created to assist us to modernize our lives, saving labor, avoid dangers, and that bring high efficiency at work. There are many various routing protocols accustomed to increase the ability efficiency and network lifetime. However, network systems with one settled sink frequently endure from a hot spots issue since hubs close sinks take a lot of vitality to forward information amid the transmission method. In this paper, the authors proposed combining the colony optimization algorithm ant colony optimization (ACO) routing algorithm and mobile sink to deal with that drawback and extend the network life. The simulation results on MATLAB show that the proposed protocol has far better performance than studies within the same field.
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs cscpconf
A mobile ad-hoc network (MANETs) is an infrastructure less network in which the mobile nodes
communicate with each other. Due to its various characteristics like highly dynamic topology
and limited battery power of the nodes, routing is one of the key issue. Also, it is not possible to
give a significant amount of power to the mobile nodes of ad-hoc networks. Because of all this
the energy consumption is also an important issue. Due to limited battery power, some other
issues like if some node gets fail, which results in loss of data packets and no reliable data
transfer has been raised. In this paper, an algorithm is proposed for data transmission which
detects the node failure (due to energy) before it actually happens. Because of this network
lifetime gets improved. The proposed routing algorithm is energy efficient as compared to
AODV routing algorithm. The performance is analyzed on the basis of various performance
metrics like Energy Consumption, Packet Delivery Ratio, Network Life Time, Network Routing
Overhead and number of Exhausted nodes in the network by using the NS2 Simulator.
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
In Wireless Sensors Networks (WSN) based application, a large number of sensor devices must be deployed. Energy efficiency and network lifetime are the two most challenging issues in WSN. As a consequence, the main goal is to reduce the overall energy consumption using clustering protocols which have to ensure reliability and connectivity in large-scale WSN. This work presents a new clustering and routing algorithm based on the properties of the sensor networks. The main goal of this work is to extend the network lifetime via charge equilibration in the WSN. According to many errors with sensing devices and to have greater data accuracy, we use a quorum mechanism. The proposed algorithms are evaluated widely and the results are compared with related works. The experimental results show that the proposed algorithm provides an effective improvement in terms of energy consumption, data accuracy and network lifetime.
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
Nowadays, Vehicular Ad-Hoc Network (VANET) has got more attention from the researchers. The researchers have studied numerous topics of VANET, such as the routing protocols of VANET and the MAC protocols of VANET. The aim of their works is to improve the network performance of VANET, either in terms of energy consumption or packet delivery ratio (PDR) and delay. For this research paper, the main goal is to find the coefficient of a, b and c of three non-linear equations by using a Newton- Raphson method. Those three non-linear equations are derived from a different value of Medium Access Control (MAC) protocol's parameters. After that, those three coefficient is then will be used in optimization of the VANET in terms of energy, PDR, and delay.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
Performance Evaluation of Consumed Energy-Type-Aware Routing (CETAR) For Wire...ijwmn
This work evaluates the performance of Consumed-Energy-Type-Aware Routing (CETAR) which incorporates the amount of energy consumed per type of operation for routing decision to extend the lifetime of the Wireless Sensor Networks (WSNs). CETAR makes routing decision using statistics of the energy consumed for each type of node activities including sensing, data processing, data transmission as a source node, and routing operations. In particular, CETAR encourages a node which seldom plays a role of source node as a routing node to preserve the energy of active source nodes to prolong the functionality of the WSNs. Extensive simulation study demonstrates that the lifetime of the Geographic and Energy Aware Routing (GEAR) can be significantly extended with CETAR. With its adaptability to deployed sensor node behaviors, the significance of CETAR to extend the lifetime of WSNs is clear.
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM I...IJCNCJournal
One of the most important issues discussed in Wireless Sensor Networks (WSNs) is how to transfer information from nodes within the network to the base station and select the best possible route for transmission of this information, taking into account energy consumption for the network lifetime with
maximum reliability and security. Hence, it would be useful to provide a suitable method that would have the features mentioned. This paper uses an Ad-hoc On-demand Multipath Distance Vector (AOMDV) as a routing protocol. This protocol has high energy consumption due to its multipath. However, it is a big challenge if it can reduce AOMDV energy consumption. Therefore, clustering operations for nodes are of high priority to determine the head of clusters which LEACH protocol and fuzzy logic and Particle Swarm Optimization (PSO) algorithm are used for this purpose. Simulation results represent 5% improvement in energy consumption in a WSN compared to AOMDV method.
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
Positioning techniques have been a common objective since the early development of wireless networks. However, current positioning methods in cellular networks, for instance, are still primarily focused on the use of the Global Navigation Satellite System (GNSS), which has several limitations, like high power drainage and failure in indoor scenarios. This study introduces a novel approach employing standard LTE signaling in order to provide high accuracy positioning estimation. The proposed technique is designed in analogy to the human sound localization system, eliminating the need of having information from three spatially diverse Base Stations (BSs). This is inspired by the perfect human 3D sound localization with two ears. A field study is carried out in a dense urban city to verify the accuracy of the proposed technique, with more than 20 thousand measurement samples collected. The achieved positioning accuracy is meeting the latest Federal Communications Commission (FCC) requirements in the planner dimension.
MPR selection to the OLSR quality of service in MANET using minmax algorithmIJECEIAES
Optimized link state routing (OLSR) is a routing protocol that has a small delay, low traffic control, support the application of denser networks, and adopts the concept of multipoint relays (MPR). The problem of OLSR is routing table updating which continually causes excessive packet delivery, and energy consumption becomes increased. This article proposes the improvement of OLSR performance using the min-max algorithm based on the quality of service (QoS) with considering the density of the node. The Min-max algorithm works in selecting MPR nodes based on the largest signal range. The QoS parameters analyzed with a different number of nodes are packet delivery ratio (PDR), throughput, delay, energy consumption, and topology control (TC). Simulation result of network simulator version 2 (NS-2) shows that OLSR performance using the min-max algorithm can increase PDR of 91.17%, packet loss of 60.77% and reduce topology control packet of 8.07%, energy consumption of 16.82% compared with standard OLSR.
Optimum Network Reconfiguration using Grey Wolf OptimizerTELKOMNIKA JOURNAL
Distribution system Reconfiguration is the process of changing the topology of the distribution
network by opening and closing switches to satisfy a specific objective. It is a complex, combinatorial
optimization problem involving a nonlinear objective function and constraints. Grey Wolf Optimizer (GWO)
is a recently developed metaheuristic search algorithm inspired by the leadership hierarchy and hunting
strategy of grey wolves in nature. The objective of this paper is to determine an optimal network
reconfiguration that presents the minimum power losses, considering network constraints, and using GWO
algorithm. The proposed algorithm was tested using some standard networks (33 bus, 69 bus, 84 bus and
118 bus), and the obtained results reveal the efficiency and effectiveness of the proposed approach.
OPTIMIZATION OF A TWO-HOP NETWORK WITH ENERGY CONFERENCING RELAYSijwmn
This paper considers a two-hop network consisting of a source, two parallel half-duplex relay nodes, and
two destinations. While the destinations have an adequate power supply, the source and relay nodes
rely on harvested energy for data transmission. Different from all existing works, the two relay nodes
can also transfer their harvested energy to each other. For such a system, an optimization problem is
formulated with the objective of maximizing the total data rate and conserving the source and relays
transmission energy, where any extra energy saved in the current transmission cycle can be used in
the next cycle. It turns out that the optimal solutions for this problem can be either found in a closedform
or through one-dimensional searches, depending on the scenario. Simulation results based on both
the average data rate and the outage probability show that energy cooperation between the two relays
consistently improves the system performance.
Kalman Filter Estimation of Impedance Parameters for Medium Transmission LineTELKOMNIKA JOURNAL
Accurate knowledge of impedance parameters in transmission line helps to improve the system efficiency and performance. Nowadays, the estimation of impedance parameters in transmission line has become possible with the availability of computational method. This paper aims to develop Kalman filter model by using Matlab simulink to estimate accurate values of resistance (R), reactance (X), and susceptance (B) in medium transmission line. The accuracy of the parameters can be improved by reducing the unknown errors in the system. To demonstrate the effectiveness of the Kalman filter method, a case study of simulated medium transmission line is presented and comparison between Kalman Filter (KF) and Linear Least Square (LLS) method is also considered to evaluate their performances.
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
In recent years, a new wireless network called vehicular ad-hoc network (VANET), has become a popular research topic. VANET allows communication among vehicles and with roadside units by providing information to each other, such as vehicle velocity, location and direction. In general, when many vehicles likely to use the common route to proceed to the same destination, it can lead to a congested route that should be avoided. It may be better if vehicles are able to predict accurately the traffic congestion and then avoid it. Therefore, in this work, the deep reinforcement learning in VANET to enhance the ability to predict traffic congestion on the roads is proposed. Furthermore, different types of neural networks namely Convolutional Neural Network (CNN), Multilayer Perceptron (MLP) and Long Short-Term Memory (LSTM) are investigated and compared in this deep reinforcement learning model to discover the most effective one. Our proposed method is tested by simulation. The traffic scenarios are created using traffic simulator called Simulation of Urban Mobility (SUMO) before integrating with deep reinforcement learning model. The simulation procedures, as well as the programming used, are described in detail. The performance of our proposed method is evaluated using two metrics; the average travelling time delay and average waiting time delay of vehicles. According to the simulation results, the average travelling time delay and average waiting time delay are gradually improved over the multiple runs, since our proposed method receives feedback from the environment. In addition, the results without and with three different deep learning algorithms, i.e., CNN, MLP and LSTM are compared. It is obvious that the deep reinforcement learning model works effectively when traffic density is neither too high nor too low. In addition, it can be concluded that the effective algorithms for traffic congestion prediction models in descending order are MLP, CNN, and LSTM, respectively.
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...IJECEIAES
The clustering approach is considered as a vital method for wireless sensor networks (WSNs) by organizing the sensor nodes into specific clusters. Consequently, saving the energy and prolonging network lifetime which is totally dependent on the sensors battery, that is considered as a major challenge in the WSNs. Classification algorithms such as K-means (KM) and Fuzzy C-means (FCM), which are two of the most used algorithms in literature for this purpose in WSNs. However, according to the nature of random nodes deployment manner, on certain occasions, this situation forces these algorithms to produce unbalanced clusters, which adversely affects the lifetime of the network. Based for our knowledge, there is no study has analyzed the performance of these algorithms in terms clusters construction in WSNs. In this study, we investigate in KM and FCM performance and which of them has better ability to construct balanced clusters, in order to enable the researchers to choose the appropriate algorithm for the purpose of improving network lifespan. In this study, we utilize new parameters to evaluate the performance of clusters formation in multi-scenarios. Simulation result shows that our FCM is more superior than KM by producing balanced clusters with the random distribution manner for sensor nodes.
A novel k-means powered algorithm for an efficient clustering in vehicular ad...IJECEIAES
Considerable attention has recently been given to the routing issue in vehicular ad-hoc networks (VANET). Indeed, the repetitive communication failures and high velocity of vehicles reduce the efficacy of routing protocols in VANET. The clustering technique is considered an important solution to overcome these difficulties. In this paper, an efficient clustering approach using an adapted k-means algorithm for VANET has been introduced to enhance network stability in a highway environment. Our approach relies on a clustering scheme that accounts for the network characteristics and the number of connected vehicles. The simulation indicates that the proposed approach is more efficient than similar schemes. The results obtained appear an overall increase in constancy, proven by an increase in cluster head lifetime by 66%, and an improvement in robustness clear in the overall reduction of the end-to-end delay by 46% as well as an increase in throughput by 74%.
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...IJCNCJournal
Maintaining the energy conservation is considered as an important approach to increase the lifetime of WSN. In fact, an energy reduction mechanism is considered as the main concept to enhance the lifespan of the network. In this paper, the performance analysis/evaluation of optimization technique, specifically, Ant Colony Optimization (ACO) and modified ACO (m-ACO) in the routing method are investigated. This network analysis is done by 100 iterations and differentiated with 50, 75 and 100 numbers of nodes. Finally, experimental results illustrate that the performance of m-ACO algorithm obtained the obvious performance, which is comparatively better than ACO algorithm, because it improves the routing efficiency by pheromone evaporation control and energy threshold value. It demonstrates that m-ACO algorithm gives better results than ACO in terms of throughput (1.41%), transmission delay (1.43%), packet delivery ratio (1.41%), energy consumption (2.05%), and the packet loss (9.70%). The convergence rate is analysed for ACO and m-ACO algorithms with respect to 100 number of iterations for WSNs.
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...IJCNCJournal
Maintaining the energy conservation is considered as an important approach to increase the lifetime of WSN. In fact, an energy reduction mechanism is considered asthe main concept to enhance the lifespan of the network. In this paper, the performance analysis/evaluation of optimization technique, specifically, Ant Colony Optimization (ACO) and modified ACO (m-ACO) in the routing method are investigated. This network analysis is done by 100 iterations and differentiated with 50, 75 and 100 numbers of nodes. Finally, experimental results illustrate that the performance of m-ACO algorithm obtained the obvious performance,which is comparatively better than ACO algorithm, because it improves the routing efficiency by pheromone evaporation control and energy threshold value. It demonstrates that m-ACO algorithm gives better results than ACO in terms of throughput (1.41%), transmission delay (1.43%), packet delivery ratio (1.41%), energy consumption (2.05%), and the packet loss (9.70%). The convergence rate is analysed for ACO and m-ACO algorithms with respect to 100 number of iterations for WSNs.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...ijassn
Macro-programming is the new generation advanced method of using Wireless Sensor Network (WSNs), where application developers can extract data from sensor nodes through a high level abstraction of the system. Instead of developing the entire application, task graph representation of the WSN model presents simplified approach of data collection. However, mapping of tasks onto sensor nodes highlights several problems in energy consumption and routing delay. In this paper, we present an efficient hybrid approach of task mapping for WSN – Hybrid Genetic Algorithm, considering multiple objectives of optimization – energy consumption, routing delay and soft real time requirement. We also present a method to configure the algorithm as per user's need by changing the heuristics used for optimization. The trade-off analysis between energy consumption and delivery delay was performed and simulation results are presented. The algorithm is applicable during macro-programming enabling developers to choose a better mapping according to their application requirements.
CONFIGURABLE TASK MAPPING FOR MULTIPLE OBJECTIVES IN MACRO-PROGRAMMING OF WIR...ijassn
Macro-programming is the new generation advanced method of using Wireless Sensor Network (WSNs),
where application developers can extract data from sensor nodes through a high level abstraction of the
system. Instead of developing the entire application, task graph representation of the WSN model presents
simplified approach of data collection.
Throughput in cooperative wireless networksjournalBEEI
Cognitive radio networks emerge as a solution to fixed allocation issues and spectrum scarcity through the dynamic access to spectrum. In cognitive networks, users must make intelligent decisions based on spectrum variation and actions taken by other users. Under this dynamic, cooperative systems can significantly improve quality of service parameters. This article presents the comparative study of the multi-criteria decision-making algorithms SAW and FFAHP through four levels of cooperation (10%, 20%, 50%, 80% y 100%) established between secondary users. The results show the performance evaluation obtained through of simulations and experimental measurements. The analysis is carried out based on throughput, depending on the class of service and the type of traffic.
An Energy Efficient Mobile Sink Based Mechanism for WSNs.pdfMohammad Siraj
Network lifetime and energy efficiency are crucial performance metrics used to evaluate
wireless sensor networks (WSNs). Decreasing and balancing the energy consumption of nodes can be
employed to increase network lifetime. In cluster-based WSNs, one objective of applying clustering
is to decrease the energy consumption of the network. In fact, the clustering technique will be
considered effective if the energy consumed by sensor nodes decreases after applying clustering,
however, this aim will not be achieved if the cluster size is not properly chosen. Therefore, in this
paper, the energy consumption of nodes, before clustering, is considered to determine the optimal
cluster size. A two-stage Genetic Algorithm (GA) is employed to determine the optimal interval of
cluster size and derive the exact value from the interval. Furthermore, the energy hole is an inherent
problem which leads to a remarkable decrease in the network’s lifespan. This problem stems from
the asynchronous energy depletion of nodes located in different layers of the network.
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...IJECEIAES
Hybrid medium access control (MAC) scheme is one of the prominent mechanisms to offer energy efficiency in wireless sensor network where the potential features for both contention-based and schedule-based approaches are mechanized. However, the review of existing hybrid MAC scheme shows many loopholes where mainly it is observed that there is too much inclusion of time-slotting or else there is an inclusion of sophisticated mechanism not meant for offering flexibility to sensor node towards extending its services for upcoming applications of it. Therefore, this manuscript introduces a novel hybrid MAC scheme which is meant for offering cost effective and simplified scheduling operation in order to balance the performance of energy efficiency along with data aggregation performance. The simulated outcome of the study shows that proposed system offers better energy consumption, better throughput, reduced memory consumption, and faster processing in contrast to existing hybrid MAC protocols.
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
Multi-hop routing protocol in cognitive radio mobile ad hoc networks (CRMANETs) is a critical issue. Furthermore, the routing metric used in multi-hop CRMANETs should reflect the bands availability, the links quality, the PU activities and quality of service (QoS) requirements of SUs. For the best of our knowledge, many of researchers investigated the performance of the different routing protocols in a homogeneous environment only. In this paper, we propose a heterogeneous cognitive radio routing protocol (HCR) operates in heterogeneous environment (i.e. the route from source to destination utilize the licensed and unlicensed spectrum bands). The proposed routing protocol is carefully developed to make a tradeoff between the channel diversity of the routing path along with the CRMANETs throughput. Using simulations, we discuss the performance of the proposed HCR routing protocol and compare it with the AODV routing protocol using a discrete-event simulation which we developed using JAVA platform.
In order to provide sensing services to low-powered IoT devices, wireless sensor networks (WSNs) organize specialized transducers into networks. Energy usage is one of the most important design concerns in WSN because it is very hard to replace or recharge the batteries in sensor nodes. For an energy-constrained network, the clustering technique is crucial in preserving battery life. By strategically selecting a cluster head (CH), a network's load can be balanced, resulting in decreased energy usage and extended system life. Although clustering has been predominantly used in the literature, the concept of chain-based clustering has not yet been explored. As a result, in this paper, we employ a chain-based clustering architecture for data dissemination in the network. Furthermore, for CH selection, we employ the coati optimisation algorithm, which was recently proposed and has demonstrated significant improvement over other optimization algorithms. In this method, the parameters considered for selecting the CH are energy, node density, distance, and the network’s average energy. The simulation results show tremendous improvement over the competitive cluster-based routing algorithms in the context of network lifetime, stability period (first node dead), transmission rate, and the network's power reserves.
Routing Optimization with Load Balancing: an Energy Efficient ApproachEswar Publications
The area of Wireless Sensor Network (WSN) is covered with considerable range of problems, where majority of research attempts were carried out to enhance the network lifetime of WSN. But very few of the studies have proved successful. This manuscript discusses about a structure for optimizing routing and load balancing that uses standard radio and energy model to perform energy optimization by introducing a novel routing agent. The routing agent is built within aggregator node and base station to perform self motivated reconfiguration in case of energy depletion. Compared with standard LEACH algorithm, the proposed technique has better energy efficiency within optimal data aggregation duration.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize
the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and
time dimension. So several scheduling algorithms need to be analyzed for femtocells networks.
In this paper we introduce a performance analysis of three distinct scheduling algorithms of
mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in
terms of throughput, packet loss ratio, fairness index and spectral efficiency.
Similar to Equity-Based free channels assignment for secondary users in a cognitive radio network (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Equity-Based free channels assignment for secondary users in a cognitive radio network
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 9, No. 3, June 2019, pp. 2057∼2063
ISSN: 2088-8708, DOI: 10.11591/ijece.v9i3.pp2057-2063 Ì 2057
Equity-based free channels assignment for secondary users
in a cognitive radio network
Said Lakhal1
, Zouhair Guennoun2
1
Mohammadia School of Engineering, Mohammed 5 University in Rabat, Morocco
2
ERSC formerly known as LEC, research Center E3S, Morocco
Article Info
Article history:
Received May 31, 2018
Revised Nov 15, 2018
Accepted Nov 23, 2018
Keywords:
Cognitive radio network
Jain’s equity index
Scheduler
Channels allocation
ABSTRACT
The present paper addresses the equity issue among the secondary users in a cognitive
radio network. After using a multi scheduler algorithm and a fairness metric namely
Jain’s Equity Index; we enhance the equity between the secondary users’ transfer rates
by 0.64 in average, relative to a previous work.
Copyright c 2019 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Said Lakhal,
Mohammadia School of Engineering, Mohammed 5 University in Rabat,
ERSC formerly known as LEC, research Center E3S,
Mohammadia School of Engineering, Ibn Sina Avenue, B.P 765, Agdal, Rabat, Morocco.
Email: said.lakhal.rech@gmail.com
1. INTRODUCTION
In a cognitive radio network (CRN) [1], the primary users (PUs) have priority to use the spectra,
without privatization; while the secondary users (SUs), wait the cessation of activities of some PUs, for trans-
mitting data. The design of CRN executes four functions, by using one of four techniques, in the aims to reach
at some objectives. These functions are called in the following order [2, 3, 4]: spectrum sensing, spectrum
management, spectrum mobility and spectrum sharing [5, 6, 7]. The Auctions, Game theory, Markovian queu-
ing model and Multi-agent systems (MAS) represent the famous used techniques for modeling a CRN [8, 9],
all to achieve some objectives, characterizing the performance of a CRN. These aims are expressed in terms
of some quantities to maximize [10, 11, 12], such as: the equity, transfer rate and the spectrum use. These
requirements are also expressed in terms of other quantities to minimize, like: the energy consumption [13],
to extend the lifetime of electrical devices; the interference [14, 15], to enhance the quality and quantity of
transmission [8, 9]. The Figure 1 illustrates altogether the CRN functions, techniques, and objectives.
The SUs’ packet transmission phase begins as soon as some channels are released by the PUs. Each of
these SUs seeks to be the first to transmit. As a result, conflicts are created and the network can be blocked, as
well as no licensed user will be able to send their data. In front of this situation, the installation of a scheduler
becomes essential, to manage the channel allocation for different SUs, based on performance criteria whose
the equity represents an important component.
This scheduler must take into consideration the way of packet transmission and the properties of the
used equity metric. The way is explicit by the distribution of SUs on the free channels according to the time
slots, and the properties of the metric are four: population and Scale independence, boundedness as well as
Continuity. The authors of [6, 13] addressed the equity issues, based on a metric measurement. In the two
works, the above properties are not mentioned as well as the way of the packet forwarding was not clarified.
In [5], the authors studied the equity by using the JEI as a metric, which satisfied the four properties, but
Journal homepage: http://iaescore.com/journals/index.php/IJECE
2. 2058 Ì ISSN: 2088-8708
they did not make a comparison with another work also they treated the groups of SUs rather than the SUs
themselves. In [7, 16], the authors used one channel transmission. In [7], the standard deviation is adopted
as metric, which not satisfies the above four properties. In [16], the single channel transmission decreases the
equity, despite the consideration of the JEI as a metric. In our present work, we take advantage of the benefits
of these works, and we improve them to remove their limitations. Explicitly, on one hand, we implement the
multi scheduler algorithm in a multi channel network, to produce the scheduling chain. On the other hand, we
use JEI as a metric, since it satisfies the four properties. As a result, we improve equity by an average of 0.64
for previous work.
Figure 1. The functions, objectives and techniques of CRN
The rest of this paper is structured as follows: Section 2 discusses some related works and our contri-
butions. Section 3 exposes our approach. We present the experimental results in section 4, and we conclude in
section 5.
2. SCHEDULING AND EQUITY CONCEPT: A LITERATURE REVIEW
2.1. Scheduling
The SUs and their packets appear randomly on the CRN. They require the installation of a sched-
uler, able to managing this flow. This scheduler can be implemented in software or hardware platform.
It targets multiple purposes, depending on the priorities and constraints. For example: the priorities can be
expressed by the maximization of throughput or equity, while the constraints can be represented by the network
infrastructure and architecture. Several previous works treated the throughput maximization problem [11, 17].
Based on constant input and output rates of queues [11], the authors exposed an opportunistic scheduler to
enhance the SUs’ transmission rates. By referring to the first-difference filter clustering and correlation based
PU modeling [17], the authors exposed a QoS-based spectrum coordinator for the CR user cohabitation in or-
der to achieve high throughput and fairness. In addition, the equity criterion between the SUs’ transfer rates
attracted much attention of researchers [13, 18, 5, 7]. So, by taking into account: the current and prior history
of user experience, as well as the respect of QoS [13], the authors proposed a fairness approach, by using the
JEI. Their aims are to determine the optimal power and rate distribution choices for each SU, while maintaining
the fairness across all SUs. In other equity study [18], the authors presented a resource allocation algorithm, in
order to maximize the fairness. They used a proportional fairness constraint, to assure that each SU can achieve
a required data rate, with QOS guarantees.
Certainly, the adopted architecture affects the network performance. In this regard, we can distin-
guish between two major architectures: distributed [19, 20, 21] and centralized [22, 7, 5, 19]. Both architec-
tures are considered in [19]. The authors proposed an incentive-aware spectrum sharing scheme, for taking in
IJECE, Vol. 9, No. 3, June 2019 : 2057 – 2063
3. IJECE ISSN: 2088-8708 Ì 2059
the advantages of these two architectures, and overcoming their weaknesses. The distributed aspect requires
no central control entities, which can independently be implemented within a distributed spectrum market.
By cons, the centralized aspect assigns the socially optimal contracts for all PUs and SUs, for attaining the eco-
nomic robustness. In [20], the authors proposed a distributed clustering algorithm based on the soft-constraint
affinity propagation message passing model (DCSCAP). So, without depending on predefined common control
channel (CCC), DCSCAP relies on the distributed message passing among the SUs, through their available
channels, for applying the algorithm on large scale of networks. In a centralized architecture, the authors
of [22] proposed a hybrid spectrum sensing method, after creating one of the most trusted spectrums sensing
mechanism. The suggested model showed an improvement after comparison with various spectrum sensing
methodologies.
Figure 2. The operating of the mono-scheduler and multi-scheduler algorithms
2.2. Principles of the mono and multi scheduler algorithms
In [7], the authors implemented a first algorithm, namely mono-scheduler, to assign the only free
channel to different SUs. This algorithm produced a Scheduling String (SS) and used the standard deviation as
a metric for evaluating the fairness among the groups of SUs. Its complexity is of order 2, in terms of the total
number of packets. The same authors proposed in [5] another algorithm, as an extension of the first, namely
multi-scheduler, with a complexity of order 3. This second version improved the mono-scheduler in terms of
the number of the free used channels. In the same paper, they used the SS, the States matrix noted S, and the
JEI to affect the free channels to the SUs, based on the equity measure, between the groups of SUs. Both [5, 7],
considered the fairness among the groups of SUs, but not between the SUs themselves.
Because of the importance of these two algorithms, i.e. mono-scheduler and multi-scheduler, in the
present work; we propose to explain the operating principles. To do this, we consider an example of CRN
containing:
(i) Two groups of SUs: G1 and G2, such as: G1 has two SUs: SU11 and SU12, each one has three packets;
while G2 has four SUs: SU21, SU22, SU23 and SU24; with two packets for each one as shown in Figure
2;
(ii) Eight for both: number of PUs and that of channels;
After the application of the mono-scheduler algorithm, we obtained: SS = (G1, 1)(G2, 1)(G1, 2)(G2, 1). The
first component (G1, 1) of SS signifies that G1 transmits one line of packets. This line contains two packets,
because G1 has two SUs. The second component(G2, 1) indicates that after the transmission of the first line of
G1, G2 transmits one line, which contains four packets, since G2 has four SUs, and so on. On the other hand,
the application of the multi-scheduler algorithm took two arguments: SS and S. This last indicates the state
of each channel, during each time slot. To simplify the study, we considered that, the channels have the same
capacity. In this case, we were interested only, in the number of the free channels during each time slot, while
all channels operated in the same manner. Therefore, S becomes a row vector, containing in each component,
the number of the free channels, during a given time slot. Then, for the example illustrated in Figure 2, we can
write: S = (3, 2, 3, 4, 3, 2, 1, 5)T
. After applying the multi-scheduler algorithm for such example, we could
distribute the packets, on the free channels, as shown in Figure 2.
In [16], the authors treated the fairness between the transfer rates of SUs, rather than that between the transfer
rates of groups [5, 7]. They are two Contributions of the present paper:
Equity-based free channels assignment for secondary... (Said Lakhal)
4. 2060 Ì ISSN: 2088-8708
(i) Application of the multi-scheduler algorithm [5], for treating the SUs’ transfer rates rather than that of
groups.
(ii) Enhancement of the SUs’ fairness by 0.65, relative to [16].
2.3. Equity concept
In this work, we are interested in calculating the equity between the transfer rates of the SUs, after the
application of a scheduler algorithm. In the literature, several works have treated the fairness computation, i.e.
fairness metric, among the components of a vector. These works have also studied the properties of this metric.
Let x = (x1, ., xi, ., xn)T
be a vector in Rn
+, with homogeneous components in terms of measurement unit.
In [23], the authors distinguished between four properties of the fairness metric: P1, P2, P3 and P4.
P1: Population size independence: The index should be applicable to any number of components of x, finite
or infinite.
P2: Scale and metric independence: The metric should be independent of the scale of all components.
P3: Boundedness: The index should be bounded by two finite values.
P4: Continuity: Any slight change in this metric value, should show a change of at least one component value.
They proposed a new fairness metric namely JEI, which verifies together these four properties:
JEI(x) =
n
i=1
xi
2
× n
n
i=1
x2
i
−1
.
A value of JEI(x) close to 1 expresses that most of x components are close to their average. By
cons, if they are dispersed around their average, JEI(x) will be close to 0.
3. MODELING THE EQUITY
They are many parameters, which define the modeling of equity. Before beginning this formulation,
we prefer to expose these parameters in Table 2.
Table 1. Symbols and Their Meanings
Symbols Meanings
m, n Number of PUs or channels, and number of current SUs, resp.
MaxSUs, qj, MaxPack Max number of SUs, size queue of SUj, Max number of packets in a queue, resp.
P, Q, e Vector containing the size queue of each SU, vector defined based on P, size of Q, resp.
gj, G, Sif Number of SUs in group Gj, vector of all gj, state of channel i during time slot f, resp.
uf , u, s Number of free channels during time slot f, vector of all values of uf , size of u, resp.
QGi, ti, ri Number of packets of Gi, time for sending all packets of Gi, transfer rate of Gi, resp.
tij, r∗
ij Time spent to transmit all packets of SUij, transfer rate of SUij, resp.
P = (q1, ., qj, ., qn)T
(1)
We note that during a time fraction, a SU may send one packet or not. We organize the SUs by groups [7],
according to the number of packets; such as, a given group, contains all SUs who have the same number of
packets. To do this, we define a new vector Q based on vector P:
Q = (q1, ., qj, ., qe)T
, qi = qj, ∀(i = j, j) ∈ {1, ., e}
2
, (e ≤ n), G = (g1, ., gj, ., ge)T
(2)
We have m channels, and during each time slot, we can find a certain number of free channels. Like that, the
state of the CRN is defined by the states of all channels. These states are organized in the matrix S:
Sif =
1 if channel i is free,
during time slot f;
0 if not.
(3)
The number of free channels during a time slot is stored in vector: u = (u1, ., uf , ., us)T
(4)
IJECE, Vol. 9, No. 3, June 2019 : 2057 – 2063
5. IJECE ISSN: 2088-8708 Ì 2061
During the time slot f, we have uf free channels: uf =
m
i=1
Sif , f ∈ {1, ., s}
(5)
The total number of packets of the group Gi in noted QGi. It is obtained by summing the number of packets
of all
SUs form group Gi. By using (2), we can write: QGi = qi ×gi
(6)
To calculate the transfer rates of groups and those of SUs, we must know the necessary number of passing time
slots, for sending all packets.
Let ti and ri be the necessary number of passing time slots for sending all packets and the transfer rate of Gi,
resp.
ri = QGi × t−1
i = (qi × gi) × t−1
i (7)
Let SUij be the jth
SU of Gi. We consider that SUij needs tij time slots, for sending all his packets. So, the
transfer rate r∗
ij of SUij, will be given by:
r∗
ij = qi × t−1
ij (8)
Since SUij is a member of Gi. Then, this last completes the transmission of his packets, only after the trans-
mission of all packets of his SUs. Thus, we have the following inequality:
ti − (gi − 1) ≤ tij ≤ ti, ∀j ∈ {1, ., gi} (9)
Let r and r∗
be the vectors containing all transfer rates, of all groups and SUs, respectively.
r = (r1, ., ri, ., re)T
, r∗
= (r∗
11, ., r∗
1g1
; .; r∗
i1, ., r∗
igi
; .; r∗
e1, ., r∗
ege
)T
(10)
JEI(q) =
n
i=1
qi
2
× n
n
i=1
q2
i
−1
, JEI(QG) =
e
i=1
QGi
2
× e
e
i=1
QG2
i
−1
(11)
JEI(r) =
e
i=1
ri
2
× e
e
i=1
r2
i
−1
, JEI(r∗
) =
e
i=1
gi
k=1
r∗
ik
2
× n
e
i=1
gi
k=1
r∗
ik
2
−1
. (12)
4. EXPERIMENTATIONS
We consider four scenarios, containing two, three, four and five groups of SUs, respectively. After,
we apply the mono and multi-scheduler algorithms. As a result, we deduct the JEI of the users’ rates, which
are exposed in Figures 3 and 4.
In all the Figures, we can easily notice that the equities obtained by using our model are very important
compared to those of the model [16]. On average, this difference reaches 0.64, which is explained by the parallel
transmission of several packets via several channels in our model. As a result, the users’ transfer rates are very
close and the equities are very important. By cons, the model of [16] used a single transmission channel,
therefore, the standard deviation of the users’ transfer rates is very important; then, the equities are very low.
Figure 3. Groups’ equities, obtained by using the two models
Equity-based free channels assignment for secondary... (Said Lakhal)
6. 2062 Ì ISSN: 2088-8708
Figure 4. SUs’ equities, obtained by using the two models
5. CONCLUSION
In this work, we have improved the equity of a previous work, by using a new model. The performance
improvement can be explained by the increase of the number of used channels processed by the multi scheduler
algorithm. Without forgetting the importance of the monoscheduler, which resides in the establishment of the
scheduling chain.
REFERENCES
[1] Mitola J., ”Cognitive radio: an integrated agent architecture for software defined radio,” Ph. D. dissertation,
Royal Institute of Technology (KTH), Sweden, pp. 8-13, 2000.
[2] I.Akyildiz et, al., ”NeXt generation/ dynamic spectrum access/ cognitive radio wireless networks A survey,”
Computer Networks, vol. 50, pp. 2127-2159, 2006.
[3] A.Khan et, al., ”Research Challenges of Cognitive Radio,” IJERT, vol. 1, 2012.
[4] P.Bhattacharya et, al., ”Smart Radio Spectrum Management for Cognitive Radio,” arXiv:1109.0257 [cs],
2011.
[5] A.Idrissi and S.Lakhal, ”Equity between secondary users in a cognitive radio network,” Wseas, vol. 13, pp.
90-98, 2014.
[6] Y.Z.S.Maharjan et, al., ”Distributed spectrum sensing in cognitive radio networks with fairness considera-
tion: Efficiency of correlated equilibrium,” Mobile Adhoc and Sensor Systems, pp. 540-549, 2011.
[7] A.Idrissi and S.Lakhal, ”An algorithm for fairness between secondary users in cognitive radio network,”
JATIT, vol. 8, 2013.
[8] A.Garhwal and P.Bhattacharya, ”A suervey on dynamic spectrum acces techniques for cognitive ra-
dio,”arXiv preprint arXiv, pp. 1201-1964, 2012.
[9] B.Benmammar et, al. ”A survey on dynamic spectrum acces techniques in cognitive radio net-
works,”IJCNIS, vol. 5, pp. 68-79, 2013.
[10] HT.Cheng and W.Zhuang, ”Simple channel sensing order in cognitive radio networks,”IEEE JSAC, vol.
29, pp. 676-688, 2011.
[11] R.Urgaonkar and M.Neely, ”Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio
Networks,” IEEE transactions on mobile computing”, vol. 8, pp. 766-777, 2009.
[12] S.Li et, al., ”Maximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks,”
IEEE/ACM Transactions on Networking, vol. 22, pp. 1245-1256, 2014.
[13] L.Akter and B.Natarajan, ”Modeling Fairness in Resource Allocation for Secondary Users in a Competi-
tive Cognitive Radio Network,” Wireless Telecommunications Symposium IEEE, pp. 1-6, 2010.
[14] D.Damodaram and T.Venkateswarlu, ”Efficient Hardware Architecture for Cyclostationary Detec-
tor,”Bulletin of Electrical Engineering and Informatics, vol.5, no.3, pp. 340-346, 2016.
[15] E.A.S.Kang and R.Vig, ”Impact of Next Generation Cognitive Radio Network on the Wireless Green
Eco system through Signal and Interference Level based K Coverage Probability,”Indonesian Journal of
Electrical Engineering and Informatics (IJEEI), vol. 5, no.1, pp. 69-76, 2017.
[16] S.Lakhal and A.Idrissi., ”Queues management of secondary users in a cognitive radio network,” in
NGNS14, pp. 302-307,2014.
[17] C.Berk et, al., ”QoS-Aware User Cohabitation Coordinator in Cognitive Radio Networks,” IEEE Globe-
com, pp. 1356-1361, 2012.
[18] Y.Ma et, al., ”A Subcarrier-Pair Based Resource Allocation Scheme Using Proportional Fairness for Co-
IJECE, Vol. 9, No. 3, June 2019 : 2057 – 2063
7. IJECE ISSN: 2088-8708 Ì 2063
operative OFDM-Based Cognitive Radio Networks,” Sensors, vol. 13, pp. 10306-10332, 2013.
[19] Q.Liang et, al., ”A distributed centralized scheme for Short and Long Term Spectrum Sharing with a
Random Leader in Cognitive Radio Networks,”IEEE JSAC, vol. 30, pp. 2274-2284, 2012;
[20] F.Yao et, al., ”Distributed Clustering in Cognitive Radio Ad Hoc Networks Using Soft-Constraint Affinity
Propagation,” Radioengineering, 2012.
[21] S.Maharjan et, al., ”Distributed Spectrum Sensing in Cognitive Radio Networks with Fairness Consid-
eration, Efficiency of Correlated Equilibrium,” In IEEE International Conference on Mobile Ad-Hoc and
Sensor Systems, pp. 540-549, 2011:
[22] A.S.Khobragade and R.D.Raut, ”Hybrid Spectrum Sensing Method for Cognitive Radio,” International
Journal of Electrical and Computer Engineering (IJECE), vol.7, no. 5, pp. 2683-269551, 2017.
[23] Jain R et, al., ”A Quantitive Measure of Fairness and Discrimination for Resource Allocation in Shared
Computer Systems,” Eastern Research Laboratory, Digital Equipment Corporation Hudson, vol. 38, 1984.
BIOGRAPHIES OF AUTHORS
S. Lakhal obtained the diploma of application engineer in computer sciences in 1998, from
the University Sidi Mohamed Ben Abdelah, Fes, Morocco, M.Sc. degree in modelization in
2006, from Mohammadia School of Engineering. He is currently a researcher at the Labora-
tory of Electronics and Telecommunications, Mohammadia School of Engineers (EMI), Rabat,
Morocco. His current research interests are Computing, Radio cognitive, Algorithmic and com-
plexity, Modelization.
Z. Guennoun received his engineering degree in Electronics and Telecommunications from the
Electronics and Electrical Montefiore Institute, ULG Liege, Belgium in 1987; his M.Sc. degree in
Communication Systems from the EMI School of Engineering, Rabat, Morocco in 1993; and his
PhD degree from the same school in 1996. He visited the Centre for Communication Research
(CCR) in Bristol University, UK, during the period of 1990-1994 to prepare a split PhD. Dur-
ing 1988-1996 he worked as an Assistant Lecturer in the EMI School of engineering, and from
1996 he is working in the same school as a Professor Lecturer. His fields of interest are digital
signal processing, error control coding, speech and image processing. Currently in charge of the
laboratory of Electronics and Telecommunications (LEC) at EMI. IEEE member since 1990; and
member of the Moroccan IEEE section executive committee.
Equity-based free channels assignment for secondary... (Said Lakhal)