SlideShare a Scribd company logo
1 of 39
Download to read offline
TTOOPP
DDOOWWNNLLOOAADDEEDD PPAAPPEERRSS
IInntteerrnnaattiioonnaall JJoouurrnnaall ooff WWiirreelleessss && MMoobbiillee
NNeettwwoorrkkss ((IIJJWWMMNN))
IISSSSNN:: 00997755--33883344 [[OOnnlliinnee]];; 00997755--44667799 [[PPrriinntt]]
hhttttpp::////aaiirrccccssee..oorrgg//jjoouurrnnaall//iijjwwmmnn..hhttmmll
Optimization of 5G Virtual Cell Based Coordinated Multipoint Networks Using Deep
Machine Learning
Mohamed Elkourdi, Asim Mazin and Richard D. Gitlin
Department of Electrical Engineering, University of South Florida Tampa, USA
ABSTRACT
Providing seamless mobility and a uniform user experience, independent of location, is an
important challenge for 5G wireless networks. The combination of Coordinated Multipoint
(CoMP) networks and Virtual- Cells (VCs) are expected to play an important role in achieving
high throughput independent of the mobile’s location by mitigating inter-cell interference and
enhancing the cell-edge user throughput. Userspecific VCs will distinguish the physical cell from
a broader area where the user can roam without the need for handoff, and may communicate with
any Base Station (BS) in the VC area. However, this requires rapid decision making for the
formation of VCs. In this paper, a novel algorithm based on a form of Recurrent Neural
Networks (RNNs) called Gated Recurrent Units (GRUs) is used for predicting thetriggering
condition for forming VCs via enabling Coordinated Multipoint (CoMP) transmission.
Simulation results, show that based on the sequences of Received Signal Strength (RSS) values
of different mobile nodes used for training the RNN, the future RSS values from the closest three
BSs can be accurately predicted using GRU, which is then used for making proactive decisions
on enabling CoMP transmission and forming VCs.
KEYWORDS
Coordinated multipoint (CoMP), machine learning (ML), self-organizing networks (SON),
recurrent neural networks (RNN), gated recurrent unit (GRU).
For More Details : http://aircconline.com/ijwmn/V10N4/10418ijwmn01.pdf
Volume Link : http://airccse.org/journal/jwmn_current18.html
REFERENCES
[1] J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. K. Soong, and J. C. Zhang, “What
will 5G be?” IEEE Journal on Selected Areas in Communications, vol. 32, no. 6, pp. 1065–1082, June
2014.
[2] J. Zhang and J. G. Andrews, "Adaptive Spatial Intercell Interference Cancellation in Multicell
Wireless Networks," in IEEE Journal on Selected Areas in Communications, vol. 28, no. 9, pp. 1455-
1468, December 2010. doi: 10.1109/JSAC.2010.101207.
[3] S. Deb, P. Monogioudis, J. Miernik and J. P. Seymour, "Algorithms for Enhanced Inter-Cell
Interference Coordination (eICIC) in LTE HetNets," in IEEE/ACM Transactions on Networking, vol. 22,
no. 1, pp. 137-150, Feb. 2014.doi: 10.1109/TNET.2013.2246820
[4] H. Dahrouj and Wei Yu, “Coordinated beamforming for the multi-cell multi-antenna wireless
system,” in Proc. 42nd Annual Conference on Information Sciences and Systems, 2008, pp. 429-434.
[5] J. Kim, H. W. Lee, and S. Chong, “Virtual cell beamforming in cooperative networks,” IEEE J. Sel.
Areas Commun., vol. 32, no. 6, pp. 1126-1138, 2014.
[6] Y. Luo, P. N. Tran, C. An, J. Eymann, L. Kreft, and A. Timm-Giel, “A novel handover prediction
scheme in content centric networking using nonlinear autoregressive exogenous model,” in Proc. IEEE
Vehicular Technology Conference, 2013, pp. 1-5.
[7] U. Javed, D. Han, R. Caceres, J. Pang, S. Seshan, and A. Varshavsky, “Predicting handoffs in 3G
networks,” SIGOPS Oper. Syst. Rev., vol. 45, no. 3, pp. 65-70, 2011.
[8] S. Liou and Y. Huang, “Trajectory predictions in mobile networks,” International Journal of
Information Technology, vol. 11, no. 11, pp. 109- 122, 2005.
[9] T. Anagnostopoulos, C. Anagnostopoulos, S. Haadjiefthymiades, M. Kyriakakos, and A. Kalousis,
“Predicting the location of mobile users: a machine learning approach,” in Proc. International Conference
on Pervasive Services, 2009, pp. 65-72.
[10] T. Anagnostopoulos, C. B. Anagnostopoulos, S. Haadjiefthymiades, A. Kalousis , and M.
Kyriakakos, “Path prediction through data mining,” in Proc. IEEE International Conference on Pervasive
Services,
2007, pp. 128-135.
[11] D. S. Wickramasuriya, C. A. Perumalla, K. Davaslioglu and R. D. Gitlin, "Base station prediction
and proactive mobility management in virtual cells using recurrent neural networks," 2017 IEEE 18th
Wireless and Microwave Technology Conference (WAMICON), Cocoa Beach, FL, 2017, pp. 1-6.doi:
10.1109/WAMICON.2017.7930254.
[12] K. Davaslioglu and E. Ayanoglu, “Interference-based cell selection in heterogeneous networks,” in
Proc. ITA Workshop, San Diego, 2013, pp. 1- 6.
[13] K. Cho, J. Chung, C. Gulcehre, and Y. Bengio, “Empirical evaluation of gated recurrent neural
networks on sequence modeling,” 2014. [Online]. Available: https://arxiv.org/pdf/1412.3555.
Emerging Wireless Technologies in the Internet of Things : A Comparative
Study
Shri Guru Govind Singh Institute of Technology, Nanded. MS. India
School of Computing, Engineering and Mathematics, Western Sydney University, Sydney,
Australia
ABSTRACT
The Internet of Things (IoT) incorporates multiple long-range, short-range, and personal area
wireless networks and technologies into the designs of IoT applications. This enables numerous
business opportunities in fields as diverse as e-health, smart cities, smart homes, among many
others. This research analyses some of the major evolving and enabling wireless technologies in
the IoT. Particularly, it focuses on ZigBee, 6LoWPAN, Bluetooth Low Energy, LoRa, and the
different versions of Wi-Fi including the recent IEEE 802.11ah protocol. The studies evaluate
the capabilities and behaviours of these technologies regarding various metrics including the data
range and rate, network size, RF Channels and Bandwidth, and power consumption. It is
concluded that there is a need to develop a multifaceted technology approach to enable
interoperable and secure communications in the IoT.
KEYWORDS
Internet of Things, Wireless Technologies, Low-power, M2M Communications.
For More Details : http://aircconline.com/ijwmn/V8N5/8516ijwmn05.pdf
Volume Link : http://airccse.org/journal/jwmn_current16.html
REFERENCES
[1] B. Sanou, "The World in 2013: ICT facts and figures," International Telecommunications Union,
2013.
[2] C. V. N. Index, "Global mobile data traffic forecast update, 2010-2015," White Paper, February, 2011.
[3] C. V. N. Index, "The zettabyte era–trends and analysis," Cisco white paper, 2013.
[4] L. Li, H. Xiaoguang, C. Ke, and H. Ketai, "The applications of WiFi-based wireless sensor network in
internet of things and smart grid," in 2011 6th IEEE Conference on Industrial Electronics and
Applications (ICIEA), 2011, pp. 789-793.
[5] R. Want, B. N. Schilit, and S. Jenson, "Enabling the internet of things," Computer, pp. 28-35, 2015.
[6] D. Christin, A. Reinhardt, P. S. Mogre, and R. Steinmetz, "Wireless Sensor Networks and the Internet
of Things: Selected Challenges," presented at the The 8th GI/ITG
KuVSFachgesprächDrahtloseSensornetze,
2009.
[7] Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. Mccann, and K. Leung, "A survey on the ietf protocol suite
for the internet of things: Standards, challenges, and opportunities," IEEE Wireless Communications, vol.
20, pp. 91-98, 2013.
[8] S. Lee, D. Yoon, and A. Ghosh, "Intelligent parking lot application using wireless sensor networks,"
in International Symposium on Collaborative Technologies and Systems, 2008, pp. 4857.
[9] W. Lemstra, V. Hayes, and J. Groenewegen, The innovation journey of Wi-Fi: The road to global
success: Cambridge University Press, 2010.
[10] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, et al., "Scaling up MIMO:
Opportunities and challenges with very large arrays," IEEE Signal Processing Magazine, vol. 30, pp. 40-
60, 2013.
[11] E. Perahia and R. Stacey, Next Generation Wireless LANs: 802.11 n and 802.11 ac: Cambridge
university press, 2013.
[12] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor Networks: A
Survey," Computer Networks, vol. 38, pp. 393-422, 2002.
[13] L. Verma, M. Fakharzadeh, and S. Choi, "WiFi on Steroids: 802.11 ac and 802.11 ad," IEEE
Wireless Communications, vol. 20, pp. 30-35, 2013.
[14] T. Adame, A. Bel, B. Bellalta, J. Barcelo, and M. Oliver, "IEEE 802.11 AH: theWiFi approach for
M2M communications," IEEE Wireless Communications, vol. 21, pp. 144-152, 2014.
[15] IEEE. (2015, 30/05/2014). IEEE P802.11 Sub 1GHz Study Group. Available:
http://www.ieee802.org/11/Reports/tgah_update.html
[16] E. Khorov, A. Lyakhov, A. Krotov, and A. Guschin, "A survey on IEEE 802.11 ah: An enabling
networking technology for smart cities," Computer Communications, pp. 53-69, 2014.
[17] T. Adame, A. Bel, B. Bellalta, J. Barcelo, J. Gonzalez, and M. Oliver, "Capacity analysis of IEEE
802.11 ah WLANs for M2M communications," in Multiple Access Communcations, ed: Springer, 2013,
pp. 139- 155.
[18] Qualcomm. (2014, 12/10/2014). Improving whole home coverage and power efficiency. Available:
https://www.qualcomm.com/invention/research/projects/wi-fi-evolution/80211ah
[19] O. Raeesi, J. Pirskanen, A. Hazmi, T. Levanen, and M. Valkama, "Performance evaluation of IEEE
802.11 ah and its restricted access window mechanism," in 2014 IEEE International Conference on
Communications Workshops (ICC), 2014, pp. 460-466.
[20] S. Aust, R. V. Prasad, and I. G. Niemegeers, "Outdoor long-range WLANs: a lesson for IEEE 802.11
ah," IEEE Communications Surveys & Tutorials, vol. 17, pp. 1761-1775, 2015.
[21] P. Valerio. (2014) Can Sub-1GHz WiFi Solve The IoT Connectivity Issues? The New Global
Enterprise. Available: http://www.frontwave.eu/2014_12_01_archive.html
[22] A. B. Flores, R. E. Guerra, E. W. Knightly, P. Ecclesine, and S. Pandey, "IEEE 802.11 af: a standard
for TV white space spectrum sharing," IEEE Communications Magazine, vol. 51, pp. 92100, 2013.
[23] S. K. Mohapatra, R. R. Choudhury, and P. Das, "The Future Directions in Evolving WI-FI:
Technologies, Applications, and Services," International Journal of Next-Generation Networks, vol. 6, pp.
13-22, 2014.
[24] Bluetooth SIG. (2001, 01/05/2014). Bluetooth specification version 1.1. Available:
http://www.bluetooth.com
[25] (2015, 11/12/2014). Bluetooth Smart Technology: Powering the Internet of Things. Available:
http://www.bluetooth.com/Pages/Bluetooth-Smart.aspx
[26] J. Decuir, "Bluetooth Smart Support for 6LoBTLE: Applications and connection questions," IEEE
Consumer Electronics Magazine, vol. 4, pp. 67-70, 2015.
[27] Bluetooth SIG. (2012, 11/04/2015). Bluetooth Core Version 4.0. Available:
https://www.bluetooth.org/Technical/Specifications/adopted.htm
[28] J. Hui and D. Culler. 6LoWPAN: Incorporating IEEE 802.15.4 into the IP architecture. Available:
http://www.ipso-alliance.org/wp-content/media/6lowpan.pdf
[29] M. B. Baria, A. P. Gharge, and N. D. Sheth, "A Review of Zigbee Smart Energy," in International
Journal of Engineering Development and Research, 2014.
[30] N. Baker, "ZigBee and Bluetooth: Strengths and weaknesses for industrial applications," Computing
and Control Engineering, vol. 16, pp. 20-25, 2005.
[31] A. J. Jara, L. Ladid, and A. F. Gómez-Skarmeta, "The Internet of Everything through IPv6: An
Analysis of Challenges, Solutions and Opportunities," JoWUA, vol. 4, pp. 97-118, 2013.
[32] L. Alliance, "LoRa alliance–wide area networks for IoT," ed, 2015.
[33] F. Siddiqui, S. Zeadally, and K. Salah, "Gigabit Wireless Networking with IEEE 802.11 ac:
Technical Overview and Challenges," Journal of Networks, vol. 10, pp. 164-171, 2015. [34] F. Stroud.
(2015, 15/01/2015). 802.11ac. Available: http://www.webopedia.com/TERM/8/802_11ac.html
[35] P. Anitha and C. Chandrasekar, "Energy Aware Routing Protocol ForZigbee Networks," Journal of
Computer Applications (JCA), vol. 4, pp. 92-94, 2011.
[36] P. McDermott-Wells, "What is bluetooth?," IEEE Potentials, vol. 23, pp. 33-35, 2004.
[37] IEEE 802.11 Working Group, "IEEE Standard for Information Technology–Telecommunications
and information exchange between systems–Local and metropolitan area networks–Specific
requirements–Part
11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment
6: Wireless Access in Vehicular Environments," IEEE Std, vol. 802, p. 11, 2010.
[38] A. Dementyev, S. Hodges, S. Taylor, and J. Smith, "Power Consumption Analysis of Bluetooth Low
Energy, ZigBee and ANT Sensor Nodes in a Cyclic Sleep Scenario " Microsoft Research, pp. 1-5, 2013.
[39] B. B. Olyaei, J. Pirskanen, O. Raeesi, A. Hazmi, and M. Valkama, "Performance comparison
between slotted IEEE 802.15. 4 and IEEE 802.1 lah in IoT based applications," in IEEE 9th International
Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon,
France, 2013, pp. 332-337.
A Multi-Path Routing Determination Method for Improving the Energy
Efficiency in Selective Forwarding Attack Detection Based MWSNs
Won Jin Chung and Tae Ho Cho
Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, Republic of
Korea
ABSTRACT
A selective forwarding attack in mobile wireless sensor networks is an attack that selectively
drops or delivers event packets as the compromised node moves. In such an attack, it is difficult
to detect the compromised node compared with the selective forwarding attack occurring in the
wireless sensor network because all sensor nodes move. In order to detect selective forwarding
attacks in mobile wireless sensor networks, a fog computing-based system for a selective
forwarding detection scheme has been proposed. However, since the proposed detection scheme
uses a single path, the energy consumption of the sensor node for route discovery when the
sensor node moves is large. To solve this problem, this paper uses fuzzy logic to determine the
number of multi-paths needed to improve the energy efficiency of sensor networks.
Experimental results show that the energy efficiency of the sensor network is improved by
9.5737% compared with that of the existing scheme after 200 seconds when using the proposed
scheme.
KEYWORDS
Mobile wireless sensor networks, selective forwarding attack, network security, fuzzy logic,
AOMDV routing protocol
For More Details : http://aircconline.com/ijwmn/V10N4/10418ijwmn02.pdf
Volume Link : http://airccse.org/journal/jwmn_current18.html
REFERENCES
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks,"
Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002.
[2] K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad Hoc
Netw., vol. 3, pp. 325–349, 2005.
[3] R.Javad, M.Moradi and A.S.Ismail, "Mobile wireless sensor networks overview," International
Journal of Computer Communications and Networks vol. 2, no. 1, pp. 17-22, 2012
[4] C. Zhu, et al. "A survey on communication and data management issues in mobile sensor networks",
Wireless Commun. Mobile Computing, vol. 14, no. 1, pp. 19-36, 2014
[5] I. Amundson and X. D. Koutsoukos, "A survey on localization for mobile wireless sensor networks."
Mobile entity localization and tracking in GPS-less environnments. Springer, Berlin, Heidelberg, 235-
254, 2009
[6] Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor
networks,” IEEE Communications Surveys & Tutorials, vol. 8, pp. 2-23, 2007
[7] J. Sen, "A survey on wireless sensor network security," arXiv preprint arXiv:1011.1529, 2010.
[8] C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing,"
IETF RFC 3561, 2003
[9] N M. Marina and S. Das, "On-demand multipath distance vector routing in ad hoc networks", IEEE
International Conference on Network Protocols (ICNP), pp. 14–23, 2001
[10] Q. Yaseen, F. AlBalas, and Y. Jararweh, "A fog computing-based system for selective forwarding
detection in mobile wireless sensor networks". Foundations and Applications of Self* Systems, IEEE
International Workshops on. IEEE, 2016
[11] M. Radi, B. Dezfouli, K. A. Bakar and M. Lee, “Multipath routing in wireless sensor networks:
survey and research challenges,” Sensors, vol. 12, pp. 650-685, Jan. 2012
[12] R.U.Anitha and P. Kamalakkannan, "Enhanced cluster based routing protocol for mobile nodes in
wireless sensor network," Pattern Recognition, Informatics and Mobile Engineering (PRIME), 2013
International Conference on. IEEE, pp. 187-193, 2013
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and
Energy Parameters
Shuchita Upadhayaya and Charu Gandhi
Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, India
ABSTRACT
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such
networks is usually limited by the network breakage due to either node mobility or energy depletion of
the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths
becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path
breakages. Thus, to cater such problem, we present a node-disjoint multipath protocol. The metric used to
select the paths takes into account the stability of the nodes and the corresponding links. The proposed
technique is also illustrated with an example.
KEYWORDS
QoS Rrouting, Mobile Ad hoc Networks, Energy-Aware Routing, Multipath Rrouting,
For More Details : http://airccse.org/journal/jwmn/1109s11.pdf
Volume Link : http://airccse.org/journal/j3current.html
REFERENCES
1. D. D. Perkins, H. D. Hughes & C. B. Owen, (2002) “Factors Affecting the Performance of Ad Hoc
Networks,” Proceedings of the IEEE International Conference on Communications (ICC), 2002, pp.2048-
2052.
2. Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu, (2003)"Mobile Ad hoc networking imperatives and
challenges" Ad Hoc Networks, Vol 1, pp.13-64.
3. C.E. Perkins & P. Bhagwat (1994)" Highly Dynamic Destination-Sequenced Distance Vector Routing
(DSDV) for Mobile Computers", ACM SIGCOMM Conference on Communications Architectures,
Protocols and Applications, Vol. 24, pp. 234-244.
4. M. Abolhasan, T.A. Wysocki, & E. Dutkiewicz, (2004) "A Review of Routing Protocols for Mobile Ad
hoc Networks", Ad hoc Networks, Vol. 2, pp. 1-22.
5. David B. Johnson, David A. Maltz, & Josh Broch, "DSR: The Dynamic Source Routing Protocol for
Multi-Hop Wireless Ad Hoc Networks", (2001), Ad Hoc Networking, AddisonWesley , pp. 139-172.
6. C. E. Perkins & E. M. Royer,(2003) "Ad hoc On-Demand Distance Vector Routing (AODV) ", IETF
RFC 3561
7. .Z. Hass & R. Pearlmann, "Zone routing Protocol"(1999),IETF Internet Draft
8. RFC2386.
9. Shigang Chen & Klara Nahrstedt, (1998) ".An Overview of Quality-of-Service Routing for the next
Generation High -Speed Networks: Problems and Solutions", IEEE Network Magazine, vol12, pp. 64 -79.
10. M. K. Marina & S. R. Das, (2001) "On-Demand MultiPath Distance Vector Routing in Ad hoc
Networks",Proceedings of the Ninth International Conference on Network Protocols (ICNP},IEEE
Computer Society Press, pp. 14-23.
11. Jiwon Park, Sangman Moht & Ilyong Chung (2008),” Multipath AODV Routing Protocol in Mobile
Ad Hoc Networks with SINR-Based Route Selection”, International Symposium on Wireless
Communication Systems, IEEE ,pp:682-688.
12. Lei Wang, Lianfang Zhang, Yantai Shu & Miao Dong (2000) ,” Multipath source routing in wireless
ad hoc networks”, Proceedings of Canadian Conference on Electrical and Computer Engineering, Vol 1,
pp. 479-483.
13. S. J. Lee and M. Gerla (2001) "Split Multipath Routing with Maximally Disjoint Paths in Ad hoc
Networks”,Proceedings of the IEEE International Conference on Communications(ICC), Vol 10, pp.
3201-3205.
14. X.Li,(2006), Ph.D thesis on "Multipath Routing and QoS Provisioning in Mobile Ad hoc Networks",
Queen Mary University of London.
15. Zhengyu W, Xiangjun D & Lin C,(2007), " A Grid-Based Energy Aware Node-Disjoint Multipath
Routing Algorithm for MANETs", Proceedings of International Conference on Natural Computation,
Vol. 5, pp. 244-248.
16. Do-Youn H, Eui-Hyeok K & Jae-Sung L, (2006),“ An Energy Aware Source Routing with Disjoint
Multipath Selection for Energy- Efficient Multihop Wireless Ad hoc Networks”, Proceedings of
International Federation for Information Processing, 2006, pp. 41-50.
17. M. Bheemalingaiah, M. M. Naidu, D. Sreenivasa Rao & G. Varaprasad (2009)," Energy Aware Node-
Disjoint Routing in Mobile Ad Hoc Networks", Journal of Theoretical and Applied Information
Technology, pp 416-431.
18. Liansheng T, Ling X, King T. K, M. Lei & Zukennan,(2006), "LAMOR: Lifetime-Aware Multipath
Optimized Routing Algorithm for Video Transmission over Ad hoc Networks", Proceedings of IEEE
Vehicular Technology Conference, Vol. 2, pp. 623-627.
19. W.Su,Sung-Ju Lee & M.Gerla (2000),” Mobility Prediction in Wireless Networks”.,MILCOM 2000,
Vol l, pp.491-495.
20. M. K. Marina & S. R. Das,(2001), "On-Demand MultiPath Distance Vector Routing in Ad hoc
Networks", In Proceedings of the Ninth International Conference on Network Protocols (ICNP}, IEEE
Computer Society Press, pp. 14-23.
21. M. Maleki, K. Dantu & M. Pedram, (2002) "Power-aware source routing protocol for mobile ad hoc
networks", Proceedings of the IEEE international symposium on low power electronics and design,
pp.72-75.
22. D.Kim, Garcia-Luna-Aceves, J.J. Obraczka, K. Cano & J.-C. Manzoni, P.(2003)"Routing mechanisms
for Mobile Ad hoc Networks Based on Energy Drain Rate", Mobile Computing, Vo12, page(s): 161- 173.
A Novel Robust and Low-Complexity Spacetime Codes for Industry 4.0
Systems
Mohamed S. Abouzeid
Department of Electronics and Electrical Communication, Faculty of Engineering, Tanta University,
Egypt
ABSTRACT
This paper proposes different robust and low-complexity space time codes which provide more reliability
for industrial automation. An innovative synchronized uplink system configuration for an Industrial
Environment is proposed. Mathematical framework for estimating the channel phase of each Slave Node
(SN) is developed. Furthermore, the channel is practically estimated based on an innovative method using
parallel sequence spread spectrum (PSSS) implemented in Universal Software Radio Peripheral (USRP).
The proposed space time codes are applied in the uplink of an industrial communication system where the
channel is modelled using Quasi Deterministic Radio Channel Generator (Quadriga) which follows a
geometry-based stochastic approach. Simulation results exposed that the proposed codes surpass
Alamouti code for Industrial Automation. The bit error rate (BER) performance demonstrates that the
achieved coding gain for the proposed codes is higher than Alamouti code leading to more robust
communication. Furthermore, a low complexity decoders based on minimum mean squared error
(MMSE) and zero forcing (ZF) algorithms are designed at the receiver side. The proposed codes give a
predominant execution against the state-of-the-art space time codes for Industry 4.0.
KEYWORDS
Industrial Communication, Space-Time Code, Quadriga, Minimum Mean squared Error decoder, Zero
Forcing Algorithm, Parallel Sequence Spread Spectrum, Software Defined Radio, Factory Automation.
For More Details : http://aircconline.com/ijwmn/V10N5/10518ijwmn01.pdf
Volume Link : http://airccse.org/journal/jwmn_current18.html
REFERENCES
[1] M. Cheffena, "Industrial indoor multipath propagation — A physical-statistical approach," 2014 IEEE
25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC),
Washington DC, pp. 68-72, 2014.
[2] R. Croonenbroeck, A. Wulf, L. Underberg, W. Endemann and R. Kays, "Parallel Sequence Spread
Spectrum: Bit Error Performance under Industrial Channel Conditions," ICOF 2016; 19th International
Conference on OFDM and Frequency Domain Techniques, Essen, Germany, pp. 1-7, 2016.
[3] H. Igor, J. Bohuslava and J. Martin, "Proposal of communication standardization of industrial
networks in Industry 4.0," 2016 IEEE 20th Jubilee International Conference on Intelligent Engineering
Systems (INES), Budapest, pp. 119-124, 2016.
[4] R. Kraemer, M. Methfessel, R. Kays, L. Underberg and A. C. Wolf, "ParSec: A PSSS approach to
industrial radio with very low and very flexible cycle timing," 2016 24th European Signal Processing
Conference (EUSIPCO), Budapest, pp. 1222-1226, 2016.
[5] L. Underberg, A. Wulf, R. Croonenbroeck, W. Endemann and R. Kays, "Parallel Sequence Spread
Spectrum: Analytical and simulative approach for determination of bit error probability," 2016 IEEE 21st
International Conference on Emerging Technologies and Factory Automation (ETFA), Berlin, pp. 1-8,
2016.
[6] T. Olofsson, A. Ahlén and M. Gidlund, "Modeling of the Fading Statistics of Wireless Sensor
Network Channels in Industrial Environments," in IEEE Transactions on Signal Processing, vol. 64, no.
12, pp. 3021-3034, June15, 2016.
[7] S. Li, J. Zhang and X. Mu, "Noncoherent Massive Space-Time Block Codes for Uplink Network
Communications," in IEEE Transactions on Vehicular Technology, 2018.
[8] S. S. H. Bidaki, S. Talebi and M. Shahabinejad, "A Full-Rate Full-Diversity 2x2 Space-Time Block
Code with Linear Complexity for the Maximum Likelihood Receiver," in IEEE Communications Letters,
vol. 15, no. 8, pp. 842-844, August 2011.
[9] S. Kumagai, Y. Seki and F. Adachi, "Joint Tx/Rx Signal Processing for Distributed Antenna
MUMIMO Downlink," 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC,
pp. 1-5, 2016.
[10] . D. Nguyen, J. Joung and S. Sun, "Precoder design for distributed antenna systems (DAS) with
limited channel state information," 2015 IEEE International Conference on Communications (ICC),
London, pp. 1733-1738, 2015.
[11] H. Kim, S.-R. Lee, K.-J. Lee, and I. Lee, “Transmission schemes based on sum rate analysis in
distributed antenna systems,” IEEE Trans. Wireless Commun., vol. 11, no. 3, pp. 1201–1209, Mar. 2012.
[12] A. Liu and V. K.N. Lau, “Joint power and antenna selection optimization for energy efficiency in
large cloud radio access networks,” IEEE Trans. Signal Process., vol. 62, no. 5, pp. 1319–1328, Mar.
2014.
[13] J. Joung, Y. K. Chia, and S. Sun, “Energy-efficient, large-scale distributed-antenna system for
multiple users,” IEEE J. Sel. Topics Signal Process., vol. 8, pp. 954–965, Sep. 2014.
[14] E. Tanghe, W. Joseph, J. De Bruyne, L. Verloock and L. Martens, “The industrial indoor channel:
Statistical analysis of the power delay profile,” AEU-International Journal of Electronics and
Communications, pp. 806-812, 2010.
[15] A. F. Molisch, K. Balakrishnan , et al. "IEEE 802.15. 4a channel model-final report." IEEE P802
15.04, 2004.
[16] C. Valenzuela et al., “Capacity growth of multi-element arrays in indoorand outdoor wireless
channels,” Proc. IEEE Wireless Commun. Netw. Conf., vol. 3, pp. 1340–1344, 2000.
[17] M. El-Absi, S. Galih, M. Hoffmann, M. El-Hadidy and T. Kaiser, "Antenna Selection for Reliable
MIMO-OFDM Interference Alignment Systems: Measurement-Based Evaluation," in IEEE Transactions
on Vehicular Technology, vol. 65, no. 5, pp. 2965-2977, May 2016.
[18] B. Holfeld, et al., "Radio channel characterization at 5.85 GHz for wireless M2M communication of
industrial robots," 2016 IEEE Wireless Communications and Networking Conference, Doha, pp. 1-7,
2016.
[19] Y. Li, X. Zhang, M. Peng and W. Wang, "Power Provisioning and Relay Positioning for Two-Way
Relay Channel With Analog Network Coding," in IEEE Signal Processing Letters, vol. 18, no. 9, pp. 517-
520, Sept. 2011.
[20] J. Miranda et al., "Path loss exponent analysis in Wireless Sensor Networks: Experimental
evaluation," 11th IEEE International Conference on Industrial Informatics (INDIN), Bochum, pp. 54- 58,
2013.
[21] K. KrishneGowda, T. Messinger, A. C. Wolf, R. Kraemer, I. Kallfass, and J. C. Scheytt, “Towards
100 Gbps Wireless Communication in THz Band with PSSS Modulation: A Promising Hardware in the
Loop Experiment,” in Ubiquitous Wireless Broadband (ICUWB), 2015 IEEE International Conference
on, Oct 2015, pp. 1–5.
[22] IEEE, “IEEE Std 802.15.4-2011, IEEE Standard for Local and metropolitan area networks, Part 15.4:
Low-Rate Wireless Personal Area Networks,” 2011.
[23] M. Abouzeid, et al. “Robust and low-complexity space time code for industrial automation” 10th
International Conference on Advanced Infocomm Technology (ICAIT), Sweden, 2018.
[24] LI, Shuai, et al. “A novel and robust timing synchronization method for SC-FDE 60GHz WPAN
systems. ”, IEEE 14th International Conference on Communication Technology (ICCT), 2012.
[25]S. Jaeckel, L. Raschkowski, K. Borner, L. Thiele, F. Burkhardt, and E. Eberlein “ QuaDRiGa- Quasi
Deterministic Radio Channel Generator, User Manual and Documnetation”, Fraunhofer Heinrich Herz
Institute, Tech. Rep. v1.4.1-551, 2016.
LACBER: New Location Aided Routing Protocol For GPS Scarce Manet
Dipankar Deb1
, Srijita Barman Roy2
, and Nabendu Chaki3
1
Netaji Subhas Mahavidyalaya, Department of Higher Education of Tripura, India
2
R.T. College, Department of Higher Education of Tripura, Agartala, India
3
Department of Computer Science & Engineering, University Calcutta, India
ABSTRACT
Completely GPS-free positioning systems for wireless, mobile, ad-hoc networks typically stress on
building a network-wide coordinate system. Such systems suffer from lack of mobility and high
computational overhead. On the other hand, specialized hardware in GPS-enabled nodes tends to increase
the solution cost. A number of GPS free position based routing algorithms have been studied by the
authors before proposing a new positioning framework in this paper. The proposed positioning
framework is characterized by using only a handful of GPS enabled nodes. Lower dependence on
specialized GPS hardware reduces the total cost of implementing the framework. A new location aided
routing protocol called Location Aided Cluster Based Energy-efficient Routing (LACBER) has been
proposed in the paper. Simulation results show that using the proposed positioning framework, LACBER
turns out to be efficient in lowering mean hop and hence in utilizing the limited energy of mobile nodes.
KEYWORDS
Routing Protocols, GPS-free positioning, mobility, Location Aided Routing
For More Details : http://airccse.org/journal/nsa/0809smn02.pdf
Volume Link : http://airccse.org/journal/j3current.html
REFERENCES
[1] Capkun, S.; Hamdi, M.; Hubaux, J.-P. “GPS free positioning in mobile ad-hoc networks”, Cluster
Computing Journal, Volume 5, Issue 2, pp. 157-167; April 2002.
[2] Antonio Caruso, Stefano Chessa, Swades De, Ro Urpi; "GPS free coordinate assignment and routing
in wireless sensor networks"; Proc. of the IEEE INFOCOM, pp. 150-160, 2005.
[3] Huseyin Akcan , Vassil Kriakov, Nerve Bronnimann. “GPS-Free node localization in mobile wireless
sensor networks”, Proceedings of the 5th ACM international workshop on Data engineering for wireless
and mobile access.” pp. 35 – 42, 2006
[4] Qing Yang Lim, A. Agrawal, P. “GPSFR: GPS-Free Geographic Routing Protocol for Intelligent
Vehicles.” Proceedings of First International Conference on Communications and Networking in China,
pp.: 1-8, 2006.
[5] Oh-Heum Kwon, Ha-Joo Song, “Counting-Based Distance Estimations and Localizations in Wireless
Sensor Networks.” Springer, Volume 3983/2006. Pages 306-315. 2006
[6] Iyengar, R. Sikdar, B; "Scalable and distributed GPS free positioning for sensor networks";
Proceedings of IEEE conference on communication ICC 2003, Volume 1, page(s): 338- 342, 2003.
[7] Caruso, A. Chessa, S. De, S. Urpi, A; "GPS free coordinate assignment and routing in wireless sensor
networks"; INFOCOM 2005. Proceedings of 24th Annual Joint Conference of the IEEE Computer and
Communications Societies INFOCOM 2005; Volume: 1, pp.: 150- 160, 2005.
[8] Hung-Chi Chu, Rong-Hong Jan. “A GPS-less, outdoor, self-positioning method for wireless sensor
networks”, Ad Hoc Networks, Elsevier Science ,Volume 5, Issue 5, pp. 547-557, 2007.
[9] Dongni Li, “A Novel Cluster-Based Routing Algorithm in Ad Hoc Networks” Proceedings of
International Conference on Computational Intelligence and Security, on page(s): 1053-1057, 2007.
[10] Heidemann, J.; Bulusu, N.; Estrin, D. “GPS-less low cost outdoor localization for very small
devices”, Proceedings of IEEE Personal Communications Magazine, Vol. 7 No. 5, pp. 24-28, 2000.
[11] Chiang, C.C., Wu H.K., Liu W., Gerla M., “Routing in Clustered Multi Hop Mobile wireless
Networks with Fading Channel”, Proceedings of IEEE SICON 1997, pp. 197-211, 1997.
[12] Ko, Young-Bae, Vaidya N.H., “Location-Aided Routing (LAR) in mobile ad hoc network”,Wireless
Networks, vol 6, pp. 307-321, 2000.
Improving MANET Routing Protocols Through the Use of Geographical
Information
Vasil Hnatyshin
Department of Computer Science, Rowan University, Glassboro, NJ, USA
ABSTRACT
This paper provides a summary of our research study of the location-aided routing protocols for mobile ad
hoc networks (MANET). This study focuses on the issue of using geographical location information to
reduce the control traffic overhead associated with the route discovery process of the ad-hoc on demand
distance vector (AODV) routing protocol. AODV performs route discovery by flooding the whole
network with the route request packets. This results in unnecessarily large number of control packets
traveling through the network. In this paper, we introduced a new Geographical AODV (GeoAODV)
protocol that relies on location information to reduce the flooding area to a portion of the network that is
likely contains a path to destination. Furthermore, we also compared GeoAODV performance with that of
the Location Aided Routing (LAR) protocol and examined four mechanisms for reducing the size of the
flooding area: LAR zone, LAR distance, GeoAODV static, and GeoAODV rotate. We employed OPNET
Modeler version 16.0 software to implement these mechanisms and to compare their performance through
simulation. Collected results suggest that location-aided routing can significantly reduce the control
traffic overhead during the route discovery process. The comparison study revealed that the LAR zone
protocol consistently generates fewer control packets than other location-aided mechanisms. However,
LAR zone relies on the assumption that location information and traveling velocities of all the nodes are
readily available throughout the network, which in many network environments is unrealistic. At the same
time, the GeoAODV protocols make no such assumption and dynamically distribute location information
during route discovery. Furthermore, the collected results showed that the performance of the GeoAODV
rotate protocol was only slightly worse than that of LAR zone. We believe that even though GeoAODV
rotate does not reduce the control traffic overhead by as much as LAR zone, it can become a preferred
mechanism for route discovery in MANET.
KEYWORDS
Mobile Ad-Hoc Networks; MANET Routing Protocols; Ad Hoc On Demand Distance Vector Routing;
Location-Aided Routing; Geographical AODV; OPNET Modeler
For More Details: http://airccse.org/journal/jwmn/0413wmn01.pdf
Volume Link : http://airccse.org/journal/jwmn_current13.html
REFERENCES
[1] C. Perkins, E. Belding-Royer, S. Das. (July 2003). Ad hoc On-Demand Distance Vector (AODV)
Routing. IETF RFC 3561. Last accessed on 2013-01-26
[2] E. M. Royer and C. E. Perkins. An Implementation Study of the AODV Routing Protocol, Proc. of the
IEEE Wireless Communications and Networking Conference, Chicago, IL, September 2000
[3] C. E. Perkins and E. M. Royer. Ad hoc On-Demand Distance Vector Routing, Proc. of the 2nd IEEE
Workshop on Mobile Computing Systems and Applications, New Orleans, LA, Feb. 1999,
pp. 90-100
[4] V. Hnatyshin, M. Ahmed, R. Cocco, and D. Urbano, A Comparative Study of Location Aided Routing
Protocols for MANET, Proc. of 4th IEEE IFIP Wireless Days 2011 conference, Niagara Falls, Canada
[5] V. Hnatyshin, and H. Asenov, Design and Implementation of an OPNET model for simulating
GeoAODV MANET routing protocol, Proc. of the OPNETWORK 2010 International Conference,
Session: Wireless Ad Hoc and Wireless Personal Area Networks, Washington DC, August 2010
[6] H. Asenov, and V. Hnatyshin, GPS-Enhanced AODV routing, Proc. of the 2009 International
Conference on Wireless Networks (ICWN'09), Las Vegas, Nevada, USA (July 13-16, 2009)
[7] Y. Ko and N. H. Vaidya, Location-aided routing (LAR) in mobile ad hoc networks, Wireless
Networks, 6(4), July 2000, pp. 307-321
[8] Y. Ko and N. H. Vaidya, Flooding-based geocasting protocols for mobile ad hoc networks, Mobile
Networks and Applications, 7(6), Dec. 2002, pp. 471-480
[9] A. Husain, B. Kumar, A. Doegar, A Study of Location-Aided Routing (LAR) Protocol for Vehicular
Ad Hoc Networks in Highway Scenario, International Journal of Engineering and Information
Technology, 2(2), 2010, pp. 118-124
[10] K.M.E. Defrawy and G. Tsudik, ALARM: Anonymous Location-Aided Routing in Suspicious
MANETs, Proc. of the IEEE International Conference on Network Protocols, 2007, pp. 304-313
[11] D. Deb, S. B. Roy, N. Chaki, LACBER: A new Location-Aided routing protocol for GPS scarce
MANET, International Journal of Wireless & Mobile Networks (IJWMN), 1(1), August 2009
[12] F. De Rango, A. Iera, A. Molinaro, S. Marano, A modified location-aided routing protocol for the
reduction of control overhead in ad-hoc wireless networks, Proc. of the 10th International Conference on
Telecommunications, 2003, pp. 1033 – 1037
[13] Y. Xue, B. Li, A Location-aided Power-aware Routing Protocol in Mobile Ad Hoc Networks, Proc.
of the IEEE Global Telecommunications Conference, San Antonio, TX, November 2001, pp. 2837 – 2841
[14] Y. Wang, L. Dong, T. Liang, X. Yang, X., D. Zhang, Cluster based location-aided routing protocol
for large scale mobile ad hoc networks, IEICE Transactions, 2009, E92-D(5), pp. 1103– 1124
[15] OPNET Modeler ver. 16.0. OPNET Technologies, Inc®, www.opnet.com last visited 2/1/13
[16] Adarshpal S. Sethi and Vasil Y. Hnatyshin, The Practical OPNET User Guide for Computer
Network Simulation, 527 pages, Chapman and Hall/CRC (August 24, 2012), ISBN-10: 1439812055,
ISBN-13: 978-1439812051
[17] H. Cheng, J, Cao, H. Chen and H. Zhang, GrLS: Group-Based Location Service in Mobile Ad Hoc
Networks, IEEE Transactions on Vehicular Technology, Vol. 57, No. 6, November 2008
[18] Gajurel, S., Heiferling, M., A Distributed Location Service for MANET Using Swarm Intelligence,
Mobile WiMAX Symposium, 2009. MWS '09. IEEE, pp. 220 – 225
[19] Yongming Xie, Guojun Wang, Jie Wu, Fuzzy Location Service for Mobile Ad Hoc Networks,
Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, pp. 289 –
296
[20] S. M. Das , H. Pucha and Y. C. Hu Performance comparison of scalable location services for
geographic ad hoc routing, Proc. INFOCOM 2005, vol. 2, pp.1228 -1239
[21] K. Wolfgang , F. Holger and W. Jorg Hierarchical location service for mobile ad hoc networks,
ACM SIGMOBILE Mobile Comput. Commun. Rev. 2004, vol. 8, no. 4, pp. 47 – 58
[22] B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in
MobiCom ’00: Proceedings of the 6th annual international conference on Mobile computing and
networking. New York, NY, USA: ACM Press, August 2000, pp. 243–254.
[23] OPNET Modeler 16.1 Documentation, OPNET Technologies, Inc., 2012.
Device-To-Device (D2D) Communication Under LTE-Advanced Networks
Magri Hicham1
, Noreddine Abghour2
and Mohammed Ouzzif1
1
RITM Research Lab,ESTC , Hassan II University ,Casablanca, Morocco
2
FSAC, Hassan II University,Casablanca, Morocco
ABSTRACT
Device-to-Device (D2D) communication is a new technology that offer many advantages for the
LTEadvanced network such us wireless peer-to-peer services and higher spectral efficiency. It is also
considered as one of promising techniques for the 5G wireless communications system and used in so
many different fields such as network traffic offloading, public safety, social services and applications
such as gaming and military applications . The goal of this paper is to present advances on the current
3GPP LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of
the D2D types based on the communication spectrum of D2D transmission, namely Inband D2D
communication and Outband D2D communication. Then we present the advantages and disadvantages of
each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under
LTE-A network are described.
KEYWORDS
D2D;LTE-advanced;Inband D2D;Outband D2D;3GPP;5G.
For More Details: http://aircconline.com/ijwmn/V8N1/8116ijwmn02.pdf
Volume Link : http://airccse.org/journal/jwmn_current16.html
REFERENCES
[1] E.SREE HARSHA1, T. TIRUPAL2 “LTE-Advanced Cellular Networks for D2D Communications”
International Journal of Scientific Engineering and Technology Research Volume.03, IssueNo.18,
August-2014.
[2] Arash Asadi ,Qing Wang, , and Vincenzo Mancuso,” A Survey on Device-to-Device Communication
in Cellular Networks” arXiv:1310.0720v6 [cs.GT] 29 Apr 2014.
[3] Doppler, K.; Rinne, M.P.; Janis, P.; Ribeiro, C.; Hugl, K “Device-to-Device Communications;
Functional Prospects for LTE-Advanced Networks” ICC Workshops 2009.
[4] Xuemin Shen “Device-to-Device Communication in 5G Cellular Networks” IEEE Network
March/April 2015 .
[5] Dimitris Tsolkas, Eirini Liotou, Nikos Passas and Lazaros Merakos “LTE-A Access, Core, and
Protocol Architecture for D2D Communication ”Springer International Publishing Switzerland 2014 .
[6] Zhijian Lin • Zhibin Gao • Lianfen Huang • Chi-Yuan Chen • Han-Chieh Chao “Hybrid Architecture
Performance Analysis for Device-to-Device Communication in 5G Cellular Network” © Springer
Science+Business Media New York 2015.
[7] K. Akkarajitsakul, P. Phunchongharn, E. Hossain, and V. K. Bhargava, “Mode selection for
energyefficient D2D communications in LTEadvanced networks: A coalitional game approach,” in
Proceedings of IEEE ICCS, 2012, pp. 488–492.
[8] Chithra B Das “A Study on Device To Device Communication in Wireless Mobile Network”
International Journal of Modern Communication Technologies & Research (IJMCTR) ISSN: 2321- 0850,
Volume-3, Issue-3, March 2015.
[9] T. Peng, Q. Lu, H. Wang, S. Xu, and W. Wang, “Interference avoidance mechanisms in the hybrid
cellular and device-to-device systems,” in Proceedings of IEEE PIMRC, 2009, pp. 617–621.
[10] C.-H. Yu, K. Doppler, C. Ribeiro, and O. Tirkkonen, “Performance impact of fading interference to
device-to-device communication underlaying cellular networks,” in Proceedings of IEEE PIMRC, 2009,
pp. 858–862.
[11] H. E. Elkotby, K. M. Elsayed, and M. H. Ismail, “Exploiting interference alignment for sum rate
enhancement in D2D-enabled cellular networks,” in Proceedings of IEEE WCNC, 2012, pp. 1624– 1629
[12] A.Osseiran, K. Doppler, C. Ribeiro, M. Xiao, M. Skoglund, and J. Manssour, “Advances in device-
todevice communications and Network coding for IMT-Advanced,” ICT Mobile Summit, 2009
[13] C. Xu, L. Song, Z. Han, Q. Zhao, X. Wang, and B. Jiao, “Interference aware resource allocation for
device-to-device communications as an underlay using sequential second price auction,” in Proceedings
of IEEE ICC, 2012, pp. 445–449.
[14] S. Xu, H. Wang, T. Chen, Q. Huang, and T. Peng, “Effective interference cancellation scheme for
device-to-device communication underlaying cellular networks,” in Proceedings of IEEE VTC-Fall,
2010, pp. 1–5.
[15] W. Xu, L. Liang, H. Zhang, S. Jin, J. C. Li, and M. Lei, “Performance enhanced transmission in
device-to-device communications: Beamforming or interference cancellation?” in Proceedings of IEEE
GLOBECOM, 2012, pp. 4296–4301.
[16] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen, “Intracluster deviceto- device relay algorithm with
optimal resource utilization,” IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2315–
2326, Jun. 2013.
[17] X. Bao, U. Lee, I. Rimac, and R. R. Choudhury, “DataSpotting: offloading cellular traffic via
managed device-to-device data transfer at data spots,” ACM SIGMOBILE Mobile Computing and
Communications Review, vol. 14, no. 3, pp. 37–39, 2010.
[18] X. Chen, L. Chen, M. Zeng, X. Zhang, and D. Yang, “Downlink resource allocation for device-
todevice communication underlaying cellular networks,” in Proceedings of IEEE PIMRC, 2012, pp. 232–
237
[19] M. Ji, G. Caire, and A. F. Molisch, “Wireless device-to-device Caching networks: Basic principles
and system performance,”arXiv preprintarXiv:1305.5216, 2013.
[20] H. Min, J. Lee, S. Park, and D. Hong, “Capacity enhancement of an interference limited area for
device-to-device uplink underlaing cellular networks,” IEEE Transactions on Wireles Communications,
vol. 10, no. 12, pp. 3995–4000, December 2011.
[21] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Mikls,and Z. Turnyi, “Design aspects of
network assisted device-to- device communications,” IEEE Communications Magazine, vol. 50, no. 3,
pp.170–177, 2012.
[22] R. Zhang, X. Cheng, L. Yang, and B. Jiao, “Interference-aware Graph based resource sharing for
device-to-device communications underlaying cellular networks,” in Proceedings of IEEE WCNC, 2013,
pp. 140–145.
[23] J. C. Li, M. Lei, and F. Gao, “Device-to-device (D2D) Communication in MU-MIMO cellular
networks,” in Proceedings of IEEE GLOBE COM,2012, pp. 3583–3587.
[24] N. Golrezaei, A. F. Molisch, and A. G. Dimakis, “Base-station assisted device-to-device
communications for high-throughput wire less video networks,” in Proceedings of IEEE ICC, 2012, pp.
7077–7081.
[25] Bin Guo, Shaohui Sun, Qiubin Gao “Interference Management for D2D Communications
Underlying Cellular Networks at Cell Edge” ICWMC 2014 .
[26] S. Shalmashi, G. Miao, and S. Ben Slimane, “Interference management for multiple device-to-device
communications underlaying cellular networks,” IEEE International Symposium on Personal Indoor and
Mobile Radio Communications (PIMRC), 2013, pp. 223-227.
[27] J. Shin, J. P. Choi, and J.-W. Choi , “An autonomous interference avoidance scheme for D2D
communications through frequency overhearing,” International Conference on ICT Convergence (ICTC),
2013, pp. 1074-1075.
[28] H. Min, and J. Lee, “Capacity Enhancement Using an Interference Limited Area for Device-toDevice
Uplink Underlaying Cellular Networks,” IEEE Transactions on Wireless Communications, vol. 10, no.
12, Dec. 2011, pp. 3995-4000.
[29] K. Doppler, M Rinne, C. Wijiting, C. B. Ribeiro, and K. Hugl, “Device-to-Device Communication as
an Underlay to LTE-Advanced Networks,” Communications Magazine, IEEE, vol. 47, no. 12, Dec. 2009,
pp 42-49. Copyright
[30] Ji Lianghai Klein, A. ; Kuruvatti, N. ; Schotten, H.D “System Capacity Optimization Algorithm for
D2D Underlay Operation “Communications Workshops (ICC), 2014 IEEE.
[31] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen, “Intracluster deviceto-device relay algorithm with
optimal resource utilization,” IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2315–
2326, Jun. 2013.
[32] J. C. Li, M. Lei, and F. Gao, “Device-to-device (D2D) communication in MU-MIMO cellular
networks,” in Proceedings of IEEE GLOBECOM,2012, pp. 3583–3587.
[33] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Mikls, and Z. Turnyi, “Design aspects of
network assisted device-to-device communications,” IEEE Communications Magazine, vol. 50, no. 3, pp.
170–177, 2012.
[34] W. ALLIANCE, “Wi-Fi Peer-to-Peer (P2P) Specification v1. 1,” WI-FI ALLIANCE
SPECIFICATION, vol. 1, pp. 1–159, 2010
[35] Z. Alliance, “Zigbee specification,” Document 053474r06, Version, vol. 1, 2006.
[36] S. Bluetooth, “Bluetooth specification version 1.1,” Available HTTP: http://www. bluetooth. com,
2001
[37] A. Asadi and V. Mancuso, “Energy efficient opportunistic uplink Packet forwarding in hybrid
wireless networks,” in Proceedings of the fourth international conference on Future energy systems, 2013.
[38] On the compound impact of opportunistic scheduling and D2D communications in cellular networks,
Accepted for publication in ACM MSWIM, 2013.
[39] C. Xu, L. Song, Z. Han, D. Li, and B. Jiao, “Resource allocation using a reverse iterative
combinatorial auction for device-to-device underay cellular networks,” in Proceedings of IEEE
GLOBECOM, 2012, pp. 4542–4547.
[40] A. Asad , V.Mancuso” On the compound impact of opportunistic scheduling and D2D
communications in cellular networks”, Accepted for publication in ACM MSWIM, 2013.
[41] A. Asad , V.Mancuso” “WiFi Direct and LTE D2D in action,” Accepted for publication in IEEE
Wireless Days, 2013.
[42] N. Golrezaei, A. G. Dimakis, and A. F. Molisch, “Device-to-device collaboration through distributed
storage,” in Proceedings of IEEE GLOBECOM, 2012, pp. 2397–2402.
[43] A. Asadi and V. Mancuso, “Energy efficient opportunistic uplink packet forwarding in hybrid
wireless networks,” in Proceedings of the fourth international conference on Future energy systems, 2013,
pp. 261–262.
[44] R1-132861. Final report of 3GPP TSG RAN WG1 #73 v1.0.0, August 2013.
[45] 3GPP TR 22.803 v12.1.0, “Feasibility study for proximity services (ProSe)” 2013
[46] R1-132115, “Discussions on LTE device to device communication”, ZTE, May 2013
[47] 3GPP TS 29.343 V12.1.0 (2014-12), “Proximity-services (ProSe) function to ProSe application
server aspects (PC2)”; Stage 3 (Release 12).
[48] B.Raghothaman, E. Deng, R. Pragada, G. Sternberg, T. Deng, and K.Vanganuru, “Architecture and
protocols for LTE-based device to device communication,” in Proc. IEEE Int. Conf. Computing,
Networking Communications, San Diego, CA, Jan. 2013, pp. 895–899.
[49] 3GPP TS 23.303 version 12.2.0 Release 12, Proximity-based services (ProSe); Stage.2. ETSI TS 123
303 V12.2.0. 2014-09.
[50] Athul Prasad, Andreas Kunz, Genadi Velev, Konstantinos Samdanis, and JaeSeung Song , Energy
Efficient D2D Discovery for Proximity Services in 3GPP LTE-Advanced Networks. IEEE vehicular
technology magazine ,December 2014.
[51] 3GPP TS 24.334: "Proximity-services (Prose) User Equipment (UE) to Proximity-services (ProSe)
Function aspects (PC3); Stage 3".June2014
[52] 3GPP TS 29.344 V12.3.0 (2015-06), Proximity-services (ProSe) Function to Home Subscriber
Server (HSS) aspects; Stage 3 (Release 12), June 2015.
[53] S. Mumtaz and J. Rodriguez (eds.), Smart Device to Smart Device Communication, DOI:
10.1007/978-3-319-04963-2_1,Springer International Publishing Switzerland 2014.
Mobility Models for Delay Tolerant Network: A Survey
M Shahzamal1
, M F Pervez1
, M A U Zaman1
and M D Hossain2
1
Institute of Electronics, Bangladesh Atomic Energy Commission, Bangladesh
2
Institute of Computer Science, Bangladesh Atomic Energy Commission, Bangladesh
ABSTRACT
Delay Tolerant Network (DTN) is an emerging networking technology that is widely used in the
environment where end-to-end paths do not exist. DTN follows store-carry-forward mechanism to route
data. This mechanism exploits the mobility of nodes and hence the performances of DTN routing and
application protocols are highly dependent on the underlying mobility of nodes and its characteristics.
Therefore, suitable mobility models are required to be incorporated in the simulation tools to evaluate
DTN protocols across many scenarios. In DTN mobility modelling literature, a number of mobility
models have been developed based on synthetic theory and real world mobility traces. Furthermore, many
researchers have developed specific application oriented mobility models. All these models do not
provide accurate evaluation in the all scenarios. Therefore, model selection is an important issue in DTN
protocol simulation. In this study, we have summarized various widely used mobility models and made a
comparison of their performances. Finally, we have concluded with future research directions in mobility
modelling for DTN simulation.
KEYWORDS
Delay Tolerant Networking, Mobility Modelling, DTN Simulation
For More Details: http://airccse.org/journal/jwmn/6414ijwmn10.pdf
Volume Link : http://airccse.org/journal/jwmn_current14.html
REFERENCES
[1] Uddin, Md Yusuf S., David M. Nicol, Tarek F. Abdelzaher, and Robin H. Kravets. "A post-disaster
mobility model for delay tolerant networking." In Winter Simulation Conference, pp. 2785-2796. Winter
Simulation Conference, 2009.
[2] Walker, Brenton D., T. Charles Clancy, and Joel K. Glenn. "Using localized random walks to model
delay-tolerant networks." In Military Communications Conference, 2008. MILCOM 2008. IEEE, pp. 1-7.
IEEE, 2008.
[3] Hossmann, Theus, Thrasyvoulos Spyropoulos, and Franck Legendre. "Putting contacts into context:
Mobility modeling beyond inter-contact times." In Proceedings of the Twelfth ACM International
Symposium on Mobile Ad Hoc Networking and Computing, p. 18. ACM, 2011.
[4] Keränen, Ari, and Jörg Ott. "Increasing reality for dtn protocol simulations." Helsinki University of
Technology, Tech. Rep (2007).
[5] Chaintreau, Augustin, Pan Hui, Jon Crowcroft, Christophe Diot, Richard Gass, and James Scott.
"Impact of human mobility on opportunistic forwarding algorithms." Mobile Computing, IEEE
Transactions on 6, no. 6 (2007): 606-620.
[6] Liang, Ben, and Zygmunt J. Haas. "Predictive distance-based mobility management for PCS
networks." In INFOCOM'99. Eighteenth Annual Joint Conference of the IEEE Computer and
Communications Societies. Proceedings. IEEE, vol. 3, pp. 1377-1384. IEEE, 1999.
[7] Hong, Xiaoyan, Mario Gerla, Guangyu Pei, and Ching-Chuan Chiang. "A group mobility model for
ad hoc wireless networks." In Proceedings of the 2nd ACM international workshop on Modeling, analysis
and simulation of wireless and mobile systems, pp. 53-60. ACM, 1999.
[8] Johnson, David B., and David A. Maltz. "Dynamic source routing in ad hoc wireless networks." In
Mobile computing, pp. 153-181. Springer US, 1996. AT&T Research. Graphviz - Graph Visualization
Software. http://www.graphviz.org/, 2008. [Online; accessed 19-May-2008].
[9] Petz, Agoston, Justin Enderle, and Christine Julien. "A framework for evaluating dtn mobility
models." In Proceedings of the 2nd International Conference on Simulation Tools and Techniques, p. 94.
ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2009.
[10] Miao, Jingwei. "Message dissemination in mobile delay tolerant networks." PhD diss., INSA de
Lyon, 2013.
[11] C. Bettstetter, ”Mobility modeling in wireless networks: categorization, smooth movement and
border effects”, ACM Mobile Computing and Commu. Rev., Jul. 2001.
[12] Bettstetter, Christian. "Mobility modeling in wireless networks: categorization, smooth movement,
and border effects." ACM SIGMOBILE Mobile Computing and Communications Review 5, no. 3 (2001):
55-66.
[13] Royer, Elizabeth M., P. Michael Melliar-Smith, and Louise E. Moser. "An analysis of the optimum
node density for ad hoc mobile networks." In Communications, 2001. ICC 2001. IEEE International
Conference on, vol. 3, pp. 857-861. IEEE, 2001.
[14] Haas, Zygmunt J. "A new routing protocol for the reconfigurable wireless networks." In Universal
Personal Communications Record, 1997. Conference Record., 1997 IEEE 6th International Conference
on, vol. 2, pp. 562-566. IEEE, 1997.
[15] Zaninetti, Lorenzo, and Mario Ferraro. "On the truncated Pareto distribution with applications."
Central European Journal of Physics 6, no. 1 (2008): 1-6.
[16] Karamshuk, Dmytro, Chiara Boldrini, Marco Conti, and Andrea Passarella. "Human mobility
modelsfor opportunistic networks." Communications Magazine, IEEE 49, no. 12 (2011): 157-165.
[17] Rhee, Injong, Minsu Shin, Seongik Hong, Kyunghan Lee, Seong Joon Kim, and Song Chong. "On
the levy-walk nature of human mobility." IEEE/ACM Transactions on Networking (TON) 19, no. 3
(2011): 630-643.
[18] Keränen, Ari, Teemu Kärkkäinen, and Jörg Ott. "Simulating Mobility and DTNs with the ONE."
Journal of Communications 5, no. 2 (2010): 92-105.
[19] Chen, Jing-Chao. "Dijkstra’s shortest path algorithm." Journal of Formalized Mathematics 15 (2003).
[20] Anthru, Shermina V., and T. P. Jayakumar. "Opportunistic Routing Protocols In Human Working
Day Model Delay Tolerant Networks." International Journal Of Engineering And Computer Science,
Volume 3 Issue 5, 2014, PP 5960-5965.
[21] Thakur, Gautam S., Udayan Kumar, Ahmed Helmy, and Wei-Jen Hsu. "Analysis of Spatio-Temporal
Preferences and Encounter Statistics for DTN Performance." arXiv preprint arXiv:1007.0960 (2010).
[22] Bai, Fan, Narayanan Sadagopan, and Ahmed Helmy. "IMPORTANT: A framework to systematically
analyze the Impact of Mobility on Performance of RouTing protocols for Adhoc NeTworks." In
INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications.
IEEE Societies, vol. 2, pp. 825-835. IEEE, 2003.
[23] Musolesi, Mirco, and Cecilia Mascolo. "Designing mobility models based on social network theory."
ACM SIGMOBILE Mobile Computing and Communications Review 11, no. 3 (2007): 59-70.
[24] Boldrini, Chiara, and Andrea Passarella. "Hcmm: Modelling spatial and temporal properties of
human mobility driven by users’ social relationships." Computer Communications 33, no. 9 (2010): 1056-
1074.
[25] Pirozmand, Poria, Guowei Wu, Behrouz Jedari, and Feng Xia. "Human mobility in opportunistic
networks: Characteristics, models and prediction methods." Journal of Network and Computer
Applications 42 (2014): 45-58.
[26] Hsu, Wei-jen, Thrasyvoulos Spyropoulos, Konstantinos Psounis, and Ahmed Helmy. "Modeling
timevariant user mobility in wireless mobile networks." In INFOCOM 2007. 26th IEEE International
Conference on Computer Communications. IEEE, pp. 758-766. IEEE, 2007.
[27] Mahendran, Veeramani, Sivaraman K. Anirudh, and C. Siva Ram Murthy. "A realistic framework
for delay-tolerant network routing in open terrains with continuous churn." In Distributed Computing and
Networking, pp. 407-417. Springer Berlin Heidelberg, 2011.
[28] Lee, Kyunghan, Seongik Hong, Seong Joon Kim, Injong Rhee, and Song Chong. "SLAW: self-
similar least-action human walk." IEEE/ACM Transactions on Networking (TON) 20, no. 2 (2012): 515-
529.
[29] Rhee, I., K. Lee, S. Hong, S. J. Kim, and S. Chong. "Demystifying the levy-walk nature of human
walks." Techical Report, NCSU, http://netsrv. csc. ncsu. edu/export/Demystifying Levy Walk Patterns.
pdf (2008).
[30] Walker, Brenton D., T. Charles Clancy, and Joel K. Glenn. "Using localized random walks to model
delay-tolerant networks." In Military Communications Conference, 2008. MILCOM 2008. IEEE, pp. 1-7.
IEEE, 2008.
[31] Walker, Brenton D., Joel K. Glenn, and T. Charles Clancy. "Analysis of simple counting protocols
for delay-tolerant networks." In Proceedings of the second ACM workshop on Challenged networks, pp.
19-26. ACM, 2007.
[32] Gao, Wei, Qinghua Li, Bo Zhao, and Guohong Cao. "Multicasting in delay tolerant networks: a
social network perspective." In Proceedings of the tenth ACM international symposium on Mobile ad hoc
networking and computing, pp. 299-308. ACM, 2009.
[33] Hossmann, Theus, Thrasyvoulos Spyropoulos, and Franck Legendre. "Know thy neighbor: Towards
optimal mapping of contacts to social graphs for dtn routing." In INFOCOM, 2010 Proceedings IEEE, pp.
1-9. IEEE, 2010.
[34] Shin, Minsu, Seongik Hong, and Injong Rhee. "DTN routing strategies using optimal search
patterns." In Proceedings of the third ACM workshop on Challenged networks, pp. 27-32. ACM, 2008.
Analyses and Performance of Techniques PAPR Reduction for STBC MIMO-
OFDM System in (4G) Wireless Communication
Leila Sahraoui, Djmail Messadeg, Nouredinne Doghmane
Department of Electronics Faculty sciences of Engineering University Baji Mokhtar, Annaba bp 12 el
hadjar, Algeria
ABSTRACT
An OFDM system is combined with multiple-input multiple-output (MIMO) in order to increase the
diversity gain and system capacity over the time variant frequency-selective channels. However, a major
drawback of MIMO-OFDM system is that the transmitted signals on different antennas might exhibit
high peak-to-average power ratio (PAPR).In this paper, we present a PAPR analysis reduction of space-
timeblock-coded (STBC) MIMO-OFDM system for 4G wireless networks. Several techniques have been
used to reduce the PAPR of the (STBC) MIMOOFDM system: clipping and filtering, partial transmit
sequence (PTS) and selected mapping (SLM). Simulation results show that clipping and filtering provides
a better PAPR reduction than the others methods and only SLM technique conserve the PAPR reduction
in reception part of signal.
KEYWORDS
MIMO-OFDM; peak-to-average power ratios; space-time coding system (STBC); clipping and filtering;
SLM; PTS.
For More Details: http://airccse.org/journal/jwmn/5513ijwmn03.pdf
Volume Link : http://airccse.org/journal/jwmn_current13.html
REFERENCES
[1] Ms. V. B. Malode1, Dr. B. P. Patil2, “PAPR Reduction Using Modified Selective Mapping
Technique,” Vol.02, No.2, pp. 626-630 (2010).
[2] S. H. Han and J. H. Lee, “An overview of peak-to-average power ratio reduction techniques for
multicarrier transmission,” IEEE Wireless Commun., Vol. 12, pp. 56–65, April. 2005
[3] T. Jiang and Y. Wu, “An overview: Peak-to-average power ratio reduction techniques for OFDM
signals,” IEEE Trans. Broadcast., Vol. 54, pp. 257–268, June. 2008.
[4] M.-S. Beak, M.J. Kim, Y.-H.You, and H.-K. Song, “Semi-blind estimation and PAR reduction for
MIMO-OFDM system with multiple antennas,” IEEE Trans. Broadcast, Vol. 50, pp. 414-424, Dec. 2004.
[5] R. F. H. Fischer and C. Siegl, “Performance of peak-to-average power ratio reduction in singleand
multi-antenna OFDM via directed selected mapping,” IEEE Trans. Commun., Vol. 57, pp. 3205–3208,
Nov. 2009.
[6] Y. Lou J. Palicot, “A classification of methods for efficient power amplification of signals,” Annals of
Telecommunications, Vol. 63, No. 7-8, pp. 351–368 (2008).
[5] X.Li and L.J.Cimini, “Effects of Clipping and filtering on the Performance of OFDM,” IEEE
Communications Letters, Vol.2, No. 5, pp.131-133, May 1998.
[7] M. Mroué, Amor Nafkha,1 Jacques Palicot,1 Benjamin Gavalda,2 and Nelly dagorne2, Performance
and Implementation Evaluation of TR PAPR Reduction Methods for DVB-T2, ” International Journal of
Digital Multimedia Broadcasting, August 2010.
[8] J. A. Davis and J. Jedwab, “Peak-to-mean power control in OFDM, Golay complementary sequences,
and Reed-Muller codes,” IEEE Transactions on Information Theory, Vol. 45, No. 7, pp. 2397–2417,
1999.
[9] S. H. M¨uller and J. B. Huber, “OFDM with reduced peakto-average power ratio by optimum
combination of partial transmit sequences,” Electronics Letters, Vol. 33, No. 5, pp. 368–369, 1997.
[10] R. W. B¨auml, R. F. H. Fischer, and J. B. Huber, “Reducing the peak-to-average power ratio of
multicarrier modulation by selected mapping,” Electronics Letters, Vol. 32, No. 22, pp. 2056–
2057, (1996).
[11] Radhia Gharsallah, Ridha Bouallegue "Combined with space time coding multi user detection for
CDMA-OFDM/OQAM SYSTEM" International Journal of Wireless & Mobile Networks (IJWMN)
Vol.4, No. 4, August 2012
[12] R. W. B. Auml, R. F. H. Fischer, and J. B. Huber, “Reducing the peak-to- average power ratio of
multicarrier modulation by selected mapping,” Electron. Lett., Vol. 32, No. 22, pp. 2056-2057, Oct. 1996.
[13] X. Li and L. J. Cimini, Jr., “Effect of clipping and filtering on the performance of OFDM,” IEEE
Commun. Lett, Vol. 2, No. 5, pp. 131- 133, May 1998.
[14] Y. A. Khan, M. A. Matin, and S. I. Ferdous, “PAPR Reduction in MIMO-OFDM Systems using
Modified PTS and SLM without Side Information,” International Journal of Communication Networks
and Information Security, Vol. 2, No.3, pp240-247, December 2010.
[15] Yi-Sheng Su, Tsung-Cheng Wu, Chung-Hsuan Wang, and Min-Kuan Chang, “A Low-
complexityCross-Antenna Rotation and Inversion Scheme for PAPR Reduction of STBC MIMO-OFDM
Systems” 16th international workshop on computer aided modeling and design of communication links
and networks (CAMAD) IEEE 2011
[16] P. Mukunthan and P.Dananjayan, “Modified PTS with FECs for PAPR Reduction of OFDM
Signals,” International Journal of Computer Applications, Vol. 11, No.3, pp. 38-43, December 2010.
[17] P.Mukunthan, P.dananjayan, “Modified PTS with FECs for PAPR redaction in MIMO-OFDM
system with different subcarriers,” international symposium of humanities, Science and engineering
Research IEEE 2011
[18] Seung Hee Han and Jae Hong Lee, “Modified selected Mapping Technique for PAPR reduction of
coded OFDM signal,” IEEE Transaction on broadcasting, Vol. 50, No.3, pp.335-341, Sept 2004.
[19] Pawan Sharma, Seema Verma "PAPR reduction of OFDM signals using selective mapping with
turbo codes" International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 4, August 2011
[20] Yang Jie, Chen Lei, Liu Quan and Chan De, “A Modified selected mapping technique to reduce the
Peak to Average Power Ratio of OFDM signal,” IEEE transaction on consumer Electronics, Vol53, No.3,
pp. 846-851, August 2007.
[21] Stefan H.Muller and Johannes B. Huber,“A Comparison of Peak Power Reduction Schemes for
OFDM,” In Proc. of The IEEE Global Telecommunications conference GLOBECOM. 97, Phonix,
Arizona, USA, pp.1-5, Nov. 1997.
[22] Marco Breiling ,Stefan H. Muller-Weinfurtner and Johanes B.Huber, “SLM Peak-Power Reduction
Without Explicit Side Information”, IEEE Communications Letters,Vol. 5, No.6, pp.239-241, JUNE
2001.
[23] Jayalath, A.D.S, Tellainbura, C, “Side Information in PAR Reduced PTS-OFDM Signals,”
Proceedings 14th IEEE Conference on Personal, Indoor and Mobile Radio Communications, Vol.1, Sept
2003.
[24] Oh-Ju Kwon and Yeong-Ho Ha, “Multi-carrier PAP reduction method using sub-optimal PTS with
threshold,” IEEE Transactions on Broadcasting, vol. 49, June 2003.
[25] Suverna Sengar1, Partha Pratim Bhattacharya, “Performance Improvement in OFDM system by papr
reduction”, Signal & Image Processing: An International Journal (SIPIJ) Vol.3, No.2, April 2012.
Frequency and Time Domain Packet Scheduling Based on Channel Prediction
with Imperfect CQI in LTE
Yongxin Wang1
, Kumbesan Sandrasegaran2
, Xinning Zhu3
, Jingjing Fei4
Xiaoying Kong5
and Cheng-
Chung Lin 6
1
FEIT, University of Technology, Sydney, Australia
2
FEIT, University of Technology, Sydney, Australia
3
Beijing University of Post and Telecommunications, Beijing, China
4
CSE, University of New South Wales, Sydney, Australia
5
FEIT, University of Technology, Sydney, Australia
6
FEIT, University of Technology, Sydney, Australia
ABSTRACT
Channel-dependent scheduling of transmission of data packets in a wireless system is based on
measurement and feedback of the channel quality. To alleviate the performance degradation due to
simultaneous multiple imperfect channel quality information (CQI), a simple and efficient packet
scheduling (PS) algorithm is developed in downlink LTE system for real time traffic. A frequency domain
channel predictor based on Kalman filter is first developed to restore the true CQI from erroneous channel
quality feedback. Then, a time domain grouping technique employing the joint of Proportional Fair (PF)
and Modified Largest Weighted Delay First (M-LWDF) algorithms is used. It was proved this proposal
achieves better performance in terms of system throughput and packet loss ratio by simulation results.
KEYWORDS
LTE, packet scheduling, channel estimation, Kalman filter, imperfect CQI
For More Details: http://airccse.org/journal/jwmn/5413ijwmn12.pdf
Volume Link : http://airccse.org/journal/jwmn_current13.html
REFERENCES
[1] K. Kinoshita, "Current Status of “FDMA” 3G service and DoCoMo’s B3G Activities," in ICB3G –
2004, May 2004, pp. 13-21.
[2] 3GPP, Physical Layer Aspects for Evolved Universal Terrestrial Radio Access (UTRA) (Release 7),
2009.
[3] A. Jalali, R. Padovani, and R. Pankaj, "Data throughput of CDMA-HDR a high efficiency-high data
rate personal communication wireless system," in Vehicular Technology Conference Proceedings, 2000.
VTC 2000-Spring Tokyo. 2000 IEEE 51st, 2000, pp. 1854-1858.
[4] M. Stambaugh, "HARQ Process Boosts LTE Communications," Agilent Technologies Sep, 2008.
[5] H. A. M. Ramli, R. Basukala, K. Sandrasegaran, and R. Patachaianand, "Performance of well known
packet scheduling algorithms in the downlink 3GPP LTE system," in Communications (MICC), 2009
IEEE 9th Malaysia International Conference on, 2009, pp. 815-820.
[6] A. Pokhariyal, T. E. Kolding, and P. E. Mogensen, "Performance of Downlink Frequency Domain
Packet Scheduling for the UTRAN Long Term Evolution," in Personal, Indoor and Mobile Radio
Communications, 2006 IEEE 17th International Symposium on, 2006, pp. 1-5.
[7] J. Gross, J. Klaue, H. Karl, and A. Wolisz, "Subcarrier allocation for variable bit rate video streams in
wireless OFDM systems," in Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE
58th, 2003, pp. 2481-2485 Vol.4.
[8] N. Ruangchaijatupon and J. Yusheng, "Simple Proportional Fairness Scheduling for OFDMA
FrameBased Wireless Systems," in Wireless Communications and Networking Conference, 2008. WCNC
2008. IEEE, 2008, pp. 1593-1597.
[9] P. Jeongsik, H. Sungho, and C. Ho-Shin, "A Packet Scheduling Scheme to Support Real-Time Traffic
in OFDMA Systems," in Vehicular Technology Conference, 2007. VTC2007-Spring. IEEE 65th,
2007, pp. 2766-2770.
[10] X. Liu, L. Guangyi, Y. Wang, and P. Zhang, "Downlink Packet Scheduling for Real-Time Traffic in
Multi-User OFDMA System," in Vehicular Technology Conference, 2006. VTC-2006 Fall. 2006 IEEE
64th, 2006, pp. 1-5.
[11] A. Wang, L. Xiao, S. Zhou, X. Xu, and Y. Yao, "Dynamic resource management in the fourth
generation wireless systems," in Communication Technology Proceedings, 2003. ICCT 2003.
International Conference on, 2003, pp. 1095-1098 vol.2.
[12] A. Pokhariyal, K. I. Pedersen, G. Monghal, I. Z. Kovacs, C. Rosa, T. E. Kolding, and P. E.
Mogensen, "HARQ Aware Frequency Domain Packet Scheduler with Different Degrees of Fairness for
the UTRAN Long Term Evolution," in Vehicular Technology Conference, 2007. VTC2007-Spring. IEEE
65th, 2007, pp. 2761-2765.
[13] B. Kian Chung, S. Armour, and A. Doufexi, "Joint Time-Frequency Domain Proportional Fair
Scheduler with HARQ for 3GPP LTE Systems," in Vehicular Technology Conference, 2008. VTC 2008-
Fall. IEEE 68th, 2008, pp. 1-5.
[14] R. A. Akl, S. Valentin, G. Wunder, and S. Stanczak, "Compensating for CQI Aging By Channel
Prediction: The LTE Downlink."
[15] M. R. Souryal and R. L. Pickholtz, "Adaptive modulation with imperfect channel information in
OFDM," in Communications, 2001. ICC 2001. IEEE International Conference on, 2001, pp. 1861- 1865
vol.6.
[16] W. Yafeng and Y. Hongwen, "Retransmission priority scheduling algorithm for forward link packet
data service," in Communication Technology Proceedings, 2003. ICCT 2003. International Conference
on, 2003, pp. 926-930.
[17] I. C. Wong and B. Evans, "Optimal resource allocation in the OFDMA downlink with imperfect
channel knowledge," Communications, IEEE Transactions on, vol. 57, pp. 232-241, 2009.
[18] D. S. W. Hui and V. K. N. Lau, "Delay-sensitive cross-layer designs for OFDMA systems with
outdated CSIT," in Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE,
2007, pp. 264-269.
[19] H. Ayoub and M. Assaad, "Scheduling in OFDMA Systems With Outdated Channel Knowledge," in
Communications (ICC), 2010 IEEE International Conference on, 2010, pp. 1-5.
[20] T. Villa, R. Merz, R. Knopp, and U. Takyar, "Adaptive modulation and coding with hybrid-ARQ for
latency-constrained networks," in European Wireless, 2012. EW. 18th European Wireless Conference,
2012, pp. 1-8.
[21] J.-H. Jeon and Y.-H. Lee, "Prediction of channel information in multi-user OFDM systems," in
Circuits and Systems, 2006. MWSCAS'06. 49th IEEE International Midwest Symposium on, 2006, pp.
468-472.
[22] J. Bonnet and G. Auer, "Chunk-based channel estimation for uplink OFDM," in Vehicular
Technology Conference, 2006. VTC 2006-Spring. IEEE 63rd, 2006, pp. 1555-1559.
[23] D. Aronsson, T. Svensson, and M. Sternad, "Performance evaluation of memory-less and
Kalmanbased channel estimation for OFDMA," in Vehicular Technology Conference, 2009. VTC Spring
2009. IEEE 69th, 2009, pp. 1-5.
[24] R. E. Kalman, "A new approach to linear filtering and prediction problems," Journal of basic
Engineering, vol. 82, pp. 35-45, 1960.
[25] A. G. Orozco-Lugo, F. A. Cruz Prez, and G. Hernandez Valdez, "Investigating the boundary effect
of a multimedia TDMA personal mobile communication network simulation," in Vehicular Technology
Conference, 2001. VTC 2001 Fall. IEEE VTS 54th, 2001, pp. 2740-2744 vol.4.
[26] K. I. Pedersen, G. Monghal, I. Z. Kovacs, T. E. Kolding, A. Pokhariyal, F. Frederiksen, and P.
Mogensen, "Frequency Domain Scheduling for OFDMA with Limited and Noisy Channel Feedback," in
Vehicular Technology Conference, 2007. VTC-2007 Fall. 2007 IEEE 66th, 2007, pp. 1792-1796.
[27] M. Kohler, Using the Kalman filter to track human interactive motion: modelling and initialization of
the Kalman filter for translational motion: Citeseer, 1997.
[28] G. Monghal, K. I. Pedersen, I. Z. Kovacs, and P. E. Mogensen, "QoS Oriented Time and Frequency
Domain Packet Schedulers for The UTRAN Long Term Evolution," in Vehicular Technology
Conference, 2008. VTC Spring 2008. IEEE, 2008, pp. 2532-2536.
Optimization of the Recursive One-Sided Hypothesis Testing Technique for
Autonomous Threshold Estimation in Cognitive Radio
James Odinaka Okonkwo1
and Sylvester Ajah2
1
Department of Telecommunication Engineering, Federal University of Technology Minna, Niger State,
Nigeria
2
Computer Engineering Technology, AkanuIbiam Federal Polytechnic Unwana, Ebonyi State,
Nigeria
ABSTRACT
In this paper, an optimized Recursive One-Sided Hypothesis Testing (ROHT) threshold
estimation algorithm for energy detection based on Cognitive Radio (CR) application is
presented. The ROHT algorithm is well known to compute and correct threshold values based on
the choice of the parameter values; namely the coefficient of standard deviation (z-value) and the
stopping criteria (). A fixed computational process has been employed in most cases to estimate
these parameter values, thus rendering them non-adaptive under different sensing conditions.
Also, this fixed (manual tuning) process requires prior knowledge of some noise level to enable
pre-configuration of a predefined target false alarm rate. This renders the parameter estimation
process cumbrous and unworkable for real-time purposes, particularly for autonomous CR
applications. Furthermore, using wrong parameter values may lead to either too high or too low
false alarms or detection rates of the algorithm. Sequel to aforementioned mentioned constraints,
we propose a new mechanism for instantaneous parameter optimization of the ROHT algorithm
using Particle Swarm Optimization (PSO) algorithm. Our PSO-ROHT model design was
extensively tested under different conditions and results were compared to the non-optimized
ROHT. The results obtained show that the proposed design effectively adapts the parameter
values of the Recursive One-Sided Hypothesis Testing algorithm in accordance with the input
dataset under consideration. Also, that the proposed optimized model outperforms its non-
optimized counterpart following the estimated detection probability and false alarm probability
of both schemes, particularly in detecting Orthogonal Frequency-Division Multiplexing signals.
In detecting the Orthogonal Frequency-Division Multiplexing signals at signal-to-noise ratio of
3dB and above, the proposed model achieved a higher detection rate of 96.23% while
maintaining a low false alarm rate below 10%, which complies with the IEEE 802.22 standard
for Cognitive Radio application. Our PSO-ROHT algorithm is shown to be highly effective for
autonomous and full blind signal detection in CR, with strong potentials for application in other
areas requiring automatic threshold estimation.
KEYWORDS
Adaptive, Autonomous, Cognitive Radio, Energy detector, Optimization, Particle Swarm, PSO –
ROHT algorithm, ROHT, threshold
For More Details: http://aircconline.com/ijwmn/V10N6/10618ijwmn01.pdf
Volume Link: http://airccse.org/journal/jwmn_current18.html
REFERENCES
[1] M. Marcus, J. BUrtle, B. Franca, A. Lahjiouji and N. McNeil, "Report of the Unlicensed Devices and
Experimental Licenses Working Group," 2002.
[2] M. Rouse, "Techtarget.com," November 2008. [Online]. Available:
http://searchnetworking.techtarget.com/definition/cognitive-radio. [Accessed 19 June 2017].
[3] K. S. C. D. B. S. S. N. Carlos de M. Cordeiro, "IEEE 802.22: An Introduction to the First Wireless
Standard based on Cognitive Radios," JCM, vol. 1, no. 1, pp. 38-47, April 2006.
[4] N. T. Ng’ethe, "An Adaptive Threshold Energy Detection Technique with Noise Variance Estimation
for Cognitive Radio Sensor Networks (Doctoral dissertation, University of Cape Town)," 2015.
[5] E. N. O. A. M. A. O. U. a. M. S. A.J. Onumanyi, "A modified Otsu's algorithm for improving the
performance of the energy detector in cognitive radio," AEU- International Journal of Electronics and
Communication, vol. 79, pp. 53-63, 2017.
[6] S. Bames, P. v. Vuuren and B.T.Maharaj., "Spectrum occupancy investigation: Measurements in
South Africa," ELSEIVIER, vol. 46, no. 9, pp. 3098-3112, 2013.
[7] S. V. Vaseghi, Advanced Digital Signal Processing and Noise Reduction, WILEY, 2008.
[8] A. M. W. a. G. J. M. D. Datla, " A Spectrum Surveying Framework for Dynamic Spectrum Access
Networks," IEEE, vol. 58, no. 8, pp. 4158 - 4168, 2009.
[9] D. D. V. P. P. K. a. G. J. M. F. Weidling, "A framework for R.F. spectrum measurements and
analysis," in New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. 2005 First
IEEE International Symposium on, Baltimore, MD, USA, USA, 2005.
[10] A. M. W. J. M. Dinesh Datla, "A Spectrum Surveying Framework for Dynamic Spectrum Access
Networks," IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4158 - 4168, 2009.
Use of Genetic Algorithm In The Optimisation Of The Lte Deployment
Mohammed Jaloun1
, Zouhair Guennoun2
and Adnane Elasri3
1
Department of Electrical and Communication, EMI School, Rabat, Morocco
2
Department of Electrical and Communication, EMI School, Rabat, Morocco
3
Department of Electrical and Communication, EMI School, Rabat, Morocco
ABSTRACT
The purpose of this paper is to evaluate LTE deployment and to optimize RF parameters that include sub
channel power, antenna down tilt, azimuth and beam-width. An integer optimizing based on genetic
programming is developed by evaluating the signal-to-interference plus noise ratio. The simulation uses a
static model based on an OFDMA module designed for a Long Term Evolution (LTE) network from
3GPP [TR36.942]. The site location and initial antenna parameters are taken from real GSM network
already optimized for coverage. Our analysis shows that the LTE network performance could be
increased by more than 45% by adjusting both cells power and antenna parameters.
KEYWORDS
LTE, RF Optimization, Antenna, Genetic algorithm, Wireless
For More Details: http://airccse.org/journal/jwmn/0611wmn04.pdf
Volume Link: http://airccse.org/journal/jwmn_current11.html
REFERENCES
[1] 3GPP TR36.942 “Evolved Universal Terrestrial Radio Access Network (E-UTRA); Radio Frequency
(RF) system scenarios”, 02-2008.
[2] Engineering Optimization: An Introduction with Metaheuristic Applications. 173 By Xin-She Yang.
Copyright c 2010 John Wiley & Sons, Inc.
[3] A. Ligeti and J. Zander, “Minimal cost coverage planning for single frequency networks,”
Broadcasting, IEEE Transactions on, vol. 45, no. 1, pp. 78–87, March 1999.
[4] D. Yuan, “A decomposition method for pilot power optimization in WCDMA networks,” Department
of Science and Technology, Link¨oping University, Tech. Rep., 2003.
[5] P. V¨arbrand and D. Yuan, “A mathematical programming approach for pilot power optimization in
WCDMA networks,” in Australian Telecommunications, Networks and Applications Conference
ATNAC, 2003.
[6] C. Murphy, M. Dillon, and A. Diwan, “Performance gains using remote control antennas in CDMA
and 1xEV-DO networks,” in Vehicular Technology Conference, 2005. VTC-2005-Fall. 2005 IEEE 62nd,
vol. 1, September 2005, pp. 377–381.
[7] 3GPP TR System Simulation Evaluation for Link from eNode-B to RN.
[8] 3GPP TS36.912 “Feasibility study for Further Advancements for E-UTRA (LTE-Advanced)”.

More Related Content

What's hot

Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...ijwmn
 
New research articles 2020 june issue- international journal of computer sc...
New research articles   2020 june issue- international journal of computer sc...New research articles   2020 june issue- international journal of computer sc...
New research articles 2020 june issue- international journal of computer sc...AIRCC Publishing Corporation
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1IJNSA Journal
 
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...ijwmn
 
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...ijwmn
 
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...ijwmn
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
 
Conclusion
ConclusionConclusion
Conclusionhanmya
 
Augmented Reality as A Pervasive Technology: Context-Aware Approach
Augmented Reality as A Pervasive Technology: Context-Aware ApproachAugmented Reality as A Pervasive Technology: Context-Aware Approach
Augmented Reality as A Pervasive Technology: Context-Aware ApproachAditya Yudiantika
 
October 2020: Top Read Articles in Distributed and Parallel systems
October 2020: Top Read Articles in Distributed and Parallel systemsOctober 2020: Top Read Articles in Distributed and Parallel systems
October 2020: Top Read Articles in Distributed and Parallel systemsijdpsjournal
 
Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...nexgentechnology
 
International journal of computer networks & communications (ijcnc) --no...
International journal of computer networks & communications (ijcnc)  --no...International journal of computer networks & communications (ijcnc)  --no...
International journal of computer networks & communications (ijcnc) --no...IJCNCJournal
 
Looking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart EarthLooking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart EarthThe Innovation Group
 
Top 10 neural networks
Top 10 neural networksTop 10 neural networks
Top 10 neural networksijsc
 

What's hot (20)

Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
 
New research articles 2020 june issue- international journal of computer sc...
New research articles   2020 june issue- international journal of computer sc...New research articles   2020 june issue- international journal of computer sc...
New research articles 2020 june issue- international journal of computer sc...
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
 
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
 
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...
 
Conclusion
ConclusionConclusion
Conclusion
 
Augmented Reality as A Pervasive Technology: Context-Aware Approach
Augmented Reality as A Pervasive Technology: Context-Aware ApproachAugmented Reality as A Pervasive Technology: Context-Aware Approach
Augmented Reality as A Pervasive Technology: Context-Aware Approach
 
Smart Lighting in Multipurpose Outdoor Environments: Energy Efficient Solutio...
Smart Lighting in Multipurpose Outdoor Environments: Energy Efficient Solutio...Smart Lighting in Multipurpose Outdoor Environments: Energy Efficient Solutio...
Smart Lighting in Multipurpose Outdoor Environments: Energy Efficient Solutio...
 
October 2020: Top Read Articles in Distributed and Parallel systems
October 2020: Top Read Articles in Distributed and Parallel systemsOctober 2020: Top Read Articles in Distributed and Parallel systems
October 2020: Top Read Articles in Distributed and Parallel systems
 
Xxie cv
Xxie cvXxie cv
Xxie cv
 
short cv
short cvshort cv
short cv
 
Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...
 
CC NEW
CC NEWCC NEW
CC NEW
 
I010224146
I010224146I010224146
I010224146
 
Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )
 
International journal of computer networks & communications (ijcnc) --no...
International journal of computer networks & communications (ijcnc)  --no...International journal of computer networks & communications (ijcnc)  --no...
International journal of computer networks & communications (ijcnc) --no...
 
Looking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart EarthLooking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart Earth
 
Top 10 neural networks
Top 10 neural networksTop 10 neural networks
Top 10 neural networks
 

Similar to International Journal of Wireless & Mobile Networks (IJWMN)

Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...ijwmn
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...Amir Shokri
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Similar to International Journal of Wireless & Mobile Networks (IJWMN) (20)

Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its Applications
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its Applications
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

International Journal of Wireless & Mobile Networks (IJWMN)

  • 1. TTOOPP DDOOWWNNLLOOAADDEEDD PPAAPPEERRSS IInntteerrnnaattiioonnaall JJoouurrnnaall ooff WWiirreelleessss && MMoobbiillee NNeettwwoorrkkss ((IIJJWWMMNN)) IISSSSNN:: 00997755--33883344 [[OOnnlliinnee]];; 00997755--44667799 [[PPrriinntt]] hhttttpp::////aaiirrccccssee..oorrgg//jjoouurrnnaall//iijjwwmmnn..hhttmmll
  • 2. Optimization of 5G Virtual Cell Based Coordinated Multipoint Networks Using Deep Machine Learning Mohamed Elkourdi, Asim Mazin and Richard D. Gitlin Department of Electrical Engineering, University of South Florida Tampa, USA ABSTRACT Providing seamless mobility and a uniform user experience, independent of location, is an important challenge for 5G wireless networks. The combination of Coordinated Multipoint (CoMP) networks and Virtual- Cells (VCs) are expected to play an important role in achieving high throughput independent of the mobile’s location by mitigating inter-cell interference and enhancing the cell-edge user throughput. Userspecific VCs will distinguish the physical cell from a broader area where the user can roam without the need for handoff, and may communicate with any Base Station (BS) in the VC area. However, this requires rapid decision making for the formation of VCs. In this paper, a novel algorithm based on a form of Recurrent Neural Networks (RNNs) called Gated Recurrent Units (GRUs) is used for predicting thetriggering condition for forming VCs via enabling Coordinated Multipoint (CoMP) transmission. Simulation results, show that based on the sequences of Received Signal Strength (RSS) values of different mobile nodes used for training the RNN, the future RSS values from the closest three BSs can be accurately predicted using GRU, which is then used for making proactive decisions on enabling CoMP transmission and forming VCs. KEYWORDS Coordinated multipoint (CoMP), machine learning (ML), self-organizing networks (SON), recurrent neural networks (RNN), gated recurrent unit (GRU). For More Details : http://aircconline.com/ijwmn/V10N4/10418ijwmn01.pdf Volume Link : http://airccse.org/journal/jwmn_current18.html
  • 3. REFERENCES [1] J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. K. Soong, and J. C. Zhang, “What will 5G be?” IEEE Journal on Selected Areas in Communications, vol. 32, no. 6, pp. 1065–1082, June 2014. [2] J. Zhang and J. G. Andrews, "Adaptive Spatial Intercell Interference Cancellation in Multicell Wireless Networks," in IEEE Journal on Selected Areas in Communications, vol. 28, no. 9, pp. 1455- 1468, December 2010. doi: 10.1109/JSAC.2010.101207. [3] S. Deb, P. Monogioudis, J. Miernik and J. P. Seymour, "Algorithms for Enhanced Inter-Cell Interference Coordination (eICIC) in LTE HetNets," in IEEE/ACM Transactions on Networking, vol. 22, no. 1, pp. 137-150, Feb. 2014.doi: 10.1109/TNET.2013.2246820 [4] H. Dahrouj and Wei Yu, “Coordinated beamforming for the multi-cell multi-antenna wireless system,” in Proc. 42nd Annual Conference on Information Sciences and Systems, 2008, pp. 429-434. [5] J. Kim, H. W. Lee, and S. Chong, “Virtual cell beamforming in cooperative networks,” IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp. 1126-1138, 2014. [6] Y. Luo, P. N. Tran, C. An, J. Eymann, L. Kreft, and A. Timm-Giel, “A novel handover prediction scheme in content centric networking using nonlinear autoregressive exogenous model,” in Proc. IEEE Vehicular Technology Conference, 2013, pp. 1-5. [7] U. Javed, D. Han, R. Caceres, J. Pang, S. Seshan, and A. Varshavsky, “Predicting handoffs in 3G networks,” SIGOPS Oper. Syst. Rev., vol. 45, no. 3, pp. 65-70, 2011. [8] S. Liou and Y. Huang, “Trajectory predictions in mobile networks,” International Journal of Information Technology, vol. 11, no. 11, pp. 109- 122, 2005. [9] T. Anagnostopoulos, C. Anagnostopoulos, S. Haadjiefthymiades, M. Kyriakakos, and A. Kalousis, “Predicting the location of mobile users: a machine learning approach,” in Proc. International Conference on Pervasive Services, 2009, pp. 65-72. [10] T. Anagnostopoulos, C. B. Anagnostopoulos, S. Haadjiefthymiades, A. Kalousis , and M. Kyriakakos, “Path prediction through data mining,” in Proc. IEEE International Conference on Pervasive Services, 2007, pp. 128-135. [11] D. S. Wickramasuriya, C. A. Perumalla, K. Davaslioglu and R. D. Gitlin, "Base station prediction and proactive mobility management in virtual cells using recurrent neural networks," 2017 IEEE 18th Wireless and Microwave Technology Conference (WAMICON), Cocoa Beach, FL, 2017, pp. 1-6.doi: 10.1109/WAMICON.2017.7930254. [12] K. Davaslioglu and E. Ayanoglu, “Interference-based cell selection in heterogeneous networks,” in Proc. ITA Workshop, San Diego, 2013, pp. 1- 6. [13] K. Cho, J. Chung, C. Gulcehre, and Y. Bengio, “Empirical evaluation of gated recurrent neural networks on sequence modeling,” 2014. [Online]. Available: https://arxiv.org/pdf/1412.3555.
  • 4. Emerging Wireless Technologies in the Internet of Things : A Comparative Study Shri Guru Govind Singh Institute of Technology, Nanded. MS. India School of Computing, Engineering and Mathematics, Western Sydney University, Sydney, Australia ABSTRACT The Internet of Things (IoT) incorporates multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. This enables numerous business opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. This research analyses some of the major evolving and enabling wireless technologies in the IoT. Particularly, it focuses on ZigBee, 6LoWPAN, Bluetooth Low Energy, LoRa, and the different versions of Wi-Fi including the recent IEEE 802.11ah protocol. The studies evaluate the capabilities and behaviours of these technologies regarding various metrics including the data range and rate, network size, RF Channels and Bandwidth, and power consumption. It is concluded that there is a need to develop a multifaceted technology approach to enable interoperable and secure communications in the IoT. KEYWORDS Internet of Things, Wireless Technologies, Low-power, M2M Communications. For More Details : http://aircconline.com/ijwmn/V8N5/8516ijwmn05.pdf Volume Link : http://airccse.org/journal/jwmn_current16.html
  • 5. REFERENCES [1] B. Sanou, "The World in 2013: ICT facts and figures," International Telecommunications Union, 2013. [2] C. V. N. Index, "Global mobile data traffic forecast update, 2010-2015," White Paper, February, 2011. [3] C. V. N. Index, "The zettabyte era–trends and analysis," Cisco white paper, 2013. [4] L. Li, H. Xiaoguang, C. Ke, and H. Ketai, "The applications of WiFi-based wireless sensor network in internet of things and smart grid," in 2011 6th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2011, pp. 789-793. [5] R. Want, B. N. Schilit, and S. Jenson, "Enabling the internet of things," Computer, pp. 28-35, 2015. [6] D. Christin, A. Reinhardt, P. S. Mogre, and R. Steinmetz, "Wireless Sensor Networks and the Internet of Things: Selected Challenges," presented at the The 8th GI/ITG KuVSFachgesprächDrahtloseSensornetze, 2009. [7] Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. Mccann, and K. Leung, "A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities," IEEE Wireless Communications, vol. 20, pp. 91-98, 2013. [8] S. Lee, D. Yoon, and A. Ghosh, "Intelligent parking lot application using wireless sensor networks," in International Symposium on Collaborative Technologies and Systems, 2008, pp. 4857. [9] W. Lemstra, V. Hayes, and J. Groenewegen, The innovation journey of Wi-Fi: The road to global success: Cambridge University Press, 2010. [10] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, et al., "Scaling up MIMO: Opportunities and challenges with very large arrays," IEEE Signal Processing Magazine, vol. 30, pp. 40- 60, 2013. [11] E. Perahia and R. Stacey, Next Generation Wireless LANs: 802.11 n and 802.11 ac: Cambridge university press, 2013. [12] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor Networks: A Survey," Computer Networks, vol. 38, pp. 393-422, 2002. [13] L. Verma, M. Fakharzadeh, and S. Choi, "WiFi on Steroids: 802.11 ac and 802.11 ad," IEEE Wireless Communications, vol. 20, pp. 30-35, 2013. [14] T. Adame, A. Bel, B. Bellalta, J. Barcelo, and M. Oliver, "IEEE 802.11 AH: theWiFi approach for M2M communications," IEEE Wireless Communications, vol. 21, pp. 144-152, 2014. [15] IEEE. (2015, 30/05/2014). IEEE P802.11 Sub 1GHz Study Group. Available: http://www.ieee802.org/11/Reports/tgah_update.html [16] E. Khorov, A. Lyakhov, A. Krotov, and A. Guschin, "A survey on IEEE 802.11 ah: An enabling networking technology for smart cities," Computer Communications, pp. 53-69, 2014.
  • 6. [17] T. Adame, A. Bel, B. Bellalta, J. Barcelo, J. Gonzalez, and M. Oliver, "Capacity analysis of IEEE 802.11 ah WLANs for M2M communications," in Multiple Access Communcations, ed: Springer, 2013, pp. 139- 155. [18] Qualcomm. (2014, 12/10/2014). Improving whole home coverage and power efficiency. Available: https://www.qualcomm.com/invention/research/projects/wi-fi-evolution/80211ah [19] O. Raeesi, J. Pirskanen, A. Hazmi, T. Levanen, and M. Valkama, "Performance evaluation of IEEE 802.11 ah and its restricted access window mechanism," in 2014 IEEE International Conference on Communications Workshops (ICC), 2014, pp. 460-466. [20] S. Aust, R. V. Prasad, and I. G. Niemegeers, "Outdoor long-range WLANs: a lesson for IEEE 802.11 ah," IEEE Communications Surveys & Tutorials, vol. 17, pp. 1761-1775, 2015. [21] P. Valerio. (2014) Can Sub-1GHz WiFi Solve The IoT Connectivity Issues? The New Global Enterprise. Available: http://www.frontwave.eu/2014_12_01_archive.html [22] A. B. Flores, R. E. Guerra, E. W. Knightly, P. Ecclesine, and S. Pandey, "IEEE 802.11 af: a standard for TV white space spectrum sharing," IEEE Communications Magazine, vol. 51, pp. 92100, 2013. [23] S. K. Mohapatra, R. R. Choudhury, and P. Das, "The Future Directions in Evolving WI-FI: Technologies, Applications, and Services," International Journal of Next-Generation Networks, vol. 6, pp. 13-22, 2014. [24] Bluetooth SIG. (2001, 01/05/2014). Bluetooth specification version 1.1. Available: http://www.bluetooth.com [25] (2015, 11/12/2014). Bluetooth Smart Technology: Powering the Internet of Things. Available: http://www.bluetooth.com/Pages/Bluetooth-Smart.aspx [26] J. Decuir, "Bluetooth Smart Support for 6LoBTLE: Applications and connection questions," IEEE Consumer Electronics Magazine, vol. 4, pp. 67-70, 2015. [27] Bluetooth SIG. (2012, 11/04/2015). Bluetooth Core Version 4.0. Available: https://www.bluetooth.org/Technical/Specifications/adopted.htm [28] J. Hui and D. Culler. 6LoWPAN: Incorporating IEEE 802.15.4 into the IP architecture. Available: http://www.ipso-alliance.org/wp-content/media/6lowpan.pdf [29] M. B. Baria, A. P. Gharge, and N. D. Sheth, "A Review of Zigbee Smart Energy," in International Journal of Engineering Development and Research, 2014. [30] N. Baker, "ZigBee and Bluetooth: Strengths and weaknesses for industrial applications," Computing and Control Engineering, vol. 16, pp. 20-25, 2005. [31] A. J. Jara, L. Ladid, and A. F. Gómez-Skarmeta, "The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities," JoWUA, vol. 4, pp. 97-118, 2013. [32] L. Alliance, "LoRa alliance–wide area networks for IoT," ed, 2015. [33] F. Siddiqui, S. Zeadally, and K. Salah, "Gigabit Wireless Networking with IEEE 802.11 ac: Technical Overview and Challenges," Journal of Networks, vol. 10, pp. 164-171, 2015. [34] F. Stroud. (2015, 15/01/2015). 802.11ac. Available: http://www.webopedia.com/TERM/8/802_11ac.html
  • 7. [35] P. Anitha and C. Chandrasekar, "Energy Aware Routing Protocol ForZigbee Networks," Journal of Computer Applications (JCA), vol. 4, pp. 92-94, 2011. [36] P. McDermott-Wells, "What is bluetooth?," IEEE Potentials, vol. 23, pp. 33-35, 2004. [37] IEEE 802.11 Working Group, "IEEE Standard for Information Technology–Telecommunications and information exchange between systems–Local and metropolitan area networks–Specific requirements–Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Wireless Access in Vehicular Environments," IEEE Std, vol. 802, p. 11, 2010. [38] A. Dementyev, S. Hodges, S. Taylor, and J. Smith, "Power Consumption Analysis of Bluetooth Low Energy, ZigBee and ANT Sensor Nodes in a Cyclic Sleep Scenario " Microsoft Research, pp. 1-5, 2013. [39] B. B. Olyaei, J. Pirskanen, O. Raeesi, A. Hazmi, and M. Valkama, "Performance comparison between slotted IEEE 802.15. 4 and IEEE 802.1 lah in IoT based applications," in IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France, 2013, pp. 332-337.
  • 8. A Multi-Path Routing Determination Method for Improving the Energy Efficiency in Selective Forwarding Attack Detection Based MWSNs Won Jin Chung and Tae Ho Cho Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, Republic of Korea ABSTRACT A selective forwarding attack in mobile wireless sensor networks is an attack that selectively drops or delivers event packets as the compromised node moves. In such an attack, it is difficult to detect the compromised node compared with the selective forwarding attack occurring in the wireless sensor network because all sensor nodes move. In order to detect selective forwarding attacks in mobile wireless sensor networks, a fog computing-based system for a selective forwarding detection scheme has been proposed. However, since the proposed detection scheme uses a single path, the energy consumption of the sensor node for route discovery when the sensor node moves is large. To solve this problem, this paper uses fuzzy logic to determine the number of multi-paths needed to improve the energy efficiency of sensor networks. Experimental results show that the energy efficiency of the sensor network is improved by 9.5737% compared with that of the existing scheme after 200 seconds when using the proposed scheme. KEYWORDS Mobile wireless sensor networks, selective forwarding attack, network security, fuzzy logic, AOMDV routing protocol For More Details : http://aircconline.com/ijwmn/V10N4/10418ijwmn02.pdf Volume Link : http://airccse.org/journal/jwmn_current18.html
  • 9. REFERENCES [1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002. [2] K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad Hoc Netw., vol. 3, pp. 325–349, 2005. [3] R.Javad, M.Moradi and A.S.Ismail, "Mobile wireless sensor networks overview," International Journal of Computer Communications and Networks vol. 2, no. 1, pp. 17-22, 2012 [4] C. Zhu, et al. "A survey on communication and data management issues in mobile sensor networks", Wireless Commun. Mobile Computing, vol. 14, no. 1, pp. 19-36, 2014 [5] I. Amundson and X. D. Koutsoukos, "A survey on localization for mobile wireless sensor networks." Mobile entity localization and tracking in GPS-less environnments. Springer, Berlin, Heidelberg, 235- 254, 2009 [6] Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 8, pp. 2-23, 2007 [7] J. Sen, "A survey on wireless sensor network security," arXiv preprint arXiv:1011.1529, 2010. [8] C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing," IETF RFC 3561, 2003 [9] N M. Marina and S. Das, "On-demand multipath distance vector routing in ad hoc networks", IEEE International Conference on Network Protocols (ICNP), pp. 14–23, 2001 [10] Q. Yaseen, F. AlBalas, and Y. Jararweh, "A fog computing-based system for selective forwarding detection in mobile wireless sensor networks". Foundations and Applications of Self* Systems, IEEE International Workshops on. IEEE, 2016 [11] M. Radi, B. Dezfouli, K. A. Bakar and M. Lee, “Multipath routing in wireless sensor networks: survey and research challenges,” Sensors, vol. 12, pp. 650-685, Jan. 2012 [12] R.U.Anitha and P. Kamalakkannan, "Enhanced cluster based routing protocol for mobile nodes in wireless sensor network," Pattern Recognition, Informatics and Mobile Engineering (PRIME), 2013 International Conference on. IEEE, pp. 187-193, 2013
  • 10. Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energy Parameters Shuchita Upadhayaya and Charu Gandhi Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, India ABSTRACT Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater such problem, we present a node-disjoint multipath protocol. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. The proposed technique is also illustrated with an example. KEYWORDS QoS Rrouting, Mobile Ad hoc Networks, Energy-Aware Routing, Multipath Rrouting, For More Details : http://airccse.org/journal/jwmn/1109s11.pdf Volume Link : http://airccse.org/journal/j3current.html
  • 11. REFERENCES 1. D. D. Perkins, H. D. Hughes & C. B. Owen, (2002) “Factors Affecting the Performance of Ad Hoc Networks,” Proceedings of the IEEE International Conference on Communications (ICC), 2002, pp.2048- 2052. 2. Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu, (2003)"Mobile Ad hoc networking imperatives and challenges" Ad Hoc Networks, Vol 1, pp.13-64. 3. C.E. Perkins & P. Bhagwat (1994)" Highly Dynamic Destination-Sequenced Distance Vector Routing (DSDV) for Mobile Computers", ACM SIGCOMM Conference on Communications Architectures, Protocols and Applications, Vol. 24, pp. 234-244. 4. M. Abolhasan, T.A. Wysocki, & E. Dutkiewicz, (2004) "A Review of Routing Protocols for Mobile Ad hoc Networks", Ad hoc Networks, Vol. 2, pp. 1-22. 5. David B. Johnson, David A. Maltz, & Josh Broch, "DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks", (2001), Ad Hoc Networking, AddisonWesley , pp. 139-172. 6. C. E. Perkins & E. M. Royer,(2003) "Ad hoc On-Demand Distance Vector Routing (AODV) ", IETF RFC 3561 7. .Z. Hass & R. Pearlmann, "Zone routing Protocol"(1999),IETF Internet Draft 8. RFC2386. 9. Shigang Chen & Klara Nahrstedt, (1998) ".An Overview of Quality-of-Service Routing for the next Generation High -Speed Networks: Problems and Solutions", IEEE Network Magazine, vol12, pp. 64 -79. 10. M. K. Marina & S. R. Das, (2001) "On-Demand MultiPath Distance Vector Routing in Ad hoc Networks",Proceedings of the Ninth International Conference on Network Protocols (ICNP},IEEE Computer Society Press, pp. 14-23. 11. Jiwon Park, Sangman Moht & Ilyong Chung (2008),” Multipath AODV Routing Protocol in Mobile Ad Hoc Networks with SINR-Based Route Selection”, International Symposium on Wireless Communication Systems, IEEE ,pp:682-688. 12. Lei Wang, Lianfang Zhang, Yantai Shu & Miao Dong (2000) ,” Multipath source routing in wireless ad hoc networks”, Proceedings of Canadian Conference on Electrical and Computer Engineering, Vol 1, pp. 479-483. 13. S. J. Lee and M. Gerla (2001) "Split Multipath Routing with Maximally Disjoint Paths in Ad hoc Networks”,Proceedings of the IEEE International Conference on Communications(ICC), Vol 10, pp. 3201-3205. 14. X.Li,(2006), Ph.D thesis on "Multipath Routing and QoS Provisioning in Mobile Ad hoc Networks", Queen Mary University of London. 15. Zhengyu W, Xiangjun D & Lin C,(2007), " A Grid-Based Energy Aware Node-Disjoint Multipath Routing Algorithm for MANETs", Proceedings of International Conference on Natural Computation, Vol. 5, pp. 244-248.
  • 12. 16. Do-Youn H, Eui-Hyeok K & Jae-Sung L, (2006),“ An Energy Aware Source Routing with Disjoint Multipath Selection for Energy- Efficient Multihop Wireless Ad hoc Networks”, Proceedings of International Federation for Information Processing, 2006, pp. 41-50. 17. M. Bheemalingaiah, M. M. Naidu, D. Sreenivasa Rao & G. Varaprasad (2009)," Energy Aware Node- Disjoint Routing in Mobile Ad Hoc Networks", Journal of Theoretical and Applied Information Technology, pp 416-431. 18. Liansheng T, Ling X, King T. K, M. Lei & Zukennan,(2006), "LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad hoc Networks", Proceedings of IEEE Vehicular Technology Conference, Vol. 2, pp. 623-627. 19. W.Su,Sung-Ju Lee & M.Gerla (2000),” Mobility Prediction in Wireless Networks”.,MILCOM 2000, Vol l, pp.491-495. 20. M. K. Marina & S. R. Das,(2001), "On-Demand MultiPath Distance Vector Routing in Ad hoc Networks", In Proceedings of the Ninth International Conference on Network Protocols (ICNP}, IEEE Computer Society Press, pp. 14-23. 21. M. Maleki, K. Dantu & M. Pedram, (2002) "Power-aware source routing protocol for mobile ad hoc networks", Proceedings of the IEEE international symposium on low power electronics and design, pp.72-75. 22. D.Kim, Garcia-Luna-Aceves, J.J. Obraczka, K. Cano & J.-C. Manzoni, P.(2003)"Routing mechanisms for Mobile Ad hoc Networks Based on Energy Drain Rate", Mobile Computing, Vo12, page(s): 161- 173.
  • 13. A Novel Robust and Low-Complexity Spacetime Codes for Industry 4.0 Systems Mohamed S. Abouzeid Department of Electronics and Electrical Communication, Faculty of Engineering, Tanta University, Egypt ABSTRACT This paper proposes different robust and low-complexity space time codes which provide more reliability for industrial automation. An innovative synchronized uplink system configuration for an Industrial Environment is proposed. Mathematical framework for estimating the channel phase of each Slave Node (SN) is developed. Furthermore, the channel is practically estimated based on an innovative method using parallel sequence spread spectrum (PSSS) implemented in Universal Software Radio Peripheral (USRP). The proposed space time codes are applied in the uplink of an industrial communication system where the channel is modelled using Quasi Deterministic Radio Channel Generator (Quadriga) which follows a geometry-based stochastic approach. Simulation results exposed that the proposed codes surpass Alamouti code for Industrial Automation. The bit error rate (BER) performance demonstrates that the achieved coding gain for the proposed codes is higher than Alamouti code leading to more robust communication. Furthermore, a low complexity decoders based on minimum mean squared error (MMSE) and zero forcing (ZF) algorithms are designed at the receiver side. The proposed codes give a predominant execution against the state-of-the-art space time codes for Industry 4.0. KEYWORDS Industrial Communication, Space-Time Code, Quadriga, Minimum Mean squared Error decoder, Zero Forcing Algorithm, Parallel Sequence Spread Spectrum, Software Defined Radio, Factory Automation. For More Details : http://aircconline.com/ijwmn/V10N5/10518ijwmn01.pdf Volume Link : http://airccse.org/journal/jwmn_current18.html
  • 14. REFERENCES [1] M. Cheffena, "Industrial indoor multipath propagation — A physical-statistical approach," 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC), Washington DC, pp. 68-72, 2014. [2] R. Croonenbroeck, A. Wulf, L. Underberg, W. Endemann and R. Kays, "Parallel Sequence Spread Spectrum: Bit Error Performance under Industrial Channel Conditions," ICOF 2016; 19th International Conference on OFDM and Frequency Domain Techniques, Essen, Germany, pp. 1-7, 2016. [3] H. Igor, J. Bohuslava and J. Martin, "Proposal of communication standardization of industrial networks in Industry 4.0," 2016 IEEE 20th Jubilee International Conference on Intelligent Engineering Systems (INES), Budapest, pp. 119-124, 2016. [4] R. Kraemer, M. Methfessel, R. Kays, L. Underberg and A. C. Wolf, "ParSec: A PSSS approach to industrial radio with very low and very flexible cycle timing," 2016 24th European Signal Processing Conference (EUSIPCO), Budapest, pp. 1222-1226, 2016. [5] L. Underberg, A. Wulf, R. Croonenbroeck, W. Endemann and R. Kays, "Parallel Sequence Spread Spectrum: Analytical and simulative approach for determination of bit error probability," 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), Berlin, pp. 1-8, 2016. [6] T. Olofsson, A. Ahlén and M. Gidlund, "Modeling of the Fading Statistics of Wireless Sensor Network Channels in Industrial Environments," in IEEE Transactions on Signal Processing, vol. 64, no. 12, pp. 3021-3034, June15, 2016. [7] S. Li, J. Zhang and X. Mu, "Noncoherent Massive Space-Time Block Codes for Uplink Network Communications," in IEEE Transactions on Vehicular Technology, 2018. [8] S. S. H. Bidaki, S. Talebi and M. Shahabinejad, "A Full-Rate Full-Diversity 2x2 Space-Time Block Code with Linear Complexity for the Maximum Likelihood Receiver," in IEEE Communications Letters, vol. 15, no. 8, pp. 842-844, August 2011. [9] S. Kumagai, Y. Seki and F. Adachi, "Joint Tx/Rx Signal Processing for Distributed Antenna MUMIMO Downlink," 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, pp. 1-5, 2016. [10] . D. Nguyen, J. Joung and S. Sun, "Precoder design for distributed antenna systems (DAS) with limited channel state information," 2015 IEEE International Conference on Communications (ICC), London, pp. 1733-1738, 2015. [11] H. Kim, S.-R. Lee, K.-J. Lee, and I. Lee, “Transmission schemes based on sum rate analysis in distributed antenna systems,” IEEE Trans. Wireless Commun., vol. 11, no. 3, pp. 1201–1209, Mar. 2012. [12] A. Liu and V. K.N. Lau, “Joint power and antenna selection optimization for energy efficiency in large cloud radio access networks,” IEEE Trans. Signal Process., vol. 62, no. 5, pp. 1319–1328, Mar. 2014. [13] J. Joung, Y. K. Chia, and S. Sun, “Energy-efficient, large-scale distributed-antenna system for multiple users,” IEEE J. Sel. Topics Signal Process., vol. 8, pp. 954–965, Sep. 2014.
  • 15. [14] E. Tanghe, W. Joseph, J. De Bruyne, L. Verloock and L. Martens, “The industrial indoor channel: Statistical analysis of the power delay profile,” AEU-International Journal of Electronics and Communications, pp. 806-812, 2010. [15] A. F. Molisch, K. Balakrishnan , et al. "IEEE 802.15. 4a channel model-final report." IEEE P802 15.04, 2004. [16] C. Valenzuela et al., “Capacity growth of multi-element arrays in indoorand outdoor wireless channels,” Proc. IEEE Wireless Commun. Netw. Conf., vol. 3, pp. 1340–1344, 2000. [17] M. El-Absi, S. Galih, M. Hoffmann, M. El-Hadidy and T. Kaiser, "Antenna Selection for Reliable MIMO-OFDM Interference Alignment Systems: Measurement-Based Evaluation," in IEEE Transactions on Vehicular Technology, vol. 65, no. 5, pp. 2965-2977, May 2016. [18] B. Holfeld, et al., "Radio channel characterization at 5.85 GHz for wireless M2M communication of industrial robots," 2016 IEEE Wireless Communications and Networking Conference, Doha, pp. 1-7, 2016. [19] Y. Li, X. Zhang, M. Peng and W. Wang, "Power Provisioning and Relay Positioning for Two-Way Relay Channel With Analog Network Coding," in IEEE Signal Processing Letters, vol. 18, no. 9, pp. 517- 520, Sept. 2011. [20] J. Miranda et al., "Path loss exponent analysis in Wireless Sensor Networks: Experimental evaluation," 11th IEEE International Conference on Industrial Informatics (INDIN), Bochum, pp. 54- 58, 2013. [21] K. KrishneGowda, T. Messinger, A. C. Wolf, R. Kraemer, I. Kallfass, and J. C. Scheytt, “Towards 100 Gbps Wireless Communication in THz Band with PSSS Modulation: A Promising Hardware in the Loop Experiment,” in Ubiquitous Wireless Broadband (ICUWB), 2015 IEEE International Conference on, Oct 2015, pp. 1–5. [22] IEEE, “IEEE Std 802.15.4-2011, IEEE Standard for Local and metropolitan area networks, Part 15.4: Low-Rate Wireless Personal Area Networks,” 2011. [23] M. Abouzeid, et al. “Robust and low-complexity space time code for industrial automation” 10th International Conference on Advanced Infocomm Technology (ICAIT), Sweden, 2018. [24] LI, Shuai, et al. “A novel and robust timing synchronization method for SC-FDE 60GHz WPAN systems. ”, IEEE 14th International Conference on Communication Technology (ICCT), 2012. [25]S. Jaeckel, L. Raschkowski, K. Borner, L. Thiele, F. Burkhardt, and E. Eberlein “ QuaDRiGa- Quasi Deterministic Radio Channel Generator, User Manual and Documnetation”, Fraunhofer Heinrich Herz Institute, Tech. Rep. v1.4.1-551, 2016.
  • 16. LACBER: New Location Aided Routing Protocol For GPS Scarce Manet Dipankar Deb1 , Srijita Barman Roy2 , and Nabendu Chaki3 1 Netaji Subhas Mahavidyalaya, Department of Higher Education of Tripura, India 2 R.T. College, Department of Higher Education of Tripura, Agartala, India 3 Department of Computer Science & Engineering, University Calcutta, India ABSTRACT Completely GPS-free positioning systems for wireless, mobile, ad-hoc networks typically stress on building a network-wide coordinate system. Such systems suffer from lack of mobility and high computational overhead. On the other hand, specialized hardware in GPS-enabled nodes tends to increase the solution cost. A number of GPS free position based routing algorithms have been studied by the authors before proposing a new positioning framework in this paper. The proposed positioning framework is characterized by using only a handful of GPS enabled nodes. Lower dependence on specialized GPS hardware reduces the total cost of implementing the framework. A new location aided routing protocol called Location Aided Cluster Based Energy-efficient Routing (LACBER) has been proposed in the paper. Simulation results show that using the proposed positioning framework, LACBER turns out to be efficient in lowering mean hop and hence in utilizing the limited energy of mobile nodes. KEYWORDS Routing Protocols, GPS-free positioning, mobility, Location Aided Routing For More Details : http://airccse.org/journal/nsa/0809smn02.pdf Volume Link : http://airccse.org/journal/j3current.html
  • 17. REFERENCES [1] Capkun, S.; Hamdi, M.; Hubaux, J.-P. “GPS free positioning in mobile ad-hoc networks”, Cluster Computing Journal, Volume 5, Issue 2, pp. 157-167; April 2002. [2] Antonio Caruso, Stefano Chessa, Swades De, Ro Urpi; "GPS free coordinate assignment and routing in wireless sensor networks"; Proc. of the IEEE INFOCOM, pp. 150-160, 2005. [3] Huseyin Akcan , Vassil Kriakov, Nerve Bronnimann. “GPS-Free node localization in mobile wireless sensor networks”, Proceedings of the 5th ACM international workshop on Data engineering for wireless and mobile access.” pp. 35 – 42, 2006 [4] Qing Yang Lim, A. Agrawal, P. “GPSFR: GPS-Free Geographic Routing Protocol for Intelligent Vehicles.” Proceedings of First International Conference on Communications and Networking in China, pp.: 1-8, 2006. [5] Oh-Heum Kwon, Ha-Joo Song, “Counting-Based Distance Estimations and Localizations in Wireless Sensor Networks.” Springer, Volume 3983/2006. Pages 306-315. 2006 [6] Iyengar, R. Sikdar, B; "Scalable and distributed GPS free positioning for sensor networks"; Proceedings of IEEE conference on communication ICC 2003, Volume 1, page(s): 338- 342, 2003. [7] Caruso, A. Chessa, S. De, S. Urpi, A; "GPS free coordinate assignment and routing in wireless sensor networks"; INFOCOM 2005. Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies INFOCOM 2005; Volume: 1, pp.: 150- 160, 2005. [8] Hung-Chi Chu, Rong-Hong Jan. “A GPS-less, outdoor, self-positioning method for wireless sensor networks”, Ad Hoc Networks, Elsevier Science ,Volume 5, Issue 5, pp. 547-557, 2007. [9] Dongni Li, “A Novel Cluster-Based Routing Algorithm in Ad Hoc Networks” Proceedings of International Conference on Computational Intelligence and Security, on page(s): 1053-1057, 2007. [10] Heidemann, J.; Bulusu, N.; Estrin, D. “GPS-less low cost outdoor localization for very small devices”, Proceedings of IEEE Personal Communications Magazine, Vol. 7 No. 5, pp. 24-28, 2000. [11] Chiang, C.C., Wu H.K., Liu W., Gerla M., “Routing in Clustered Multi Hop Mobile wireless Networks with Fading Channel”, Proceedings of IEEE SICON 1997, pp. 197-211, 1997. [12] Ko, Young-Bae, Vaidya N.H., “Location-Aided Routing (LAR) in mobile ad hoc network”,Wireless Networks, vol 6, pp. 307-321, 2000.
  • 18. Improving MANET Routing Protocols Through the Use of Geographical Information Vasil Hnatyshin Department of Computer Science, Rowan University, Glassboro, NJ, USA ABSTRACT This paper provides a summary of our research study of the location-aided routing protocols for mobile ad hoc networks (MANET). This study focuses on the issue of using geographical location information to reduce the control traffic overhead associated with the route discovery process of the ad-hoc on demand distance vector (AODV) routing protocol. AODV performs route discovery by flooding the whole network with the route request packets. This results in unnecessarily large number of control packets traveling through the network. In this paper, we introduced a new Geographical AODV (GeoAODV) protocol that relies on location information to reduce the flooding area to a portion of the network that is likely contains a path to destination. Furthermore, we also compared GeoAODV performance with that of the Location Aided Routing (LAR) protocol and examined four mechanisms for reducing the size of the flooding area: LAR zone, LAR distance, GeoAODV static, and GeoAODV rotate. We employed OPNET Modeler version 16.0 software to implement these mechanisms and to compare their performance through simulation. Collected results suggest that location-aided routing can significantly reduce the control traffic overhead during the route discovery process. The comparison study revealed that the LAR zone protocol consistently generates fewer control packets than other location-aided mechanisms. However, LAR zone relies on the assumption that location information and traveling velocities of all the nodes are readily available throughout the network, which in many network environments is unrealistic. At the same time, the GeoAODV protocols make no such assumption and dynamically distribute location information during route discovery. Furthermore, the collected results showed that the performance of the GeoAODV rotate protocol was only slightly worse than that of LAR zone. We believe that even though GeoAODV rotate does not reduce the control traffic overhead by as much as LAR zone, it can become a preferred mechanism for route discovery in MANET. KEYWORDS Mobile Ad-Hoc Networks; MANET Routing Protocols; Ad Hoc On Demand Distance Vector Routing; Location-Aided Routing; Geographical AODV; OPNET Modeler For More Details: http://airccse.org/journal/jwmn/0413wmn01.pdf Volume Link : http://airccse.org/journal/jwmn_current13.html
  • 19. REFERENCES [1] C. Perkins, E. Belding-Royer, S. Das. (July 2003). Ad hoc On-Demand Distance Vector (AODV) Routing. IETF RFC 3561. Last accessed on 2013-01-26 [2] E. M. Royer and C. E. Perkins. An Implementation Study of the AODV Routing Protocol, Proc. of the IEEE Wireless Communications and Networking Conference, Chicago, IL, September 2000 [3] C. E. Perkins and E. M. Royer. Ad hoc On-Demand Distance Vector Routing, Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, Feb. 1999, pp. 90-100 [4] V. Hnatyshin, M. Ahmed, R. Cocco, and D. Urbano, A Comparative Study of Location Aided Routing Protocols for MANET, Proc. of 4th IEEE IFIP Wireless Days 2011 conference, Niagara Falls, Canada [5] V. Hnatyshin, and H. Asenov, Design and Implementation of an OPNET model for simulating GeoAODV MANET routing protocol, Proc. of the OPNETWORK 2010 International Conference, Session: Wireless Ad Hoc and Wireless Personal Area Networks, Washington DC, August 2010 [6] H. Asenov, and V. Hnatyshin, GPS-Enhanced AODV routing, Proc. of the 2009 International Conference on Wireless Networks (ICWN'09), Las Vegas, Nevada, USA (July 13-16, 2009) [7] Y. Ko and N. H. Vaidya, Location-aided routing (LAR) in mobile ad hoc networks, Wireless Networks, 6(4), July 2000, pp. 307-321 [8] Y. Ko and N. H. Vaidya, Flooding-based geocasting protocols for mobile ad hoc networks, Mobile Networks and Applications, 7(6), Dec. 2002, pp. 471-480 [9] A. Husain, B. Kumar, A. Doegar, A Study of Location-Aided Routing (LAR) Protocol for Vehicular Ad Hoc Networks in Highway Scenario, International Journal of Engineering and Information Technology, 2(2), 2010, pp. 118-124 [10] K.M.E. Defrawy and G. Tsudik, ALARM: Anonymous Location-Aided Routing in Suspicious MANETs, Proc. of the IEEE International Conference on Network Protocols, 2007, pp. 304-313 [11] D. Deb, S. B. Roy, N. Chaki, LACBER: A new Location-Aided routing protocol for GPS scarce MANET, International Journal of Wireless & Mobile Networks (IJWMN), 1(1), August 2009 [12] F. De Rango, A. Iera, A. Molinaro, S. Marano, A modified location-aided routing protocol for the reduction of control overhead in ad-hoc wireless networks, Proc. of the 10th International Conference on Telecommunications, 2003, pp. 1033 – 1037 [13] Y. Xue, B. Li, A Location-aided Power-aware Routing Protocol in Mobile Ad Hoc Networks, Proc. of the IEEE Global Telecommunications Conference, San Antonio, TX, November 2001, pp. 2837 – 2841 [14] Y. Wang, L. Dong, T. Liang, X. Yang, X., D. Zhang, Cluster based location-aided routing protocol for large scale mobile ad hoc networks, IEICE Transactions, 2009, E92-D(5), pp. 1103– 1124 [15] OPNET Modeler ver. 16.0. OPNET Technologies, Inc®, www.opnet.com last visited 2/1/13
  • 20. [16] Adarshpal S. Sethi and Vasil Y. Hnatyshin, The Practical OPNET User Guide for Computer Network Simulation, 527 pages, Chapman and Hall/CRC (August 24, 2012), ISBN-10: 1439812055, ISBN-13: 978-1439812051 [17] H. Cheng, J, Cao, H. Chen and H. Zhang, GrLS: Group-Based Location Service in Mobile Ad Hoc Networks, IEEE Transactions on Vehicular Technology, Vol. 57, No. 6, November 2008 [18] Gajurel, S., Heiferling, M., A Distributed Location Service for MANET Using Swarm Intelligence, Mobile WiMAX Symposium, 2009. MWS '09. IEEE, pp. 220 – 225 [19] Yongming Xie, Guojun Wang, Jie Wu, Fuzzy Location Service for Mobile Ad Hoc Networks, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, pp. 289 – 296 [20] S. M. Das , H. Pucha and Y. C. Hu Performance comparison of scalable location services for geographic ad hoc routing, Proc. INFOCOM 2005, vol. 2, pp.1228 -1239 [21] K. Wolfgang , F. Holger and W. Jorg Hierarchical location service for mobile ad hoc networks, ACM SIGMOBILE Mobile Comput. Commun. Rev. 2004, vol. 8, no. 4, pp. 47 – 58 [22] B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in MobiCom ’00: Proceedings of the 6th annual international conference on Mobile computing and networking. New York, NY, USA: ACM Press, August 2000, pp. 243–254. [23] OPNET Modeler 16.1 Documentation, OPNET Technologies, Inc., 2012.
  • 21. Device-To-Device (D2D) Communication Under LTE-Advanced Networks Magri Hicham1 , Noreddine Abghour2 and Mohammed Ouzzif1 1 RITM Research Lab,ESTC , Hassan II University ,Casablanca, Morocco 2 FSAC, Hassan II University,Casablanca, Morocco ABSTRACT Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTEadvanced network such us wireless peer-to-peer services and higher spectral efficiency. It is also considered as one of promising techniques for the 5G wireless communications system and used in so many different fields such as network traffic offloading, public safety, social services and applications such as gaming and military applications . The goal of this paper is to present advances on the current 3GPP LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the D2D types based on the communication spectrum of D2D transmission, namely Inband D2D communication and Outband D2D communication. Then we present the advantages and disadvantages of each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under LTE-A network are described. KEYWORDS D2D;LTE-advanced;Inband D2D;Outband D2D;3GPP;5G. For More Details: http://aircconline.com/ijwmn/V8N1/8116ijwmn02.pdf Volume Link : http://airccse.org/journal/jwmn_current16.html
  • 22. REFERENCES [1] E.SREE HARSHA1, T. TIRUPAL2 “LTE-Advanced Cellular Networks for D2D Communications” International Journal of Scientific Engineering and Technology Research Volume.03, IssueNo.18, August-2014. [2] Arash Asadi ,Qing Wang, , and Vincenzo Mancuso,” A Survey on Device-to-Device Communication in Cellular Networks” arXiv:1310.0720v6 [cs.GT] 29 Apr 2014. [3] Doppler, K.; Rinne, M.P.; Janis, P.; Ribeiro, C.; Hugl, K “Device-to-Device Communications; Functional Prospects for LTE-Advanced Networks” ICC Workshops 2009. [4] Xuemin Shen “Device-to-Device Communication in 5G Cellular Networks” IEEE Network March/April 2015 . [5] Dimitris Tsolkas, Eirini Liotou, Nikos Passas and Lazaros Merakos “LTE-A Access, Core, and Protocol Architecture for D2D Communication ”Springer International Publishing Switzerland 2014 . [6] Zhijian Lin • Zhibin Gao • Lianfen Huang • Chi-Yuan Chen • Han-Chieh Chao “Hybrid Architecture Performance Analysis for Device-to-Device Communication in 5G Cellular Network” © Springer Science+Business Media New York 2015. [7] K. Akkarajitsakul, P. Phunchongharn, E. Hossain, and V. K. Bhargava, “Mode selection for energyefficient D2D communications in LTEadvanced networks: A coalitional game approach,” in Proceedings of IEEE ICCS, 2012, pp. 488–492. [8] Chithra B Das “A Study on Device To Device Communication in Wireless Mobile Network” International Journal of Modern Communication Technologies & Research (IJMCTR) ISSN: 2321- 0850, Volume-3, Issue-3, March 2015. [9] T. Peng, Q. Lu, H. Wang, S. Xu, and W. Wang, “Interference avoidance mechanisms in the hybrid cellular and device-to-device systems,” in Proceedings of IEEE PIMRC, 2009, pp. 617–621. [10] C.-H. Yu, K. Doppler, C. Ribeiro, and O. Tirkkonen, “Performance impact of fading interference to device-to-device communication underlaying cellular networks,” in Proceedings of IEEE PIMRC, 2009, pp. 858–862. [11] H. E. Elkotby, K. M. Elsayed, and M. H. Ismail, “Exploiting interference alignment for sum rate enhancement in D2D-enabled cellular networks,” in Proceedings of IEEE WCNC, 2012, pp. 1624– 1629 [12] A.Osseiran, K. Doppler, C. Ribeiro, M. Xiao, M. Skoglund, and J. Manssour, “Advances in device- todevice communications and Network coding for IMT-Advanced,” ICT Mobile Summit, 2009 [13] C. Xu, L. Song, Z. Han, Q. Zhao, X. Wang, and B. Jiao, “Interference aware resource allocation for device-to-device communications as an underlay using sequential second price auction,” in Proceedings of IEEE ICC, 2012, pp. 445–449. [14] S. Xu, H. Wang, T. Chen, Q. Huang, and T. Peng, “Effective interference cancellation scheme for device-to-device communication underlaying cellular networks,” in Proceedings of IEEE VTC-Fall, 2010, pp. 1–5.
  • 23. [15] W. Xu, L. Liang, H. Zhang, S. Jin, J. C. Li, and M. Lei, “Performance enhanced transmission in device-to-device communications: Beamforming or interference cancellation?” in Proceedings of IEEE GLOBECOM, 2012, pp. 4296–4301. [16] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen, “Intracluster deviceto- device relay algorithm with optimal resource utilization,” IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2315– 2326, Jun. 2013. [17] X. Bao, U. Lee, I. Rimac, and R. R. Choudhury, “DataSpotting: offloading cellular traffic via managed device-to-device data transfer at data spots,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 14, no. 3, pp. 37–39, 2010. [18] X. Chen, L. Chen, M. Zeng, X. Zhang, and D. Yang, “Downlink resource allocation for device- todevice communication underlaying cellular networks,” in Proceedings of IEEE PIMRC, 2012, pp. 232– 237 [19] M. Ji, G. Caire, and A. F. Molisch, “Wireless device-to-device Caching networks: Basic principles and system performance,”arXiv preprintarXiv:1305.5216, 2013. [20] H. Min, J. Lee, S. Park, and D. Hong, “Capacity enhancement of an interference limited area for device-to-device uplink underlaing cellular networks,” IEEE Transactions on Wireles Communications, vol. 10, no. 12, pp. 3995–4000, December 2011. [21] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Mikls,and Z. Turnyi, “Design aspects of network assisted device-to- device communications,” IEEE Communications Magazine, vol. 50, no. 3, pp.170–177, 2012. [22] R. Zhang, X. Cheng, L. Yang, and B. Jiao, “Interference-aware Graph based resource sharing for device-to-device communications underlaying cellular networks,” in Proceedings of IEEE WCNC, 2013, pp. 140–145. [23] J. C. Li, M. Lei, and F. Gao, “Device-to-device (D2D) Communication in MU-MIMO cellular networks,” in Proceedings of IEEE GLOBE COM,2012, pp. 3583–3587. [24] N. Golrezaei, A. F. Molisch, and A. G. Dimakis, “Base-station assisted device-to-device communications for high-throughput wire less video networks,” in Proceedings of IEEE ICC, 2012, pp. 7077–7081. [25] Bin Guo, Shaohui Sun, Qiubin Gao “Interference Management for D2D Communications Underlying Cellular Networks at Cell Edge” ICWMC 2014 . [26] S. Shalmashi, G. Miao, and S. Ben Slimane, “Interference management for multiple device-to-device communications underlaying cellular networks,” IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), 2013, pp. 223-227. [27] J. Shin, J. P. Choi, and J.-W. Choi , “An autonomous interference avoidance scheme for D2D communications through frequency overhearing,” International Conference on ICT Convergence (ICTC), 2013, pp. 1074-1075. [28] H. Min, and J. Lee, “Capacity Enhancement Using an Interference Limited Area for Device-toDevice Uplink Underlaying Cellular Networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 12, Dec. 2011, pp. 3995-4000.
  • 24. [29] K. Doppler, M Rinne, C. Wijiting, C. B. Ribeiro, and K. Hugl, “Device-to-Device Communication as an Underlay to LTE-Advanced Networks,” Communications Magazine, IEEE, vol. 47, no. 12, Dec. 2009, pp 42-49. Copyright [30] Ji Lianghai Klein, A. ; Kuruvatti, N. ; Schotten, H.D “System Capacity Optimization Algorithm for D2D Underlay Operation “Communications Workshops (ICC), 2014 IEEE. [31] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen, “Intracluster deviceto-device relay algorithm with optimal resource utilization,” IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2315– 2326, Jun. 2013. [32] J. C. Li, M. Lei, and F. Gao, “Device-to-device (D2D) communication in MU-MIMO cellular networks,” in Proceedings of IEEE GLOBECOM,2012, pp. 3583–3587. [33] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Mikls, and Z. Turnyi, “Design aspects of network assisted device-to-device communications,” IEEE Communications Magazine, vol. 50, no. 3, pp. 170–177, 2012. [34] W. ALLIANCE, “Wi-Fi Peer-to-Peer (P2P) Specification v1. 1,” WI-FI ALLIANCE SPECIFICATION, vol. 1, pp. 1–159, 2010 [35] Z. Alliance, “Zigbee specification,” Document 053474r06, Version, vol. 1, 2006. [36] S. Bluetooth, “Bluetooth specification version 1.1,” Available HTTP: http://www. bluetooth. com, 2001 [37] A. Asadi and V. Mancuso, “Energy efficient opportunistic uplink Packet forwarding in hybrid wireless networks,” in Proceedings of the fourth international conference on Future energy systems, 2013. [38] On the compound impact of opportunistic scheduling and D2D communications in cellular networks, Accepted for publication in ACM MSWIM, 2013. [39] C. Xu, L. Song, Z. Han, D. Li, and B. Jiao, “Resource allocation using a reverse iterative combinatorial auction for device-to-device underay cellular networks,” in Proceedings of IEEE GLOBECOM, 2012, pp. 4542–4547. [40] A. Asad , V.Mancuso” On the compound impact of opportunistic scheduling and D2D communications in cellular networks”, Accepted for publication in ACM MSWIM, 2013. [41] A. Asad , V.Mancuso” “WiFi Direct and LTE D2D in action,” Accepted for publication in IEEE Wireless Days, 2013. [42] N. Golrezaei, A. G. Dimakis, and A. F. Molisch, “Device-to-device collaboration through distributed storage,” in Proceedings of IEEE GLOBECOM, 2012, pp. 2397–2402. [43] A. Asadi and V. Mancuso, “Energy efficient opportunistic uplink packet forwarding in hybrid wireless networks,” in Proceedings of the fourth international conference on Future energy systems, 2013, pp. 261–262. [44] R1-132861. Final report of 3GPP TSG RAN WG1 #73 v1.0.0, August 2013. [45] 3GPP TR 22.803 v12.1.0, “Feasibility study for proximity services (ProSe)” 2013 [46] R1-132115, “Discussions on LTE device to device communication”, ZTE, May 2013
  • 25. [47] 3GPP TS 29.343 V12.1.0 (2014-12), “Proximity-services (ProSe) function to ProSe application server aspects (PC2)”; Stage 3 (Release 12). [48] B.Raghothaman, E. Deng, R. Pragada, G. Sternberg, T. Deng, and K.Vanganuru, “Architecture and protocols for LTE-based device to device communication,” in Proc. IEEE Int. Conf. Computing, Networking Communications, San Diego, CA, Jan. 2013, pp. 895–899. [49] 3GPP TS 23.303 version 12.2.0 Release 12, Proximity-based services (ProSe); Stage.2. ETSI TS 123 303 V12.2.0. 2014-09. [50] Athul Prasad, Andreas Kunz, Genadi Velev, Konstantinos Samdanis, and JaeSeung Song , Energy Efficient D2D Discovery for Proximity Services in 3GPP LTE-Advanced Networks. IEEE vehicular technology magazine ,December 2014. [51] 3GPP TS 24.334: "Proximity-services (Prose) User Equipment (UE) to Proximity-services (ProSe) Function aspects (PC3); Stage 3".June2014 [52] 3GPP TS 29.344 V12.3.0 (2015-06), Proximity-services (ProSe) Function to Home Subscriber Server (HSS) aspects; Stage 3 (Release 12), June 2015. [53] S. Mumtaz and J. Rodriguez (eds.), Smart Device to Smart Device Communication, DOI: 10.1007/978-3-319-04963-2_1,Springer International Publishing Switzerland 2014.
  • 26. Mobility Models for Delay Tolerant Network: A Survey M Shahzamal1 , M F Pervez1 , M A U Zaman1 and M D Hossain2 1 Institute of Electronics, Bangladesh Atomic Energy Commission, Bangladesh 2 Institute of Computer Science, Bangladesh Atomic Energy Commission, Bangladesh ABSTRACT Delay Tolerant Network (DTN) is an emerging networking technology that is widely used in the environment where end-to-end paths do not exist. DTN follows store-carry-forward mechanism to route data. This mechanism exploits the mobility of nodes and hence the performances of DTN routing and application protocols are highly dependent on the underlying mobility of nodes and its characteristics. Therefore, suitable mobility models are required to be incorporated in the simulation tools to evaluate DTN protocols across many scenarios. In DTN mobility modelling literature, a number of mobility models have been developed based on synthetic theory and real world mobility traces. Furthermore, many researchers have developed specific application oriented mobility models. All these models do not provide accurate evaluation in the all scenarios. Therefore, model selection is an important issue in DTN protocol simulation. In this study, we have summarized various widely used mobility models and made a comparison of their performances. Finally, we have concluded with future research directions in mobility modelling for DTN simulation. KEYWORDS Delay Tolerant Networking, Mobility Modelling, DTN Simulation For More Details: http://airccse.org/journal/jwmn/6414ijwmn10.pdf Volume Link : http://airccse.org/journal/jwmn_current14.html
  • 27. REFERENCES [1] Uddin, Md Yusuf S., David M. Nicol, Tarek F. Abdelzaher, and Robin H. Kravets. "A post-disaster mobility model for delay tolerant networking." In Winter Simulation Conference, pp. 2785-2796. Winter Simulation Conference, 2009. [2] Walker, Brenton D., T. Charles Clancy, and Joel K. Glenn. "Using localized random walks to model delay-tolerant networks." In Military Communications Conference, 2008. MILCOM 2008. IEEE, pp. 1-7. IEEE, 2008. [3] Hossmann, Theus, Thrasyvoulos Spyropoulos, and Franck Legendre. "Putting contacts into context: Mobility modeling beyond inter-contact times." In Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, p. 18. ACM, 2011. [4] Keränen, Ari, and Jörg Ott. "Increasing reality for dtn protocol simulations." Helsinki University of Technology, Tech. Rep (2007). [5] Chaintreau, Augustin, Pan Hui, Jon Crowcroft, Christophe Diot, Richard Gass, and James Scott. "Impact of human mobility on opportunistic forwarding algorithms." Mobile Computing, IEEE Transactions on 6, no. 6 (2007): 606-620. [6] Liang, Ben, and Zygmunt J. Haas. "Predictive distance-based mobility management for PCS networks." In INFOCOM'99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 3, pp. 1377-1384. IEEE, 1999. [7] Hong, Xiaoyan, Mario Gerla, Guangyu Pei, and Ching-Chuan Chiang. "A group mobility model for ad hoc wireless networks." In Proceedings of the 2nd ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems, pp. 53-60. ACM, 1999. [8] Johnson, David B., and David A. Maltz. "Dynamic source routing in ad hoc wireless networks." In Mobile computing, pp. 153-181. Springer US, 1996. AT&T Research. Graphviz - Graph Visualization Software. http://www.graphviz.org/, 2008. [Online; accessed 19-May-2008]. [9] Petz, Agoston, Justin Enderle, and Christine Julien. "A framework for evaluating dtn mobility models." In Proceedings of the 2nd International Conference on Simulation Tools and Techniques, p. 94. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2009. [10] Miao, Jingwei. "Message dissemination in mobile delay tolerant networks." PhD diss., INSA de Lyon, 2013. [11] C. Bettstetter, ”Mobility modeling in wireless networks: categorization, smooth movement and border effects”, ACM Mobile Computing and Commu. Rev., Jul. 2001. [12] Bettstetter, Christian. "Mobility modeling in wireless networks: categorization, smooth movement, and border effects." ACM SIGMOBILE Mobile Computing and Communications Review 5, no. 3 (2001): 55-66. [13] Royer, Elizabeth M., P. Michael Melliar-Smith, and Louise E. Moser. "An analysis of the optimum node density for ad hoc mobile networks." In Communications, 2001. ICC 2001. IEEE International Conference on, vol. 3, pp. 857-861. IEEE, 2001.
  • 28. [14] Haas, Zygmunt J. "A new routing protocol for the reconfigurable wireless networks." In Universal Personal Communications Record, 1997. Conference Record., 1997 IEEE 6th International Conference on, vol. 2, pp. 562-566. IEEE, 1997. [15] Zaninetti, Lorenzo, and Mario Ferraro. "On the truncated Pareto distribution with applications." Central European Journal of Physics 6, no. 1 (2008): 1-6. [16] Karamshuk, Dmytro, Chiara Boldrini, Marco Conti, and Andrea Passarella. "Human mobility modelsfor opportunistic networks." Communications Magazine, IEEE 49, no. 12 (2011): 157-165. [17] Rhee, Injong, Minsu Shin, Seongik Hong, Kyunghan Lee, Seong Joon Kim, and Song Chong. "On the levy-walk nature of human mobility." IEEE/ACM Transactions on Networking (TON) 19, no. 3 (2011): 630-643. [18] Keränen, Ari, Teemu Kärkkäinen, and Jörg Ott. "Simulating Mobility and DTNs with the ONE." Journal of Communications 5, no. 2 (2010): 92-105. [19] Chen, Jing-Chao. "Dijkstra’s shortest path algorithm." Journal of Formalized Mathematics 15 (2003). [20] Anthru, Shermina V., and T. P. Jayakumar. "Opportunistic Routing Protocols In Human Working Day Model Delay Tolerant Networks." International Journal Of Engineering And Computer Science, Volume 3 Issue 5, 2014, PP 5960-5965. [21] Thakur, Gautam S., Udayan Kumar, Ahmed Helmy, and Wei-Jen Hsu. "Analysis of Spatio-Temporal Preferences and Encounter Statistics for DTN Performance." arXiv preprint arXiv:1007.0960 (2010). [22] Bai, Fan, Narayanan Sadagopan, and Ahmed Helmy. "IMPORTANT: A framework to systematically analyze the Impact of Mobility on Performance of RouTing protocols for Adhoc NeTworks." In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 2, pp. 825-835. IEEE, 2003. [23] Musolesi, Mirco, and Cecilia Mascolo. "Designing mobility models based on social network theory." ACM SIGMOBILE Mobile Computing and Communications Review 11, no. 3 (2007): 59-70. [24] Boldrini, Chiara, and Andrea Passarella. "Hcmm: Modelling spatial and temporal properties of human mobility driven by users’ social relationships." Computer Communications 33, no. 9 (2010): 1056- 1074. [25] Pirozmand, Poria, Guowei Wu, Behrouz Jedari, and Feng Xia. "Human mobility in opportunistic networks: Characteristics, models and prediction methods." Journal of Network and Computer Applications 42 (2014): 45-58. [26] Hsu, Wei-jen, Thrasyvoulos Spyropoulos, Konstantinos Psounis, and Ahmed Helmy. "Modeling timevariant user mobility in wireless mobile networks." In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pp. 758-766. IEEE, 2007. [27] Mahendran, Veeramani, Sivaraman K. Anirudh, and C. Siva Ram Murthy. "A realistic framework for delay-tolerant network routing in open terrains with continuous churn." In Distributed Computing and Networking, pp. 407-417. Springer Berlin Heidelberg, 2011. [28] Lee, Kyunghan, Seongik Hong, Seong Joon Kim, Injong Rhee, and Song Chong. "SLAW: self- similar least-action human walk." IEEE/ACM Transactions on Networking (TON) 20, no. 2 (2012): 515- 529.
  • 29. [29] Rhee, I., K. Lee, S. Hong, S. J. Kim, and S. Chong. "Demystifying the levy-walk nature of human walks." Techical Report, NCSU, http://netsrv. csc. ncsu. edu/export/Demystifying Levy Walk Patterns. pdf (2008). [30] Walker, Brenton D., T. Charles Clancy, and Joel K. Glenn. "Using localized random walks to model delay-tolerant networks." In Military Communications Conference, 2008. MILCOM 2008. IEEE, pp. 1-7. IEEE, 2008. [31] Walker, Brenton D., Joel K. Glenn, and T. Charles Clancy. "Analysis of simple counting protocols for delay-tolerant networks." In Proceedings of the second ACM workshop on Challenged networks, pp. 19-26. ACM, 2007. [32] Gao, Wei, Qinghua Li, Bo Zhao, and Guohong Cao. "Multicasting in delay tolerant networks: a social network perspective." In Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, pp. 299-308. ACM, 2009. [33] Hossmann, Theus, Thrasyvoulos Spyropoulos, and Franck Legendre. "Know thy neighbor: Towards optimal mapping of contacts to social graphs for dtn routing." In INFOCOM, 2010 Proceedings IEEE, pp. 1-9. IEEE, 2010. [34] Shin, Minsu, Seongik Hong, and Injong Rhee. "DTN routing strategies using optimal search patterns." In Proceedings of the third ACM workshop on Challenged networks, pp. 27-32. ACM, 2008.
  • 30. Analyses and Performance of Techniques PAPR Reduction for STBC MIMO- OFDM System in (4G) Wireless Communication Leila Sahraoui, Djmail Messadeg, Nouredinne Doghmane Department of Electronics Faculty sciences of Engineering University Baji Mokhtar, Annaba bp 12 el hadjar, Algeria ABSTRACT An OFDM system is combined with multiple-input multiple-output (MIMO) in order to increase the diversity gain and system capacity over the time variant frequency-selective channels. However, a major drawback of MIMO-OFDM system is that the transmitted signals on different antennas might exhibit high peak-to-average power ratio (PAPR).In this paper, we present a PAPR analysis reduction of space- timeblock-coded (STBC) MIMO-OFDM system for 4G wireless networks. Several techniques have been used to reduce the PAPR of the (STBC) MIMOOFDM system: clipping and filtering, partial transmit sequence (PTS) and selected mapping (SLM). Simulation results show that clipping and filtering provides a better PAPR reduction than the others methods and only SLM technique conserve the PAPR reduction in reception part of signal. KEYWORDS MIMO-OFDM; peak-to-average power ratios; space-time coding system (STBC); clipping and filtering; SLM; PTS. For More Details: http://airccse.org/journal/jwmn/5513ijwmn03.pdf Volume Link : http://airccse.org/journal/jwmn_current13.html
  • 31. REFERENCES [1] Ms. V. B. Malode1, Dr. B. P. Patil2, “PAPR Reduction Using Modified Selective Mapping Technique,” Vol.02, No.2, pp. 626-630 (2010). [2] S. H. Han and J. H. Lee, “An overview of peak-to-average power ratio reduction techniques for multicarrier transmission,” IEEE Wireless Commun., Vol. 12, pp. 56–65, April. 2005 [3] T. Jiang and Y. Wu, “An overview: Peak-to-average power ratio reduction techniques for OFDM signals,” IEEE Trans. Broadcast., Vol. 54, pp. 257–268, June. 2008. [4] M.-S. Beak, M.J. Kim, Y.-H.You, and H.-K. Song, “Semi-blind estimation and PAR reduction for MIMO-OFDM system with multiple antennas,” IEEE Trans. Broadcast, Vol. 50, pp. 414-424, Dec. 2004. [5] R. F. H. Fischer and C. Siegl, “Performance of peak-to-average power ratio reduction in singleand multi-antenna OFDM via directed selected mapping,” IEEE Trans. Commun., Vol. 57, pp. 3205–3208, Nov. 2009. [6] Y. Lou J. Palicot, “A classification of methods for efficient power amplification of signals,” Annals of Telecommunications, Vol. 63, No. 7-8, pp. 351–368 (2008). [5] X.Li and L.J.Cimini, “Effects of Clipping and filtering on the Performance of OFDM,” IEEE Communications Letters, Vol.2, No. 5, pp.131-133, May 1998. [7] M. Mroué, Amor Nafkha,1 Jacques Palicot,1 Benjamin Gavalda,2 and Nelly dagorne2, Performance and Implementation Evaluation of TR PAPR Reduction Methods for DVB-T2, ” International Journal of Digital Multimedia Broadcasting, August 2010. [8] J. A. Davis and J. Jedwab, “Peak-to-mean power control in OFDM, Golay complementary sequences, and Reed-Muller codes,” IEEE Transactions on Information Theory, Vol. 45, No. 7, pp. 2397–2417, 1999. [9] S. H. M¨uller and J. B. Huber, “OFDM with reduced peakto-average power ratio by optimum combination of partial transmit sequences,” Electronics Letters, Vol. 33, No. 5, pp. 368–369, 1997. [10] R. W. B¨auml, R. F. H. Fischer, and J. B. Huber, “Reducing the peak-to-average power ratio of multicarrier modulation by selected mapping,” Electronics Letters, Vol. 32, No. 22, pp. 2056– 2057, (1996). [11] Radhia Gharsallah, Ridha Bouallegue "Combined with space time coding multi user detection for CDMA-OFDM/OQAM SYSTEM" International Journal of Wireless & Mobile Networks (IJWMN) Vol.4, No. 4, August 2012 [12] R. W. B. Auml, R. F. H. Fischer, and J. B. Huber, “Reducing the peak-to- average power ratio of multicarrier modulation by selected mapping,” Electron. Lett., Vol. 32, No. 22, pp. 2056-2057, Oct. 1996. [13] X. Li and L. J. Cimini, Jr., “Effect of clipping and filtering on the performance of OFDM,” IEEE Commun. Lett, Vol. 2, No. 5, pp. 131- 133, May 1998. [14] Y. A. Khan, M. A. Matin, and S. I. Ferdous, “PAPR Reduction in MIMO-OFDM Systems using Modified PTS and SLM without Side Information,” International Journal of Communication Networks and Information Security, Vol. 2, No.3, pp240-247, December 2010.
  • 32. [15] Yi-Sheng Su, Tsung-Cheng Wu, Chung-Hsuan Wang, and Min-Kuan Chang, “A Low- complexityCross-Antenna Rotation and Inversion Scheme for PAPR Reduction of STBC MIMO-OFDM Systems” 16th international workshop on computer aided modeling and design of communication links and networks (CAMAD) IEEE 2011 [16] P. Mukunthan and P.Dananjayan, “Modified PTS with FECs for PAPR Reduction of OFDM Signals,” International Journal of Computer Applications, Vol. 11, No.3, pp. 38-43, December 2010. [17] P.Mukunthan, P.dananjayan, “Modified PTS with FECs for PAPR redaction in MIMO-OFDM system with different subcarriers,” international symposium of humanities, Science and engineering Research IEEE 2011 [18] Seung Hee Han and Jae Hong Lee, “Modified selected Mapping Technique for PAPR reduction of coded OFDM signal,” IEEE Transaction on broadcasting, Vol. 50, No.3, pp.335-341, Sept 2004. [19] Pawan Sharma, Seema Verma "PAPR reduction of OFDM signals using selective mapping with turbo codes" International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 4, August 2011 [20] Yang Jie, Chen Lei, Liu Quan and Chan De, “A Modified selected mapping technique to reduce the Peak to Average Power Ratio of OFDM signal,” IEEE transaction on consumer Electronics, Vol53, No.3, pp. 846-851, August 2007. [21] Stefan H.Muller and Johannes B. Huber,“A Comparison of Peak Power Reduction Schemes for OFDM,” In Proc. of The IEEE Global Telecommunications conference GLOBECOM. 97, Phonix, Arizona, USA, pp.1-5, Nov. 1997. [22] Marco Breiling ,Stefan H. Muller-Weinfurtner and Johanes B.Huber, “SLM Peak-Power Reduction Without Explicit Side Information”, IEEE Communications Letters,Vol. 5, No.6, pp.239-241, JUNE 2001. [23] Jayalath, A.D.S, Tellainbura, C, “Side Information in PAR Reduced PTS-OFDM Signals,” Proceedings 14th IEEE Conference on Personal, Indoor and Mobile Radio Communications, Vol.1, Sept 2003. [24] Oh-Ju Kwon and Yeong-Ho Ha, “Multi-carrier PAP reduction method using sub-optimal PTS with threshold,” IEEE Transactions on Broadcasting, vol. 49, June 2003. [25] Suverna Sengar1, Partha Pratim Bhattacharya, “Performance Improvement in OFDM system by papr reduction”, Signal & Image Processing: An International Journal (SIPIJ) Vol.3, No.2, April 2012.
  • 33. Frequency and Time Domain Packet Scheduling Based on Channel Prediction with Imperfect CQI in LTE Yongxin Wang1 , Kumbesan Sandrasegaran2 , Xinning Zhu3 , Jingjing Fei4 Xiaoying Kong5 and Cheng- Chung Lin 6 1 FEIT, University of Technology, Sydney, Australia 2 FEIT, University of Technology, Sydney, Australia 3 Beijing University of Post and Telecommunications, Beijing, China 4 CSE, University of New South Wales, Sydney, Australia 5 FEIT, University of Technology, Sydney, Australia 6 FEIT, University of Technology, Sydney, Australia ABSTRACT Channel-dependent scheduling of transmission of data packets in a wireless system is based on measurement and feedback of the channel quality. To alleviate the performance degradation due to simultaneous multiple imperfect channel quality information (CQI), a simple and efficient packet scheduling (PS) algorithm is developed in downlink LTE system for real time traffic. A frequency domain channel predictor based on Kalman filter is first developed to restore the true CQI from erroneous channel quality feedback. Then, a time domain grouping technique employing the joint of Proportional Fair (PF) and Modified Largest Weighted Delay First (M-LWDF) algorithms is used. It was proved this proposal achieves better performance in terms of system throughput and packet loss ratio by simulation results. KEYWORDS LTE, packet scheduling, channel estimation, Kalman filter, imperfect CQI For More Details: http://airccse.org/journal/jwmn/5413ijwmn12.pdf Volume Link : http://airccse.org/journal/jwmn_current13.html
  • 34. REFERENCES [1] K. Kinoshita, "Current Status of “FDMA” 3G service and DoCoMo’s B3G Activities," in ICB3G – 2004, May 2004, pp. 13-21. [2] 3GPP, Physical Layer Aspects for Evolved Universal Terrestrial Radio Access (UTRA) (Release 7), 2009. [3] A. Jalali, R. Padovani, and R. Pankaj, "Data throughput of CDMA-HDR a high efficiency-high data rate personal communication wireless system," in Vehicular Technology Conference Proceedings, 2000. VTC 2000-Spring Tokyo. 2000 IEEE 51st, 2000, pp. 1854-1858. [4] M. Stambaugh, "HARQ Process Boosts LTE Communications," Agilent Technologies Sep, 2008. [5] H. A. M. Ramli, R. Basukala, K. Sandrasegaran, and R. Patachaianand, "Performance of well known packet scheduling algorithms in the downlink 3GPP LTE system," in Communications (MICC), 2009 IEEE 9th Malaysia International Conference on, 2009, pp. 815-820. [6] A. Pokhariyal, T. E. Kolding, and P. E. Mogensen, "Performance of Downlink Frequency Domain Packet Scheduling for the UTRAN Long Term Evolution," in Personal, Indoor and Mobile Radio Communications, 2006 IEEE 17th International Symposium on, 2006, pp. 1-5. [7] J. Gross, J. Klaue, H. Karl, and A. Wolisz, "Subcarrier allocation for variable bit rate video streams in wireless OFDM systems," in Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th, 2003, pp. 2481-2485 Vol.4. [8] N. Ruangchaijatupon and J. Yusheng, "Simple Proportional Fairness Scheduling for OFDMA FrameBased Wireless Systems," in Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE, 2008, pp. 1593-1597. [9] P. Jeongsik, H. Sungho, and C. Ho-Shin, "A Packet Scheduling Scheme to Support Real-Time Traffic in OFDMA Systems," in Vehicular Technology Conference, 2007. VTC2007-Spring. IEEE 65th, 2007, pp. 2766-2770. [10] X. Liu, L. Guangyi, Y. Wang, and P. Zhang, "Downlink Packet Scheduling for Real-Time Traffic in Multi-User OFDMA System," in Vehicular Technology Conference, 2006. VTC-2006 Fall. 2006 IEEE 64th, 2006, pp. 1-5. [11] A. Wang, L. Xiao, S. Zhou, X. Xu, and Y. Yao, "Dynamic resource management in the fourth generation wireless systems," in Communication Technology Proceedings, 2003. ICCT 2003. International Conference on, 2003, pp. 1095-1098 vol.2. [12] A. Pokhariyal, K. I. Pedersen, G. Monghal, I. Z. Kovacs, C. Rosa, T. E. Kolding, and P. E. Mogensen, "HARQ Aware Frequency Domain Packet Scheduler with Different Degrees of Fairness for the UTRAN Long Term Evolution," in Vehicular Technology Conference, 2007. VTC2007-Spring. IEEE 65th, 2007, pp. 2761-2765. [13] B. Kian Chung, S. Armour, and A. Doufexi, "Joint Time-Frequency Domain Proportional Fair Scheduler with HARQ for 3GPP LTE Systems," in Vehicular Technology Conference, 2008. VTC 2008- Fall. IEEE 68th, 2008, pp. 1-5. [14] R. A. Akl, S. Valentin, G. Wunder, and S. Stanczak, "Compensating for CQI Aging By Channel Prediction: The LTE Downlink."
  • 35. [15] M. R. Souryal and R. L. Pickholtz, "Adaptive modulation with imperfect channel information in OFDM," in Communications, 2001. ICC 2001. IEEE International Conference on, 2001, pp. 1861- 1865 vol.6. [16] W. Yafeng and Y. Hongwen, "Retransmission priority scheduling algorithm for forward link packet data service," in Communication Technology Proceedings, 2003. ICCT 2003. International Conference on, 2003, pp. 926-930. [17] I. C. Wong and B. Evans, "Optimal resource allocation in the OFDMA downlink with imperfect channel knowledge," Communications, IEEE Transactions on, vol. 57, pp. 232-241, 2009. [18] D. S. W. Hui and V. K. N. Lau, "Delay-sensitive cross-layer designs for OFDMA systems with outdated CSIT," in Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE, 2007, pp. 264-269. [19] H. Ayoub and M. Assaad, "Scheduling in OFDMA Systems With Outdated Channel Knowledge," in Communications (ICC), 2010 IEEE International Conference on, 2010, pp. 1-5. [20] T. Villa, R. Merz, R. Knopp, and U. Takyar, "Adaptive modulation and coding with hybrid-ARQ for latency-constrained networks," in European Wireless, 2012. EW. 18th European Wireless Conference, 2012, pp. 1-8. [21] J.-H. Jeon and Y.-H. Lee, "Prediction of channel information in multi-user OFDM systems," in Circuits and Systems, 2006. MWSCAS'06. 49th IEEE International Midwest Symposium on, 2006, pp. 468-472. [22] J. Bonnet and G. Auer, "Chunk-based channel estimation for uplink OFDM," in Vehicular Technology Conference, 2006. VTC 2006-Spring. IEEE 63rd, 2006, pp. 1555-1559. [23] D. Aronsson, T. Svensson, and M. Sternad, "Performance evaluation of memory-less and Kalmanbased channel estimation for OFDMA," in Vehicular Technology Conference, 2009. VTC Spring 2009. IEEE 69th, 2009, pp. 1-5. [24] R. E. Kalman, "A new approach to linear filtering and prediction problems," Journal of basic Engineering, vol. 82, pp. 35-45, 1960. [25] A. G. Orozco-Lugo, F. A. Cruz Prez, and G. Hernandez Valdez, "Investigating the boundary effect of a multimedia TDMA personal mobile communication network simulation," in Vehicular Technology Conference, 2001. VTC 2001 Fall. IEEE VTS 54th, 2001, pp. 2740-2744 vol.4. [26] K. I. Pedersen, G. Monghal, I. Z. Kovacs, T. E. Kolding, A. Pokhariyal, F. Frederiksen, and P. Mogensen, "Frequency Domain Scheduling for OFDMA with Limited and Noisy Channel Feedback," in Vehicular Technology Conference, 2007. VTC-2007 Fall. 2007 IEEE 66th, 2007, pp. 1792-1796. [27] M. Kohler, Using the Kalman filter to track human interactive motion: modelling and initialization of the Kalman filter for translational motion: Citeseer, 1997. [28] G. Monghal, K. I. Pedersen, I. Z. Kovacs, and P. E. Mogensen, "QoS Oriented Time and Frequency Domain Packet Schedulers for The UTRAN Long Term Evolution," in Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE, 2008, pp. 2532-2536.
  • 36. Optimization of the Recursive One-Sided Hypothesis Testing Technique for Autonomous Threshold Estimation in Cognitive Radio James Odinaka Okonkwo1 and Sylvester Ajah2 1 Department of Telecommunication Engineering, Federal University of Technology Minna, Niger State, Nigeria 2 Computer Engineering Technology, AkanuIbiam Federal Polytechnic Unwana, Ebonyi State, Nigeria ABSTRACT In this paper, an optimized Recursive One-Sided Hypothesis Testing (ROHT) threshold estimation algorithm for energy detection based on Cognitive Radio (CR) application is presented. The ROHT algorithm is well known to compute and correct threshold values based on the choice of the parameter values; namely the coefficient of standard deviation (z-value) and the stopping criteria (). A fixed computational process has been employed in most cases to estimate these parameter values, thus rendering them non-adaptive under different sensing conditions. Also, this fixed (manual tuning) process requires prior knowledge of some noise level to enable pre-configuration of a predefined target false alarm rate. This renders the parameter estimation process cumbrous and unworkable for real-time purposes, particularly for autonomous CR applications. Furthermore, using wrong parameter values may lead to either too high or too low false alarms or detection rates of the algorithm. Sequel to aforementioned mentioned constraints, we propose a new mechanism for instantaneous parameter optimization of the ROHT algorithm using Particle Swarm Optimization (PSO) algorithm. Our PSO-ROHT model design was extensively tested under different conditions and results were compared to the non-optimized ROHT. The results obtained show that the proposed design effectively adapts the parameter values of the Recursive One-Sided Hypothesis Testing algorithm in accordance with the input dataset under consideration. Also, that the proposed optimized model outperforms its non- optimized counterpart following the estimated detection probability and false alarm probability of both schemes, particularly in detecting Orthogonal Frequency-Division Multiplexing signals. In detecting the Orthogonal Frequency-Division Multiplexing signals at signal-to-noise ratio of 3dB and above, the proposed model achieved a higher detection rate of 96.23% while maintaining a low false alarm rate below 10%, which complies with the IEEE 802.22 standard for Cognitive Radio application. Our PSO-ROHT algorithm is shown to be highly effective for autonomous and full blind signal detection in CR, with strong potentials for application in other areas requiring automatic threshold estimation. KEYWORDS Adaptive, Autonomous, Cognitive Radio, Energy detector, Optimization, Particle Swarm, PSO – ROHT algorithm, ROHT, threshold For More Details: http://aircconline.com/ijwmn/V10N6/10618ijwmn01.pdf Volume Link: http://airccse.org/journal/jwmn_current18.html
  • 37. REFERENCES [1] M. Marcus, J. BUrtle, B. Franca, A. Lahjiouji and N. McNeil, "Report of the Unlicensed Devices and Experimental Licenses Working Group," 2002. [2] M. Rouse, "Techtarget.com," November 2008. [Online]. Available: http://searchnetworking.techtarget.com/definition/cognitive-radio. [Accessed 19 June 2017]. [3] K. S. C. D. B. S. S. N. Carlos de M. Cordeiro, "IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios," JCM, vol. 1, no. 1, pp. 38-47, April 2006. [4] N. T. Ng’ethe, "An Adaptive Threshold Energy Detection Technique with Noise Variance Estimation for Cognitive Radio Sensor Networks (Doctoral dissertation, University of Cape Town)," 2015. [5] E. N. O. A. M. A. O. U. a. M. S. A.J. Onumanyi, "A modified Otsu's algorithm for improving the performance of the energy detector in cognitive radio," AEU- International Journal of Electronics and Communication, vol. 79, pp. 53-63, 2017. [6] S. Bames, P. v. Vuuren and B.T.Maharaj., "Spectrum occupancy investigation: Measurements in South Africa," ELSEIVIER, vol. 46, no. 9, pp. 3098-3112, 2013. [7] S. V. Vaseghi, Advanced Digital Signal Processing and Noise Reduction, WILEY, 2008. [8] A. M. W. a. G. J. M. D. Datla, " A Spectrum Surveying Framework for Dynamic Spectrum Access Networks," IEEE, vol. 58, no. 8, pp. 4158 - 4168, 2009. [9] D. D. V. P. P. K. a. G. J. M. F. Weidling, "A framework for R.F. spectrum measurements and analysis," in New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. 2005 First IEEE International Symposium on, Baltimore, MD, USA, USA, 2005. [10] A. M. W. J. M. Dinesh Datla, "A Spectrum Surveying Framework for Dynamic Spectrum Access Networks," IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4158 - 4168, 2009.
  • 38. Use of Genetic Algorithm In The Optimisation Of The Lte Deployment Mohammed Jaloun1 , Zouhair Guennoun2 and Adnane Elasri3 1 Department of Electrical and Communication, EMI School, Rabat, Morocco 2 Department of Electrical and Communication, EMI School, Rabat, Morocco 3 Department of Electrical and Communication, EMI School, Rabat, Morocco ABSTRACT The purpose of this paper is to evaluate LTE deployment and to optimize RF parameters that include sub channel power, antenna down tilt, azimuth and beam-width. An integer optimizing based on genetic programming is developed by evaluating the signal-to-interference plus noise ratio. The simulation uses a static model based on an OFDMA module designed for a Long Term Evolution (LTE) network from 3GPP [TR36.942]. The site location and initial antenna parameters are taken from real GSM network already optimized for coverage. Our analysis shows that the LTE network performance could be increased by more than 45% by adjusting both cells power and antenna parameters. KEYWORDS LTE, RF Optimization, Antenna, Genetic algorithm, Wireless For More Details: http://airccse.org/journal/jwmn/0611wmn04.pdf Volume Link: http://airccse.org/journal/jwmn_current11.html
  • 39. REFERENCES [1] 3GPP TR36.942 “Evolved Universal Terrestrial Radio Access Network (E-UTRA); Radio Frequency (RF) system scenarios”, 02-2008. [2] Engineering Optimization: An Introduction with Metaheuristic Applications. 173 By Xin-She Yang. Copyright c 2010 John Wiley & Sons, Inc. [3] A. Ligeti and J. Zander, “Minimal cost coverage planning for single frequency networks,” Broadcasting, IEEE Transactions on, vol. 45, no. 1, pp. 78–87, March 1999. [4] D. Yuan, “A decomposition method for pilot power optimization in WCDMA networks,” Department of Science and Technology, Link¨oping University, Tech. Rep., 2003. [5] P. V¨arbrand and D. Yuan, “A mathematical programming approach for pilot power optimization in WCDMA networks,” in Australian Telecommunications, Networks and Applications Conference ATNAC, 2003. [6] C. Murphy, M. Dillon, and A. Diwan, “Performance gains using remote control antennas in CDMA and 1xEV-DO networks,” in Vehicular Technology Conference, 2005. VTC-2005-Fall. 2005 IEEE 62nd, vol. 1, September 2005, pp. 377–381. [7] 3GPP TR System Simulation Evaluation for Link from eNode-B to RN. [8] 3GPP TS36.912 “Feasibility study for Further Advancements for E-UTRA (LTE-Advanced)”.