Wireless networks incorporate Mobile Nodes (MNs) that use wireless access networks to communicate. However, the communication among these MNs are not remained stable due to the poor network coverage during inter mobility. Moreover, the wireless nodes are typically small that results in resource-constrained. Thus, it is uphill to use algorithms having giant processing power or memory footprint. Accordingly, it is essential to check schemes consistently to evaluate the performance within the probable application scenario. To do so, numerical analysis could be a notable method to grasp the performance of mobility management schemes as well as the constraint of evolving mobility management solutions specifically for multi-interfaced MR in Proxy NEMO environment. This paper analyzes handoff performance by using a mathematical model of Multihoming-based scheme to support Mobility management in Proxy NEMO (MM-PNEMO) environment. Moreover, a comparative study has been made among the standard Network Mobility Basic Support Protocol (NEMO BSP), Proxy NEMO (PNEMO) and MM-PNEMO scheme respectively. The performance metrics estimated for these schemes are mainly handoff delay and packet loss. This paper also analysed the packet loss ratio and handoff gain as a function of cell radius, number of SMR and velocity respectively. It is apparent that, the MM-PNEMO scheme shows lower packet loss ratio (1%) compared to NEMO-BSP (11%) and P-NEMO (6%).
Transceiver Design for MIMO Systems with Individual Transmit Power ConstraintsIJECEIAES
This paper investigate the transceiver design for single-user multiple-input multiple- output system (SU-MIMO). Joint transceiver design with an improper modulation is developed based on the minimum total mean-squared error (TMSE) criterion under two different cases. One is equal power allocation (EPA) and other is the power constraint that jointly meets both EPA and total transmit power constraint (TTPC) (i.e ITPC). Transceiver is designed based on the assumption that both the perfect and imperfect channel state information (CSI) is available at both the transmitter and receiver. The simulation results show the performance improvement of the proposed work over conventional work in terms of bit error rate (BER).
Thus the article offers the model represented by algebraic equations and inequalities for routing and
policing traffic in infocommunication network. The novelty of the model is as follows: multiflow nature of
modern ICN is taken into account (1), i.е. a set of flows circling between different pairs of network routers are
considered simultaneously; coherent formalization of processes of traffic routing and policing within the model
that has lower dimensionality in comparison to known earlier is provided; the choice of optimality criterion, use
of which allows to implement multipath routing with consequent inclusion of paths as well as to organize
limitation of flow intensity on all the used routs simultaneously depending on their characteristics and flow
priority. According to the results of the analysis conducted we offer recommendations for choosing relation in
numerical values of routing metrics and service denial regarding the provision of the given values for the main
QoS characteristics, e.g. average packet delay. The model can be used as a basis for perspective protocol
decisions aimed at coherence of solutions for the tasks of traffic routing and policing. Further development of
the given model is possible under full account of stochastic characteristics of packet flows circling in the
network.
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...ijwmn
Hierarchical Genetic Algorithms (HGA) as a tool for search and optimizing methodology have now reached a mature stage. The minimum resource facility to carry user traffic, termed a channel unit (CU), is composed of a one time-slot and one code in the TD-CDMA/TDD system. The control of the number of CUs depends on the traffic load solves varied and asymmetrical traffic problems in the 3G system. In a cellular network, the call arrival rate, call duration and the communication overhead between the base stations and the control center are vague and uncertain, regardless of whether the criteria of concern are nonlinear, constrained, discrete or NP hard. In this paper, the HGA is used to tackle the neural network (NN) topology as well as the fuzzy logic controller for the dynamic CU allocation scheme in wireless cellular networks. Therefore, we propose a new efficient HGA CUs Allocation (HGACA) in cellular networks. It aims to efficiently satisfy the diverse quality-of-service (QoS) requirements of multimedia traffic. The results show our algorithm has a lower blocking rate, lower dropping rate, less update overhead, and shorter channel-acquisition delay than previous methods
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...cscpconf
User mobility in wireless data networks is increasing because of technological advances and the
desire for voice and multimedia applications. These applications, however, require fast handoffs
between base stations to maintain the quality of the connections. In this paper, the authors
describe the use of novel and efficient data structure which dynamically allocates guard channel
for handoffs and introduces the concept of channel borrowing strategy. The proposed scheme
allocates the guard channels for handoff requests dynamically, based on the traffic load for
certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and handoff calls. This approach maximizes the channel utilization. The simulation results prove that the channel borrowing scheme improves the overall throughput.
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
The future is moving towards offering multiples services based on the same technology. Then, billions of sensors will be needed to satisfy the diversity of these services. Such considerable amount of connected devices must insure efficient data transmission for diverse applications. Wireless sensor network (WSN) represents the most preferred technology for the majority of applications. Researches in medium access control (MAC) mechanism have been of significant impact to the application growth because the MAC layer plays a major role in resource allocation in WSNs. We propose to enhance a MAC protocol of WSN to overcome traffic changes constraints. To achieve focused goal, we use elastic hybrid MAC scheme. The main interest of the developed MAC protocol is to design a medium access scheme that respect different quality of services (QoS) parameters needed by various established traffic. Simulation results show good improvement in measured parameters compared to typical protocol.
Transceiver Design for MIMO Systems with Individual Transmit Power ConstraintsIJECEIAES
This paper investigate the transceiver design for single-user multiple-input multiple- output system (SU-MIMO). Joint transceiver design with an improper modulation is developed based on the minimum total mean-squared error (TMSE) criterion under two different cases. One is equal power allocation (EPA) and other is the power constraint that jointly meets both EPA and total transmit power constraint (TTPC) (i.e ITPC). Transceiver is designed based on the assumption that both the perfect and imperfect channel state information (CSI) is available at both the transmitter and receiver. The simulation results show the performance improvement of the proposed work over conventional work in terms of bit error rate (BER).
Thus the article offers the model represented by algebraic equations and inequalities for routing and
policing traffic in infocommunication network. The novelty of the model is as follows: multiflow nature of
modern ICN is taken into account (1), i.е. a set of flows circling between different pairs of network routers are
considered simultaneously; coherent formalization of processes of traffic routing and policing within the model
that has lower dimensionality in comparison to known earlier is provided; the choice of optimality criterion, use
of which allows to implement multipath routing with consequent inclusion of paths as well as to organize
limitation of flow intensity on all the used routs simultaneously depending on their characteristics and flow
priority. According to the results of the analysis conducted we offer recommendations for choosing relation in
numerical values of routing metrics and service denial regarding the provision of the given values for the main
QoS characteristics, e.g. average packet delay. The model can be used as a basis for perspective protocol
decisions aimed at coherence of solutions for the tasks of traffic routing and policing. Further development of
the given model is possible under full account of stochastic characteristics of packet flows circling in the
network.
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...ijwmn
Hierarchical Genetic Algorithms (HGA) as a tool for search and optimizing methodology have now reached a mature stage. The minimum resource facility to carry user traffic, termed a channel unit (CU), is composed of a one time-slot and one code in the TD-CDMA/TDD system. The control of the number of CUs depends on the traffic load solves varied and asymmetrical traffic problems in the 3G system. In a cellular network, the call arrival rate, call duration and the communication overhead between the base stations and the control center are vague and uncertain, regardless of whether the criteria of concern are nonlinear, constrained, discrete or NP hard. In this paper, the HGA is used to tackle the neural network (NN) topology as well as the fuzzy logic controller for the dynamic CU allocation scheme in wireless cellular networks. Therefore, we propose a new efficient HGA CUs Allocation (HGACA) in cellular networks. It aims to efficiently satisfy the diverse quality-of-service (QoS) requirements of multimedia traffic. The results show our algorithm has a lower blocking rate, lower dropping rate, less update overhead, and shorter channel-acquisition delay than previous methods
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...cscpconf
User mobility in wireless data networks is increasing because of technological advances and the
desire for voice and multimedia applications. These applications, however, require fast handoffs
between base stations to maintain the quality of the connections. In this paper, the authors
describe the use of novel and efficient data structure which dynamically allocates guard channel
for handoffs and introduces the concept of channel borrowing strategy. The proposed scheme
allocates the guard channels for handoff requests dynamically, based on the traffic load for
certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and handoff calls. This approach maximizes the channel utilization. The simulation results prove that the channel borrowing scheme improves the overall throughput.
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
The future is moving towards offering multiples services based on the same technology. Then, billions of sensors will be needed to satisfy the diversity of these services. Such considerable amount of connected devices must insure efficient data transmission for diverse applications. Wireless sensor network (WSN) represents the most preferred technology for the majority of applications. Researches in medium access control (MAC) mechanism have been of significant impact to the application growth because the MAC layer plays a major role in resource allocation in WSNs. We propose to enhance a MAC protocol of WSN to overcome traffic changes constraints. To achieve focused goal, we use elastic hybrid MAC scheme. The main interest of the developed MAC protocol is to design a medium access scheme that respect different quality of services (QoS) parameters needed by various established traffic. Simulation results show good improvement in measured parameters compared to typical protocol.
To increase the network capacity, there is
need to minimize the interference among nodes and
optimum control of topology in the foundation of
network. Recently, technological development helps to
build of mobile ad-hoc networks (MANETs) in order to
improve the quality of service (QoS) in terms of delay. In
contradictory to the objective of minimizing interference,
it is important to concern topology control in delay
constrained environment. The present research work
attempts to control the delay-constrained topology with
jointly considering delay and interference concept.
Additionally, the study proposed an interference oriented
topology control algorithm for delay-constrained
MANETs by taking account of both the interference
constraint and the delay constraint under the specific
condition of transmission delay, contention delay and the
queuing delay. Further, the study investigated the impact
of node mobility on the interference oriented topology
control algorithm. Finally, the results of the present
study shows that the proposed algorithm controls the
topology to convince the interference constraint, and
increases the transmit range to congregate the delay
requirement. Also, the study conclude that the algorithm
could effectively reduce the delay protocol and improve
the performance effectively in delay-constrained mobile
ad hoc networks.
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDMTELKOMNIKA JOURNAL
We propose a multi-class mechanism for Optical Code Division Multiplexing (OCDM), Wavelength
Division Multiplexing (WDM) Optical Packet Switch (OPS) architecture capable of supporting Quality of Service
(QoS) transmission. OCDM/WDM has been proposed as a competitive hybrid switching technology to
support the next generation optical Internet. This paper addresses performance issues in the slotted OPS
networks and proposed four differentiation schemes to support Quality of Service. In addition, we present a
comparison between the proposed schemes as well as, a simulation scheduler design which can be suitable
for the core switch node in OPS networks. Using software simulations the performance of our algorithm in
terms of losing probability, the packet delay, and scalability is evaluated.
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop technology increasing the coverage
of IEEE 802.11 Wireless Network and providing Internet access. In order to increase the mesh network
capacity, the WMN has evolved from single-radio single-channel architecture to Multi-Channel Multi-
Radios (MC-MR) architecture. In MC-MR the main challenge of the WMN is the channel assignment. In
this article, we propose a new channel assignment method based on channel diversity. This new method
named ODCAM (On Demand channel Assignment Method for channel diversity ) defines a channel
diversity mechanism used to select a new channel along the path between the source and the destination.
The best path between the source and the destination is provided by the HWMP (Hybrid Wireless Mesh
Protocol) protocol using MWCETT (Modified Weighted Cumulative Expected Transmission Time) an
extension of the WCETT metric. The simulation results show the ODCAM performance compared with an
hybrid approach.
In Wireless Sensor Network (WSN), QoS (Quality of Service) in sensor application plays a very important
role. QoS based routing is required to ensure the best use of nodes in WSN. In this paper, a comparative
study of QoS based routing in Media Access Control (MAC) protocols are presented based on the traits to
solve problems like prioritization, timeliness, reliability etc. The study mainly focuses on some priority
based QoS protocols used in WSN and a comparison among them. The study reveals that among the five
mentioned protocols; QMAC, PRIMA, DB-MAC, RAP, GTS; PRIMA shows the best performance in the
category of Packet Prioritization, Scheduling Scheme, Queue Type, Energy Awareness and QoS.
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
In this paper, we have presented the Modified Multicasting through Time Reservation using Adaptive
Control for Excellent Energy efficiency (MMC-TRACE). It is a real time multicasting architecture for
Mobile Ad-Hoc networks to make their work an energy efficient one .MMC-TRACE is a cross layer design
where the network layer and medium access control layer functionality are done in a single integrated
layer design. The basic design of the architecture is to establish and maintain an active multicast tree
surrounded by a passive mesh within a mobile ad hoc network. Energy efficiency is maximized by enabling
the particular node from sleep to awake mode while the remaining nodes of the same path are maintained
at sleep mode. Energy efficiency too achieved by eliminating most of the redundant data receptions across
nodes. The performance of MMC-TRACE are evaluated with the help of ns-2 simulations and comparisons
are made with its predecessor such as MC-TRACE. The results show that the MMC-TRACE provides
superior energy efficiency, competitive QoS performance and bandwidth efficiency.
Routing in All-Optical Networks Using Recursive State Space Techniquesipij
In this papr, we have minimized the effects of failures on network performace, by using suitable Routing
and Wavelenghth Assignment(RWA) method without disturbing other performance criteria such as blocking
probability(BP) and network management(NM). The computation complexity is reduced by using Kalaman
Filter(KF) techniques. The minimum reconfiguration probability routing (MRPR) algorithm must be
able to select most reliable routes and assign wavelengths to connections in a manner that utilizes the light
path(LP) established efficiently considering all possible requests.
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
The aim of equipping a wireless network with a mobile relay node is to support broadband wireless communications for vehicular users and their devices. The high mobility of vehicular users, possibly at a very high velocity in the area in which two cells overlap, could cause the network to suffer from a reduced handover success rate and, hence, increased radio link failure. The combined impact of these problems is service interruptions to vehicular users. Thus, the handover schemes are crucial in solving these problems. In this work, we first present the adaptive handover hysteresis scheme for the wireless network with mobile relay nodes in the high-speed train scenario. Specifically, our proposed adaptive hysteresis scheme is based on the velocity of the train. Second, the handover call dropping probability is reduced by introducing a modified call admission control scheme to support radio resource reservation for handover calls that prioritizes handover calls of mobile relay over the other calls. The proposed solution in which adaptive parameter is combined with call admission control is evaluated by system level simulation. Our simulation results illustrate an increased handover success rate and reduced radio link failures.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
Study on transmission over Nakagami-m fading channel for multiple access sche...TELKOMNIKA JOURNAL
In this paper, a downlink performance in non-orthogonal multiple access (NOMA) system is considered. With regard to different priority for two NOMA users, we exploit the closed-form expressions of outage probability over wireless fading channel following Nakagami-m fading. The fixed power allocation factor scheme is examined to reduce the complexity in computation regarding performance analysis. In our analysis, perfect successive interference cancellation (SIC) is applied in order to achieve perfect signal decoding operation. Simulation results show that the considered NOMA downlink scheme is affected by transmit SNR, power allocation factors, fading parameters.
LARGE-SCALE MULTI-USER MIMO APPROACH FOR WIRELESS BACKHAUL BASED HETNETScsandit
In this paper, we consider the optimization of wireless capacity-limited backhaul links in future heterogeneous networks (HetNets). We assume that the HetNet is formed with one macro-cell base station (MBS), which is associated with multiple small-cell base stations (SBSs). It is also assumed both the MBS and the SBSs are equipped with massive arrays, while all mobiles users (macro-cell and small-cell users) have single antenna. For the backhaul links, we propose to use a capacity-aware beamforming scheme at the SBSs and MRC at the MBS. Using particle swarm optimization (PSO), each SBS seeks the optimal transmit weight vectors that maximize the backhaul uplink capacity and the access uplinks signal-to-interference plus noise ratio (SINR). The performance evaluation in terms of the symbol error rate (SER) and the ergodic system capacity shows that the proposed capacity-aware backhaul link scheme achieves similar or better performance than traditional wireless backhaul links and requires considerably less computational complexity.
MECC scheduling algorithm in vehicular environment for uplink transmission in...IJECEIAES
Single Carrier Frequency Division Multiple Access (SC-FDMA) is chosen because of the lower peak-to-average power ratio (PAPR) value in uplink transmission. However, the contiguity constraint is one of the major constraint presents in uplink packet scheduling, where all RBs allocated to a single UE must be contiguous in the frequency-domain within each time slot to maintain its single carrier. This paper proposed an uplink-scheduling algorithm namely the Maximum Expansion with Contiguity Constraints (MECC) algorithm, which supports both the RT and NRT services. The MECC algorithm is deployed in two stages. In the first stage, the RBs are allocated fairly among the UEs. The second stage allocates the RBs with the highest metric value and expands the allocation on both sides of the matrix, M with respect to the contiguity constraint. The performance of the MECC algorithm was observed in terms of throughput, fairness, delay, and Packet Loss Ratio (PLR) for VoIP, video and best effort flows. The MECC scheduling algorithm is compared to other algorithms namely the Round Robin (RR), Channel-Dependent First Maximum Expansion (CD-FME), and Proportional Fairness First Maximum Expansion (PF-FME). From here, it can be concluded that the MECC algorithm shows the best results among other algorithms by delivering the highest throughput which is up to 81.29% and 90.04% than CD-FME and RR scheduler for RT and NRT traffic respectively, having low PLR and delay which is up to 93.92% and 56.22% of improvement than CD-FME for the RT traffic flow. The MECC also has a satisfactory level of fairness for the cell-edge users in a vehicular environment of LTE network.
Performance of the MIMO-MC-CDMA System with MMSE EqualizationTamilarasan N
Multipath fading and spectral crowding are the
major challenges in dealing higher data rate in future
broadband wireless communication system. Multi-carrier
Modulation like Multicarrier code division multiple access
(MC-CDMA) can tackle the problem and provide higher data
rate for future wireless communication system. However,
through a frequency selective fading channel, the subcarriers
in MC-CDMA signal have different amplitude levels and phase
shifts which result in loss of the orthogonality among users
and generates Multiple access interference (MAI). To combat
the MAI, various amplitude and phase equalizing techniques
such as Maximum Ratio Combining (MRC), Equal Gain
Combining (EGC), Orthogonal Restoring Combining (ORC),
Threshold Orthogonal Restoring Combining or Minimum
Mean Square Error (MMSE) may be used. Out of these MMSE
offers better performance since the MMSE criterion is applied
independently on each subcarrier. Further improvement in
performance is possible through space–time block coding,
which offers maximum diversity gain and multiplexing gain.
This paper combines MC-CDMA with MMSE equalization
and space–time block coding which proves to be a powerful
physical layer solution in combating delay spread and inter
symbol interference (ISI).
21 9149 simulation analysis for consistent path identification edit septianIAESIJEECS
As the demand for Mobile Ad hoc Network (MANET) applications grows, so does their use of many essential services where node consistent and stability of the communication paths are of great importance. In this scheme, we propose Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime (CPIR). This technique offers more stable path and transmits the data through the consistent nodes. This article is focused on protecting the route from the inconsistent node in mobile communications to improve the network performance and reduce the energy consumption in the network. The simulation results demonstrate that CPIR provided reduce the energy utilization and improved both the longer lifetimes and increased number of packets delivered.
A new clustering technique based on replication for MANET routing protocolsTELKOMNIKA JOURNAL
The cluster head nodes in most mobile ad hoc networks (MANET) clustering protocols take on an extraordinary role in managing routing information. The reliability, efficiency and scalability of the clustering in MANET will ultimately be dramatically impacted. In this work we establish a new approach to form the clusters in MANET called the square cluster-based routing protocol (SCBRP). That protocol is based on the theory of replication. The goal of the protocol is to achieve reliability, availability and scalability with in the MANET. The proposed protocol is evaluated by caring the performance analysis using the NS-3 simulator. The performance shows 50% improvementin data delivering ratio in large network size, also shows an improvement in network stability and availability which is reflected in energy consumption measurements and increase in the system lifetime to 20%.
MPR selection to the OLSR quality of service in MANET using minmax algorithmIJECEIAES
Optimized link state routing (OLSR) is a routing protocol that has a small delay, low traffic control, support the application of denser networks, and adopts the concept of multipoint relays (MPR). The problem of OLSR is routing table updating which continually causes excessive packet delivery, and energy consumption becomes increased. This article proposes the improvement of OLSR performance using the min-max algorithm based on the quality of service (QoS) with considering the density of the node. The Min-max algorithm works in selecting MPR nodes based on the largest signal range. The QoS parameters analyzed with a different number of nodes are packet delivery ratio (PDR), throughput, delay, energy consumption, and topology control (TC). Simulation result of network simulator version 2 (NS-2) shows that OLSR performance using the min-max algorithm can increase PDR of 91.17%, packet loss of 60.77% and reduce topology control packet of 8.07%, energy consumption of 16.82% compared with standard OLSR.
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
Vehicular Ad Hoc Networks (VANETs) is a technology supporting two types of applications, safety and service applications with higher and lower priorities respectively. Thereby, Medium Access Control (MAC) protocol is designed to provide reliable and efficient data broadcasting based on prioritization. Different from the IEEE 1609.4 (legacy), HER-MAC protocol is a new multi-channel MAC proposed for VANETs, offering remarkable performance with regards to safety applications transmission. This paper focuses on the analysis of packet delivery ratio of the HER-MAC protocol under non-saturated conditions. 1-D and 2-D Markov chains have been developed for safety and non-safety applications respectively, to evaluate mathematically the performance of HER-MAC protocol. The presented work has taken into account the freezing of the backoff timer for both applications and the backoff stages along with short retry limit for non-safety applications in order to meet the IEEE 802.11p specifications. It highlights that taking these elements into consideration are important in modeling the system, to provide an accurate estimation of the channel access, and guarantees that no packet is served indefinitely. More precise results of the system packet delivery ratio have been yield. The probability of successful transmission and collisions were derived and used to compute the packet delivery ratio. The simulation results validate the analytical results of our models and indicate that the performance of our models outperformed the existing models in terms of the packet delivery ratio under different number of vehicles and contention window.
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
To increase the network capacity, there is
need to minimize the interference among nodes and
optimum control of topology in the foundation of
network. Recently, technological development helps to
build of mobile ad-hoc networks (MANETs) in order to
improve the quality of service (QoS) in terms of delay. In
contradictory to the objective of minimizing interference,
it is important to concern topology control in delay
constrained environment. The present research work
attempts to control the delay-constrained topology with
jointly considering delay and interference concept.
Additionally, the study proposed an interference oriented
topology control algorithm for delay-constrained
MANETs by taking account of both the interference
constraint and the delay constraint under the specific
condition of transmission delay, contention delay and the
queuing delay. Further, the study investigated the impact
of node mobility on the interference oriented topology
control algorithm. Finally, the results of the present
study shows that the proposed algorithm controls the
topology to convince the interference constraint, and
increases the transmit range to congregate the delay
requirement. Also, the study conclude that the algorithm
could effectively reduce the delay protocol and improve
the performance effectively in delay-constrained mobile
ad hoc networks.
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDMTELKOMNIKA JOURNAL
We propose a multi-class mechanism for Optical Code Division Multiplexing (OCDM), Wavelength
Division Multiplexing (WDM) Optical Packet Switch (OPS) architecture capable of supporting Quality of Service
(QoS) transmission. OCDM/WDM has been proposed as a competitive hybrid switching technology to
support the next generation optical Internet. This paper addresses performance issues in the slotted OPS
networks and proposed four differentiation schemes to support Quality of Service. In addition, we present a
comparison between the proposed schemes as well as, a simulation scheduler design which can be suitable
for the core switch node in OPS networks. Using software simulations the performance of our algorithm in
terms of losing probability, the packet delay, and scalability is evaluated.
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop technology increasing the coverage
of IEEE 802.11 Wireless Network and providing Internet access. In order to increase the mesh network
capacity, the WMN has evolved from single-radio single-channel architecture to Multi-Channel Multi-
Radios (MC-MR) architecture. In MC-MR the main challenge of the WMN is the channel assignment. In
this article, we propose a new channel assignment method based on channel diversity. This new method
named ODCAM (On Demand channel Assignment Method for channel diversity ) defines a channel
diversity mechanism used to select a new channel along the path between the source and the destination.
The best path between the source and the destination is provided by the HWMP (Hybrid Wireless Mesh
Protocol) protocol using MWCETT (Modified Weighted Cumulative Expected Transmission Time) an
extension of the WCETT metric. The simulation results show the ODCAM performance compared with an
hybrid approach.
In Wireless Sensor Network (WSN), QoS (Quality of Service) in sensor application plays a very important
role. QoS based routing is required to ensure the best use of nodes in WSN. In this paper, a comparative
study of QoS based routing in Media Access Control (MAC) protocols are presented based on the traits to
solve problems like prioritization, timeliness, reliability etc. The study mainly focuses on some priority
based QoS protocols used in WSN and a comparison among them. The study reveals that among the five
mentioned protocols; QMAC, PRIMA, DB-MAC, RAP, GTS; PRIMA shows the best performance in the
category of Packet Prioritization, Scheduling Scheme, Queue Type, Energy Awareness and QoS.
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
In this paper, we have presented the Modified Multicasting through Time Reservation using Adaptive
Control for Excellent Energy efficiency (MMC-TRACE). It is a real time multicasting architecture for
Mobile Ad-Hoc networks to make their work an energy efficient one .MMC-TRACE is a cross layer design
where the network layer and medium access control layer functionality are done in a single integrated
layer design. The basic design of the architecture is to establish and maintain an active multicast tree
surrounded by a passive mesh within a mobile ad hoc network. Energy efficiency is maximized by enabling
the particular node from sleep to awake mode while the remaining nodes of the same path are maintained
at sleep mode. Energy efficiency too achieved by eliminating most of the redundant data receptions across
nodes. The performance of MMC-TRACE are evaluated with the help of ns-2 simulations and comparisons
are made with its predecessor such as MC-TRACE. The results show that the MMC-TRACE provides
superior energy efficiency, competitive QoS performance and bandwidth efficiency.
Routing in All-Optical Networks Using Recursive State Space Techniquesipij
In this papr, we have minimized the effects of failures on network performace, by using suitable Routing
and Wavelenghth Assignment(RWA) method without disturbing other performance criteria such as blocking
probability(BP) and network management(NM). The computation complexity is reduced by using Kalaman
Filter(KF) techniques. The minimum reconfiguration probability routing (MRPR) algorithm must be
able to select most reliable routes and assign wavelengths to connections in a manner that utilizes the light
path(LP) established efficiently considering all possible requests.
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
The aim of equipping a wireless network with a mobile relay node is to support broadband wireless communications for vehicular users and their devices. The high mobility of vehicular users, possibly at a very high velocity in the area in which two cells overlap, could cause the network to suffer from a reduced handover success rate and, hence, increased radio link failure. The combined impact of these problems is service interruptions to vehicular users. Thus, the handover schemes are crucial in solving these problems. In this work, we first present the adaptive handover hysteresis scheme for the wireless network with mobile relay nodes in the high-speed train scenario. Specifically, our proposed adaptive hysteresis scheme is based on the velocity of the train. Second, the handover call dropping probability is reduced by introducing a modified call admission control scheme to support radio resource reservation for handover calls that prioritizes handover calls of mobile relay over the other calls. The proposed solution in which adaptive parameter is combined with call admission control is evaluated by system level simulation. Our simulation results illustrate an increased handover success rate and reduced radio link failures.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
Study on transmission over Nakagami-m fading channel for multiple access sche...TELKOMNIKA JOURNAL
In this paper, a downlink performance in non-orthogonal multiple access (NOMA) system is considered. With regard to different priority for two NOMA users, we exploit the closed-form expressions of outage probability over wireless fading channel following Nakagami-m fading. The fixed power allocation factor scheme is examined to reduce the complexity in computation regarding performance analysis. In our analysis, perfect successive interference cancellation (SIC) is applied in order to achieve perfect signal decoding operation. Simulation results show that the considered NOMA downlink scheme is affected by transmit SNR, power allocation factors, fading parameters.
LARGE-SCALE MULTI-USER MIMO APPROACH FOR WIRELESS BACKHAUL BASED HETNETScsandit
In this paper, we consider the optimization of wireless capacity-limited backhaul links in future heterogeneous networks (HetNets). We assume that the HetNet is formed with one macro-cell base station (MBS), which is associated with multiple small-cell base stations (SBSs). It is also assumed both the MBS and the SBSs are equipped with massive arrays, while all mobiles users (macro-cell and small-cell users) have single antenna. For the backhaul links, we propose to use a capacity-aware beamforming scheme at the SBSs and MRC at the MBS. Using particle swarm optimization (PSO), each SBS seeks the optimal transmit weight vectors that maximize the backhaul uplink capacity and the access uplinks signal-to-interference plus noise ratio (SINR). The performance evaluation in terms of the symbol error rate (SER) and the ergodic system capacity shows that the proposed capacity-aware backhaul link scheme achieves similar or better performance than traditional wireless backhaul links and requires considerably less computational complexity.
MECC scheduling algorithm in vehicular environment for uplink transmission in...IJECEIAES
Single Carrier Frequency Division Multiple Access (SC-FDMA) is chosen because of the lower peak-to-average power ratio (PAPR) value in uplink transmission. However, the contiguity constraint is one of the major constraint presents in uplink packet scheduling, where all RBs allocated to a single UE must be contiguous in the frequency-domain within each time slot to maintain its single carrier. This paper proposed an uplink-scheduling algorithm namely the Maximum Expansion with Contiguity Constraints (MECC) algorithm, which supports both the RT and NRT services. The MECC algorithm is deployed in two stages. In the first stage, the RBs are allocated fairly among the UEs. The second stage allocates the RBs with the highest metric value and expands the allocation on both sides of the matrix, M with respect to the contiguity constraint. The performance of the MECC algorithm was observed in terms of throughput, fairness, delay, and Packet Loss Ratio (PLR) for VoIP, video and best effort flows. The MECC scheduling algorithm is compared to other algorithms namely the Round Robin (RR), Channel-Dependent First Maximum Expansion (CD-FME), and Proportional Fairness First Maximum Expansion (PF-FME). From here, it can be concluded that the MECC algorithm shows the best results among other algorithms by delivering the highest throughput which is up to 81.29% and 90.04% than CD-FME and RR scheduler for RT and NRT traffic respectively, having low PLR and delay which is up to 93.92% and 56.22% of improvement than CD-FME for the RT traffic flow. The MECC also has a satisfactory level of fairness for the cell-edge users in a vehicular environment of LTE network.
Performance of the MIMO-MC-CDMA System with MMSE EqualizationTamilarasan N
Multipath fading and spectral crowding are the
major challenges in dealing higher data rate in future
broadband wireless communication system. Multi-carrier
Modulation like Multicarrier code division multiple access
(MC-CDMA) can tackle the problem and provide higher data
rate for future wireless communication system. However,
through a frequency selective fading channel, the subcarriers
in MC-CDMA signal have different amplitude levels and phase
shifts which result in loss of the orthogonality among users
and generates Multiple access interference (MAI). To combat
the MAI, various amplitude and phase equalizing techniques
such as Maximum Ratio Combining (MRC), Equal Gain
Combining (EGC), Orthogonal Restoring Combining (ORC),
Threshold Orthogonal Restoring Combining or Minimum
Mean Square Error (MMSE) may be used. Out of these MMSE
offers better performance since the MMSE criterion is applied
independently on each subcarrier. Further improvement in
performance is possible through space–time block coding,
which offers maximum diversity gain and multiplexing gain.
This paper combines MC-CDMA with MMSE equalization
and space–time block coding which proves to be a powerful
physical layer solution in combating delay spread and inter
symbol interference (ISI).
21 9149 simulation analysis for consistent path identification edit septianIAESIJEECS
As the demand for Mobile Ad hoc Network (MANET) applications grows, so does their use of many essential services where node consistent and stability of the communication paths are of great importance. In this scheme, we propose Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime (CPIR). This technique offers more stable path and transmits the data through the consistent nodes. This article is focused on protecting the route from the inconsistent node in mobile communications to improve the network performance and reduce the energy consumption in the network. The simulation results demonstrate that CPIR provided reduce the energy utilization and improved both the longer lifetimes and increased number of packets delivered.
A new clustering technique based on replication for MANET routing protocolsTELKOMNIKA JOURNAL
The cluster head nodes in most mobile ad hoc networks (MANET) clustering protocols take on an extraordinary role in managing routing information. The reliability, efficiency and scalability of the clustering in MANET will ultimately be dramatically impacted. In this work we establish a new approach to form the clusters in MANET called the square cluster-based routing protocol (SCBRP). That protocol is based on the theory of replication. The goal of the protocol is to achieve reliability, availability and scalability with in the MANET. The proposed protocol is evaluated by caring the performance analysis using the NS-3 simulator. The performance shows 50% improvementin data delivering ratio in large network size, also shows an improvement in network stability and availability which is reflected in energy consumption measurements and increase in the system lifetime to 20%.
MPR selection to the OLSR quality of service in MANET using minmax algorithmIJECEIAES
Optimized link state routing (OLSR) is a routing protocol that has a small delay, low traffic control, support the application of denser networks, and adopts the concept of multipoint relays (MPR). The problem of OLSR is routing table updating which continually causes excessive packet delivery, and energy consumption becomes increased. This article proposes the improvement of OLSR performance using the min-max algorithm based on the quality of service (QoS) with considering the density of the node. The Min-max algorithm works in selecting MPR nodes based on the largest signal range. The QoS parameters analyzed with a different number of nodes are packet delivery ratio (PDR), throughput, delay, energy consumption, and topology control (TC). Simulation result of network simulator version 2 (NS-2) shows that OLSR performance using the min-max algorithm can increase PDR of 91.17%, packet loss of 60.77% and reduce topology control packet of 8.07%, energy consumption of 16.82% compared with standard OLSR.
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
Vehicular Ad Hoc Networks (VANETs) is a technology supporting two types of applications, safety and service applications with higher and lower priorities respectively. Thereby, Medium Access Control (MAC) protocol is designed to provide reliable and efficient data broadcasting based on prioritization. Different from the IEEE 1609.4 (legacy), HER-MAC protocol is a new multi-channel MAC proposed for VANETs, offering remarkable performance with regards to safety applications transmission. This paper focuses on the analysis of packet delivery ratio of the HER-MAC protocol under non-saturated conditions. 1-D and 2-D Markov chains have been developed for safety and non-safety applications respectively, to evaluate mathematically the performance of HER-MAC protocol. The presented work has taken into account the freezing of the backoff timer for both applications and the backoff stages along with short retry limit for non-safety applications in order to meet the IEEE 802.11p specifications. It highlights that taking these elements into consideration are important in modeling the system, to provide an accurate estimation of the channel access, and guarantees that no packet is served indefinitely. More precise results of the system packet delivery ratio have been yield. The probability of successful transmission and collisions were derived and used to compute the packet delivery ratio. The simulation results validate the analytical results of our models and indicate that the performance of our models outperformed the existing models in terms of the packet delivery ratio under different number of vehicles and contention window.
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
MACHINE LEARNING BASED FRAME SIZE OPTIMIZATION IN WLAN DOWNLINK MU-MIMO CHANN...IJCNCJournal
The key enhancement in the medium access control (MAC) layer is frame aggregation introduced by the
IEEE 802.11n/ac standard to accommodate the growing traffic demand in the WLAN by allowing multiple
packets aggregated per transmission. Frame aggregation efficiently reduces control overhead in the MAC
layer, such as the MAC header and thus it helps to enhance transmission efficiency and throughput
performance of WLAN. However, heterogeneous traffic demand among streams in the WLAN downlink
MU-MIMO channel creates a challenge to efficiently utilize the benefits of frame aggregation.
Transmission efficiency is also compromised during frame size setting determination because when a
frame size is larger, the impact of the overhead frame can be lower, but they are also more vulnerable to
transmission errors. Thus, this trade-off between maximizing frame size and minimizing overhead frames
should be addressed by employing an adaptive frame aggregation technique to derive the optimal frame
size that would maximize the throughput in WLAN downlink MU-MIMO channel. Moreover, when frame
aggregation approach is employed, more frames must wait before transmission in a buffer which causes a
delay in the performance of WLAN. Thus, analysing the trade-off between maximizing throughput and
minimizing delay is a critical issue that should also be addressed to enhance the performance of WLAN.
However, the majority of the existing adaptive aggregation algorithms in the WLAN downlink MU-MIMO
channel are focused to maximize the throughput or minimize the delay. The main contribution of this paper
is to propose a machine learning-based frame size optimization algorithm by extending our earlier
approach in considering the cost of delay to maximize the system throughput of WLAN. The effectiveness of
the proposed scheme is evaluated over the FIFO Baseline Approach and earlier conventional approaches
under the effects of various traffic patterns, channel conditions, and the number of STAs.
Machine Learning based Frame Size Optimization in WLAN Downlink MU-MIMO Chann...IJCNCJournal
The key enhancement in the medium access control (MAC) layer is frame aggregation introduced by the IEEE 802.11n/ac standard to accommodate the growing traffic demand in the WLAN by allowing multiple packets aggregated per transmission. Frame aggregation efficiently reduces control overhead in the MAC layer, such as the MAC header and thus it helps to enhance transmission efficiency and throughput performance of WLAN. However, heterogeneous traffic demand among streams in the WLAN downlink MU-MIMO channel creates a challenge to efficiently utilize the benefits of frame aggregation. Transmission efficiency is also compromised during frame size setting determination because when a frame size is larger, the impact of the overhead frame can be lower, but they are also more vulnerable to transmission errors. Thus, this trade-off between maximizing frame size and minimizing overhead frames should be addressed by employing an adaptive frame aggregation technique to derive the optimal frame size that would maximize the throughput in WLAN downlink MU-MIMO channel. Moreover, when frame aggregation approach is employed, more frames must wait before transmission in a buffer which causes a delay in the performance of WLAN. Thus, analysing the trade-off between maximizing throughput and minimizing delay is a critical issue that should also be addressed to enhance the performance of WLAN. However, the majority of the existing adaptive aggregation algorithms in the WLAN downlink MU-MIMO channel are focused to maximize the throughput or minimize the delay. The main contribution of this paper is to propose a machine learning-based frame size optimization algorithm by extending our earlier approach in considering the cost of delay to maximize the system throughput of WLAN. The effectiveness of the proposed scheme is evaluated over the FIFO Baseline Approach and earlier conventional approaches under the effects of various traffic patterns, channel conditions, and the number of STAs.
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
MFMP Vs ECMP Under RED Queue ManagementCSCJournals
In this paper we compare the performance of a Maximum Flow Multi Path routing (MFMP) and Equal Cost Multi Path routing (ECMP) under a congestion avoidance scheme: Random Early Detection (RED). We show through simulation that MFMP performs well than ECMP in terms of mean end to end delay, packet loss percentage and packet delivery percentage.
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...pijans
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc
Networks to conserve more energy in the system. This technique when combined with other power saving
systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing
result. In designing Medium Access Control (MAC), developing a framework and giving a detailed
implementation procedure are among the factors that hinder the process; specifically in MANETs not to
mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure
and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control
(UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of
transmission, channelization, and receiver pattern of the Physical layer is specified in this research work.
The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable
Directional antenna in MANETs.
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWB-...pijans
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc
Networks to conserve more energy in the system. This technique when combined with other power saving
systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing
result. In designing Medium Access Control (MAC), developing a framework and giving a detailed
implementation procedure are among the factors that hinder the process; specifically in MANETs not to
mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure
and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control
(UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of
transmission, channelization, and receiver pattern of the Physical layer is specified in this research work.
The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable
Directional antenna in MANETs.
Framework, Implementation and Algorithm for Asynchronous Power Saving of UWBM...pijans
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc Networks to conserve more energy in the system. This technique when combined with other power saving systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing result. In designing Medium Access Control (MAC), developing a framework and giving a detailed implementation procedure are among the factors that hinder the process; specifically in MANETs not to mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control (UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of transmission, channelization, and receiver pattern of the Physical layer is specified in this research work. The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable
Directional antenna in MANETs
Generalized optimal placement of PMUs considering power system observability,...IJECEIAES
This paper presents a generalized optimal placement of Phasor Measurement Units (PMUs) considering power system observability, reliability, Communication Infrastructure (CI), and latency time associated with this CI. Moreover, the economic study for additional new data transmission paths is considered as well as the availability of predefined locations of some PMUs and the preexisting communication devices (CDs) in some buses. Two cases for the location of the Control Center Base Station (CCBS) are considered; predefined case and free selected case. The PMUs placement and their required communication network topology and channel capacity are co-optimized simultaneously. In this study, two different approaches are applied to optimize the objective function; the first approach is combined from Binary Particle Swarm Optimization-Gravitational Search Algorithm (BPSOGSA) and the Minimum Spanning Tree (MST) algorithm, while the second approach is based only on BPSOGSA. The feasibility of the proposed approaches are examined by applying it to IEEE 14-bus and IEEE 118-bus systems.
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...IJECEIAES
Nowadays, with the advent of smartphones, most of people started to make voice and video conference calls continuously even in a high mobility scenario, the bandwidth requirements have increased considerably, which can cause network congestion phenomena. To avoid network congestion problems and to support high mobility scenario, 3GPP has developed a new cellular standard based packet switching, termed LTE (Long Term Evolution). The purpose of this paper is to evaluate the performance of the new proposed algorithm, named Exponential Modified Largest Weighted Delay First „EXP-MLWDF‟, for high mobility scenario and with the presence of a large number of active users, in comparison with the wellknown algorithms such as a proportional fair algorithm (PF), Exponential Proportional Fairness (EXP/PF), Logarithm Rule (LOG-Rule), Exponential Rule (EXP-Rule) and Modified Largest Weighted Delay First (MLWDF). The performance evaluation is conducted in terms of system throughput, delay and PLR. Finally, it will be concluded that the proposed scheduler satisfies the quality of service (QoS) requirements of the real-time traffic in terms of packet loss ratio (PLR), average throughput and packet delay. Because of the traffic evolution, some key issues related to scheduling strategies that will be considered in the future requirements are discussed in this article.
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
The Optimal Link State Routing (OLSR) protocol employs multipoint relay (MPR) nodes to disseminate topology control (TC) messages, enabling network topology discovery and maintenance. However, this approach increases control overhead and leads to wasted network bandwidth in stable topology scenarios due to fixed flooding periods. To address these challenges, this paper presents an Efficient Topology Maintenance Algorithm (ETM-OLSR) for Enhanced Link-State Routing Protocols. By reducing the number of MPR nodes, TC message generation and forwarding frequency are minimized. Furthermore, the algorithm selects a smaller subset of TC messages based on the changes in the MPR selection set from the previous cycle, adapting to stable and fluctuating network conditions. Additionally, the sending cycle of TC messages is dynamically adjusted in response to network topology changes. Simulation results demonstrate that the ETM-OLSR algorithm effectively reduces network control overhead, minimizes end-to-end delay, and improves network throughput compared to traditional OLSR and HTR-OLSR algorithms.
Similar to MM-PNEMO: a mathematical model to assess handoff delay and packet loss (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
Deep neural networks have accomplished enormous progress in tackling many problems. More specifically, convolutional neural network (CNN) is a category of deep networks that have been a dominant technique in computer vision tasks. Despite that these deep neural networks are highly effective; the ideal structure is still an issue that needs a lot of investigation. Deep Convolutional Neural Network model is usually designed manually by trials and repeated tests which enormously constrain its application. Many hyper-parameters of the CNN can affect the model performance. These parameters are depth of the network, numbers of convolutional layers, and numbers of kernels with their sizes. Therefore, it may be a huge challenge to design an appropriate CNN model that uses optimized hyper-parameters and reduces the reliance on manual involvement and domain expertise. In this paper, a design architecture method for CNNs is proposed by utilization of particle swarm optimization (PSO) algorithm to learn the optimal CNN hyper-parameters values. In the experiment, we used Modified National Institute of Standards and Technology (MNIST) database of handwritten digit recognition. The experiments showed that our proposed approach can find an architecture that is competitive to the state-of-the-art models with a testing error of 0.87%.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
One way to prevent and reduce the spread of the covid-19 pandemic is through physical distancing program. This research aims to develop a prototype contactless transaction system using digital payment mechanisms and QR code technology that will be applied in traditional markets. The method used in the development of electronic market systems is a prototype approach. The application of QR code and digital payments are used as a solution to minimize money exchange contacts that are common in traditional markets. The results showed that the system built was able to accelerate and facilitate the buying and selling transaction process in traditional market environment. Alpha testing shows that all functional systems are running well. Meanwhile, beta testing shows that the user can very well accept the system that was built. The results of the study also show acceptance of the usefulness of the system being built, as well as the optimism of its users to be able to take advantage of this system both technologically and functionally, so its can be a part of the digital transformation of the traditional market to the electronic market and has become one of the solutions in reducing the spread of the current covid-19 pandemic.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
A double-layer loaded on the octagon microstrip yagi antenna (OMYA) at 5.8 GHz industrial, scientific and medical (ISM) Band is investigated in this paper. The double-layer consist of two double positive (DPS) substrates. The OMYA is overlaid with a double-layer configuration were simulated, fabricated and measured. A good agreement was observed between the computed and measured results of the gain for this antenna. According to comparison results, it shows that 2.5 dB improvement of the OMYA gain can be obtained by applying the double-layer on the top of the OMYA. Meanwhile, the bandwidth of the measured OMYA with the double-layer is 14.6%. It indicates that the double-layer can be used to increase the OMYA performance in term of gain and bandwidth.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
Given the massive potentials of 5G communication networks and their foreseeable evolution, what should there be in 6G that is not in 5G or its long-term evolution? 6G communication networks are estimated to integrate the terrestrial, aerial, and maritime communications into a forceful network which would be faster, more reliable, and can support a massive number of devices with ultra-low latency requirements. This article presents a complete overview of potential 6G communication networks. The major contribution of this study is to present a broad overview of key performance indicators (KPIs) of 6G networks that cover the latest manufacturing progress in the environment of the principal areas of research application, and challenges.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
2. ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 2, June 2019 : 611 – 621
612
nemely Random Waypoint Mobility (RWM) model, City Section Mobility (CSM) model, Manhattan
Mobility (MM) model as well as Fluid-flow Mobility (FM) model [11-13].
The basis of this work is to know the functioning mechanism of the mobility management schemes
and to determine which protocol provide better handoff performance. The contribution of this paper includes:
(i) constructing a numerical model to compare the applicability and efficiency of the MM-PNEMO scheme
with that of the standard NEMO-BSP and PNEMO respectively. (ii) Investigate and analyze the handoff
performance in terms of handoff delay gain and packet loss ratio.
2. MM-PNEMO
Explaination of the MM-PNEMO scheme as shown in Figure 1 offers the location update procedure
in order to separate the new attachment of the serving MR (SMR) which is termed as ‘fast registration’
process from the particular flow movement which is entitled as ‘flow-based routing’ process [6]. As soon as
the New Flow-enabled MR (NFMR) identifies the new attachment of SMR on the target network, the NFMR
sends Early Proxy Binding Update (EPBU) message via Handover Initiations (HI) message to the FLMA for
initiating the fast registration process without enable flow-based routing information. During fast registration
mechanism, the Flow-based Local Mobility Anchor Point (FLMA) accomplishes few tasks for the new
attachment such as allocating a new Home Network Prefix (HNP) and Mobile Network Prefix (MNP) of the
Physical Interface 2 (PI 2), building new Binding Catch Entry (BCE) for the SMR as well as creating a new
tunnel among the FNMR and the FLMA. If the NFMR identifies that the SMR is connected to the new PI
(i.e. PI 2), it transmits PBU message containing FMNP option to FLMA in order to initiate flow-based
routing process. Once the process is completed successfully, a PBA message is directed from the FLMA to
the NFMR. However, if the network entity (i.e. CFMR, NFMR or FLMA) is not informed about the HI
message with encapsulated EPBU option, the SMR will initiates PNEMO handoff process.
Figure 1. Basic architecture of MM-PNEMO architecture [6-7]
3. NUMERICAL ANALYSIS
In this section, a numerical model is developed to evaluate the performance of the MM-PNEMO
scheme [6-7]. The MM-PNEMO scheme is then benchmarked with that of the NEMO-BSP and P-NEMO
scheme [9-10], [14]. P-NEMO is compared with MM-PNEMO scheme since both schemes integrates
firmly-entrenched PMIPv6 which is a network-based localized mobility protocol in NEMO to address
mobility issues [15-17]. In contrast, NEMO-BSP is the standard protocol for any mobility support
management aiming at NEMO network and it is also an improved version of the Mobile IPv6. The
considered performance metrics to evaluate the performance of MM-PNEMO scheme are average handoff
3. Bulletin of Electr Eng and Inf ISSN: 2302-9285
MM-PNEMO: a mathematical model to assess handoff delay and packet loss (Shayla Islam)
613
delay and its impact on packet loss. These metrics are notable since they are directly linked to the goals for
the proposed model.
3.1. Assumptions and notations
To simply the comparison with NEMO-BSP and P-NEMO, it is assumed that the HA in
NEMO-BSP is positioned in the similar place as Flow-enabled LMA (FLMA) in MM-PNEMO scheme and
LMA in P-NEMO. Likewise, it is assumed that Access Routers (ARs) in NEMO-BSP are located at the
identical place as MAGs in P-NEMO and FMRs in MM-PNEMO scheme. As the wired link is robust, it is
assumed that the failure of message transmission is not anticipated over the wired link while the failure of
message transmission is anticipated over the radio access link. Furthermore, it is also assumed that the SMR
is connecting with one Corresponding Node (CN). Moreover, Binding Update Refreshment (BUR) cost is not
considered in this analysis.
3.2. Numerical model
The City Section Mobility (CSM) model which offers a practical movement pattern for SMRs in a
town or city as depicts in Figure 2 [11]. In real world situations, cars have to follow traffic guidelines as they
do not have the capability to roam without any obstacles, buildings and so on. Hence, it is essential for all
SMRs to monitor predefined routes as well as behaviour procedures in this movement model. The stochastic
principles of CSM model have been familiarized [18]. Therefore, the MM-PNEMO, NEMO-BSP and
P-NEMO scheme adopts those principles to estimate the mobility rate as well as cell residence time.
Figure 2. Structure of a road in CSM model [7, 11]
According to CSM model, the speed limit is set for each street and the area is symbolised via a grid
of lanes starting an individual sector of an urban. Each SMR begins at a defined crossing on two lanes. After
that, it randomly selects an end point. Once reaching at the destination, the SMR pauses for a random time.
After that, it randomly selects a new destination. Thus, the same process is repetitive and each movement is
named as an epoch. The main aim of this section is to analyse the cell residence time and the mobility rate of
SMR in a cell. Therefore, cell residence time of the SMR (TSMR) can be calculated:
( ) ( )
( )
E t E p
T
SMR E c
(1)
where, the estimated number of SMR’s epoch time and pause time is represented as E(t) and E(p)
respectively. Estimated number of SMR’s cell crossings in an epoch can be symbolized as E (c). It is
anticipated that the moving speed of the SMR is v. Then, E(t) can be expressed as:
1 1 1
( )
3 3
X N Y N
v
VR HR
h
E t
N N v
VR HR
(2)
4. ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 2, June 2019 : 611 – 621
614
In (2), the number of horizontal and vertical road can be represented as NHR and NVR respectively
whereas horizontal and vertical length of dissection area is indicated as X h and Yv respectively. Thus, N HR
and NVR can be expressed as:
1
Xh
NHR Shd
(3)
1
Yv
NVR Svd
(4)
In (3) and (4), distance of horizontal and vertical road is symbolized as Shd and Svd correspondingly.
Since the random pause time exists in between 0 to Umax to evade collisions at each road intersection, hence
E (p) can be expressed as:
max
1
( )
2
E p U
(5)
It is considered that, each Access Point (AP) coverage area is circular with radius r and r > Shd and
r > Svd. It is also assumed that, 2 x r=K1 x Shd=K2 x Svd. For all the movement towards horizontal and vertical
direction (i.e. K1 x Shd to 2K1 x Shd), there should be at most two APs crossings .Therefore, E (c) can be
represented as:
E (c)=
2
2
2
2
1
1
6 6 4 1 1 3
2
1
6 6 4 2 2 3
VR
HR
VR
HR
m m K
N N m K K
n n K
N N n K K
(6)
It is noted that, the expected number of APs crossings reduces with the higher numbers of K1, K2
(i.e., 2r/Shd and 2r/Svd). Greater numbers of K1, K2 indicate larger coverage zone for APs, following in
smaller number of AP crossings. On the contrary, expected number of APs crossings rises with the larger
values of NHR and NVR. Larger values of NHR and NVR indicate smaller coverage zone for APs, following in
greater number of AP crossings.
For simplicity, it is also assumed that an access gateway area is equal to an AP area. Hence, the
SMR handoff rate (µh) can be estimated as follows:
1
h
SMR
T
(7)
The numerical model for performance investigation of the MM-PNEMO scheme is illustrated in
Figure 3, presenting communication paths among related nodes and routers.
5. Bulletin of Electr Eng and Inf ISSN: 2302-9285
MM-PNEMO: a mathematical model to assess handoff delay and packet loss (Shayla Islam)
615
Figure 3. Numerical framework [7]
4. RESULTS AND ANALYSIS
The parameters are detailed in Table 1 [7-10], [19-23]. This section, the results of study is clarified
and at the same time, a comprehensive discussion is also given.
Table 1. Parameters used for numerical analysis
Parameter Value
NSMR 1-20
TLS [50-300] ms
Bwl 54 Mb/s
Bwd 1000 Mb/s
twl 2 ms
twd .5 ms
HSMR-FMR=HMR-AR=HMR-MAG 1
HFLMA-FMR=HHA-AR=HLMA-MAG 5
HCN-FLMA=HCN-HA=HCN-LMA 5
HCFMR-NFMR=HAR-AR=HMAG1-MAG2 1
LRS=LRA 52 Bytes
LBA=LPBA 52 Bytes
LBU=LPBU 72 Bytes
LHI=LHAck 52 Bytes
LRA 92 Bytes
E(TSMR) [10-100] second
4.1. Impact of tunnelling weight factor on handoff delay (HD)
The Handoff Delays (HD) of MM-PNEMO scheme, NEMO-BSP and P-NEMO are investigated in
Figure 4 as a function of tunneling weight factor (τ). It shows that, the delays for all schemes are increasing
with changing the τ. τ indicate the amount of traffic density over the link among the FMRs in the proposed
scheme. When road traffic is high, the number of SMRs moving between the same FMRs increase.
Therefore, τ can imply road traffic characteristics. Since, the delay over wireless link rises, the handoff delay
rises in MM-PNEMO scheme (182.8 millisecond) and P-NEMO (543.1 millisecond). However, these delays
are not critical as in NEMO-BSP (1034 millisecond). From the observation in Figure 4, it is confirmed that
the MM-PNEMO scheme and P-NEMO show frequent handoff compared to NEMO-BSP. This is because,
the LU over the wireless link is avoided and no tunnelled packets are conveyed over the wireless link.
Moreover, the DAD mechanism in NEMO-BSP counts for a huge portion of handoff delay. Hence, it is
essential to reduce this DAD delay to improve handoff performance. Subsequently, MM-PNEMO also
outperforms P-NEMO by taking the advantage of previous knowledge about the network conditions and its
flows during flow-enabled fast registration phase.
6. ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 2, June 2019 : 611 – 621
616
Figure 4. Handoff delay vs tunnelling weight factor [7]
4.2. Impact of tunneling weight factor on HD gain
The influence of tunneling weight factor (τ) on handoff delay gain is illustrated in Figure 5. It is
noticed that, the overall gain of P-NEMO decreases as τ increases, whereas that of MM-PNEMO remains
almost the same, regardless of the increasing τ. This is due to the tunnelling burden of P-NEMO that effects
in disruption of session continuity. Accordingly, P-NEMO and MM-PNEMO outperform NEMO-BSP.
Therefore, it can be summed up from Figure 5 that, the MM-PNEMO scheme can vastly improve the handoff
performance compared to NEMO-BSP and P-NEMO regardless of increasing τ. This is because, SMR is
capable to split the application flow burden among multiple access technology during inter
technology handoff.
Figure 5. Handoff delay gain vs tunneling weight factor
4.3. Impact of number of SMR on packet loss (PL)
In Figure 6, the amount of packet loss during inters technology handoff for each scheme is depicted
for varying the number of SMRs and different cell residence time (TSMR). It is observed from Figure 5 that,
the total packet loss of each scheme increases for changing the number of SMRs with setting lower residence
times (i.e. TSMR=20 sec). If the TSMR is varying from 20 to 100 sec, the SMR is most likely to stay in a
cell and rarely moves to another position. Thus, the packet loss during handoff is very small as depicts in
Figure 5. Basically, packet loss is proportional to the handoff disruption time. Therefore, the cases of the
handoff mode for MM-PNEMO shows lower packet loss compared to P-NEMO and NEMO-BSP.
1 1.02 1.04 1.06 1.08 1.1 1.12 1.14 1.16 1.18 1.2
100
200
300
400
500
600
700
800
900
1000
1100
Tunneling Weight Factor ()
Handoff
Delay
(HD)
MM-PNEMO
NEMO-BSP
P-NEMO
1 1.02 1.04 1.06 1.08 1.1 1.12 1.14 1.16 1.18 1.2
1.5
2
2.5
3
3.5
4
4.5
5
5.5
6
Tunneling Weight Factor ()
Comparative
Handoff
Delay
Gain
NEMO-BSP/MM-PNEMO
P-NEMO/MM-PNEMO
NEMO-BSP/P-NEMO
7. Bulletin of Electr Eng and Inf ISSN: 2302-9285
MM-PNEMO: a mathematical model to assess handoff delay and packet loss (Shayla Islam)
617
Figure 6. Packet loss vs number of SMR (TSMR=80sec) [7]
4.4. Impact of mobility rate and average session length on packet loss (PL)
In Figures 7 and 8, the amount of packet loss for each scheme is depicted for varying mobility rate
(µh) and different session length (λs). Typically, total packet loss decreases with lower µh of SMR. When µh
increases, the SMR moves frequently and changes subnet recurrently because of its high mobility. Thus,
includes a number of SMR handoffs which leads to increase packet loss as shown in Figure 7.
Figure 7. Packet loss vs SMR mobility rate [7]
Correspondingly, the packet loss is proportional to λs. In Figure 8, it is apparent that packet loss
increases proportionally with the λs for all schemes. Network-based localized schemes (i.e., MM-PNEMO
and P-NEMO) outperform NEMO-BSP. This is because due to the elimination of mobility signalling over the
wireless link (when λs increases). Besides, the proposed MM-PNEMO consumes less packet loss compared
to NEMO-BSP and P-NEMO due to the support of inter technology handoff in P-NEMO. This means that
MM-PNEMO is better suited for real time applications where periodic packets are sent at higher rates.
2 4 6 8 10 12 14 16 18 20
0
20
40
60
80
100
120
No.of SMR
Packet
Loss
MM-PNEMO
NEMO-BSP
P-NEMO
0 0.02 0.04 0.06 0.08 0.1
0
20
40
60
80
100
120
SMR Mobility Rate
Packet
Loss
MM-PNEMO with NSMR
=10
NEMO-BSP with NSMR
=10
P-NEMO with NSMR
=10
MM-PNEMO with NSMR
=20
NEMO-BSP with NSMR
=20
P-NEMO with NSMR
=20
8. ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 2, June 2019 : 611 – 621
618
Figure 8. Packet loss vs average session length (packets/flow) [7]
4.5. Impact of radius, no. of SMR and speed on packet loss ratio
Figure 9 to 11 illustrate packet loss ratio as a function of cell radius, number of SMR and velocity
respectively. In Figure 10 and 11, the the number of SMR and cell radius is varied; whereas the speed and the
residence time are kept constant (i.e. speed=60 meter/second and TSMR=20 second). It is apparent from both
figures that, the packet loss ratio fluctuates among 1% to 12%. Correspondingly, the moving speed is set
from 1 to 80 meter/second (like that of usual moving bus or car) as depicts in Figure 11. It is apparent from
Figures 9 to 11 that, the packet loss ratio increases with changing the velocity of the SMR. This is because,
higher velocity results in smaller residence time which leads to increase number of handoffs. As a result,
MM-PNEMO and P-NEMO scheme shows lower packet loss ratio compared to NEMO-BSP. In contrast,
MM-PNEMO shows lower packet loss ratio (1%) compared to NEMO-BSP (11%) and P-NEMO (6%) as
shown in Figure 9.
Figure 9. Packet loss ratio vs number of SMR (TSMR=20 sec)
1 2 3 4 5 6 7 8 9 10
0
20
40
60
80
100
120
Average Session Length (
s
)
Packet
Loss
MM-PNEMO with NSMR
=10
NEMO-BSP with NSMR
=10
P-NEMO with NSMR
=10
MM-PNEMO with NSMR
=20
NEMO-BSP with NSMR
=20
P-NEMO with NSMR
=20
2 4 6 8 10 12 14 16 18 20
0
2
4
6
8
10
12
No. of SMR
Packet
Loss
Ratio
(%)
MM-PNEMO
NEMO-BSP
P-NEMO
9. Bulletin of Electr Eng and Inf ISSN: 2302-9285
MM-PNEMO: a mathematical model to assess handoff delay and packet loss (Shayla Islam)
619
Figure 10. Packet loss ratio vs cell radius (TSMR=20 sec)
Figure 11. Packet loss ratio vs speed (TSMR=60 sec)
5. CONCLUSION
NEMO-BSP is the basic standard protocol that is enahanced from the MIPV6. However, the study
suggests that the NEMO-BSP take over the llimitations of MIPV6 especially for ineffective routing path,
single point of failure, higher handoff delays as well as high packet loss. Hence, to cope handoff issues, this
paper evaluates handoff performance by using a mathematical model of Multihoming-based scheme to support
Mobility management in Proxy NEMO (MM-PNEMO) environment. As of the study, the MM-PNEMO is
paralleled with the standard NEMO-BSP and P-NEMO for benchmarking. The mathematical results
demostrated that, the MM-PNEMO significantly maximizes the packet delivery ratio upto 99% in compare
with NEMO BSP and P-NEMO respectively.
ACKNOWLEDGEMENTS
A special thanks to the Research Management Centre (RMC), International Islamic University
Malaysia (IIUM) for the grant.
REFERENCES
[1] Hasan, M. K., Saeed, R. A., Hashim, A. H. A., Islam, S., Alsaqour, R. A., & Alahdal, T. A.," Femtocell network
time synchronization protocols and schemes". Research Journal of Applied Sciences, Engineering and Technology,
vol. 4, no. 23, pp. 5136-5143, 2012.
50 100 150 200 250 300
0
0.5
1
1.5
2
2.5
3
3.5
Radious of a Cell (meter)
Packet
Loss
Ratio
(%)
MM-PNEMO
NEMO-BSP
P-NEMO
10 20 30 40 50 60 70 80
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
Moving Speed of SMR (m/sec.)
Packet
Loss
Ratio
(%)
MM-PNEMO
NEMO-BSP
P-NEMO
10. ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 2, June 2019 : 611 – 621
620
[2] M. K. Hasan et al., "Inter-cell interference coordination in LTE-A HetNets: A survey on self organizing
approaches," 2013 International Conference on Computing, Electrical And Electronic Engineering (ICCEEE),
Khartoum, 2013, pp. 196-201.
[3] Hashim, A. H. A., Hassan, W. H., Islam, S., Saeed, R. A., Hasan, M. K., Daoud, J. I., & Khalifa, O. O., "An
enhanced macro mobility management scheme in NEMO environment to achieve seamless handoff," World
Applied Sciences Journal, vol. 21, pp. 35-39, 2013.
[4] Devarapalli, V., Wakikawa, R., Petrescu, A., & Thubert, P., "Network mobility (NEMO) basic support protocol",
IETF RFC 3963, 2005.
[5] Lee, C.-W., M.C. Chen, and Y.S. Sun, "A novel network mobility management scheme supporting seamless
handover for high-speed trains," Computer Communications, vol. 37, pp. 53-63, 2014.
[6] Islam, S., Abdalla, A. H., & Hasan, M. K., "Novel multihoming-based flow mobility scheme for proxy NEMO
environment: A numerical approach to analyse handoff performance". SCIENCEASIA, vol. 43, pp.27-34, 2017.
[7] Islam, S., Hashi, A. H. A., Razzaque, A., & Hasan, M. K., "A Numerical Model to Analyze Handoff Delay and
Packet Loss in PNEMO Environment". In 2018 7th International Conference on Computer and Communication
Engineering (ICCCE), 2018, pp. pp. 130-134.
[8] Islam, S., Hashim, A. H. A., Habaebi, M. H., & Hasan, M. K., "Design and implementation of a multihoming-based
scheme to support mobility management in NEMO". Wireless Personal Communications, vol. 95, no. 2,
pp. 457-473, 2017.
[9] J. Lee and T. Ernst, "Lightweight NEtwork MObility Within PMIPv6 for Transportation Systems," in IEEE
Systems Journal, vol. 5, no. 3, pp. 352-361, Sept. 2011.
[10] J. Lee, T. Ernst and N. Chilamkurti, "Performance Analysis of PMIPv6-Based NEtwork MObility for Intelligent
Transportation Systems," in IEEE Transactions on Vehicular Technology, vol. 61, no. 1, pp. 74-85, Jan. 2012.
[11] Hossain, M. S., & Atiquzzaman, M., "Cost analysis of mobility protocols," Telecommunication Systems, vol. 52,
no. 4, pp. 2271-2285, 2013.
[12] M. S. Hossain, M. Atiquzzaman and W. Ivancic, "Performance evaluation of multihomed NEMO," 2012 IEEE
International Conference on Communications (ICC), Ottawa, ON, 2012, pp. 5429-5433.
[13] M. S. Hossain, M. Atiquzzaman and W. Ivancic, "Performance comparison between multihomed network mobility
protocols," 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, 2012, pp. 5260-5265.
[14] S. Ryu, J. Choi and K. Park, "Performance evaluation of improved fast PMIPv6-based network mobility for
intelligent transportation systems," in Journal of Communications and Networks, vol. 15, no. 2, pp. 142-152,
April 2013.
[15] Calderon, M., Bernardos, C., & Soto, I., "PMIPv6 and Network Mobility Problem Statement". IETF, <draft-
bernardos-netext-pmipv6-nemo-ps-02>, 2012.
[16] Choi, J.-I., W.-K. Seo, and Y.-Z. Cho, "Efficient network mobility support scheme for proxy mobile IPv6".
EURASIP Journal on Wireless Communications and Networking, vol. 2015, no. 210, pp. 1-13, 2015.
[17] R. Kuntz, J. Montavont and T. Noel, "Multihoming in IPv6 mobile networks: progress, challenges, and solutions,"
in IEEE Communications Magazine, vol. 51, no. 1, pp. 128-135, January 2013.
[18] M. S. Hossain and M. Atiquzzaman, "Stochastic Properties and Application of City Section Mobility
Model," GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, Honolulu, HI, 2009, pp. 1-6.
[19] C. Makaya and S. Pierre, "An Analytical Framework for Performance Evaluation of IPv6-Based mobility
Management Protocols," in IEEE Transactions on Wireless Communications, vol. 7, no. 3, pp. 972-983,
March 2008.
[20] Islam, Shayla, Aisha Hassan Abdalla, Mohamed Hadi Habaebi, Wan Haslina Hassan, and Mohammad Kamrul
Hasan. "Design and Simulation of a Multihoming-based Inter-system Handoff Scheme in NEMO." Elektronika ir
Elektrotechnika 22, no. 1 (2016): 92-96.
[21] Choi, Hyon-Young, et al. "Design and Simulation of a Flow Mobility Scheme Based on Proxy Mobile IPv6." JIPS
8.4 (2012): 603-620.
[22] Melia, Telemaco, et al. "IP flow mobility in PMIPv6 based networks: solution design and experimental evaluation."
Wireless Personal Communications 61.4 (2011): 603-627.
[23] Musa, Abdulwaheed, Saad Osman Bashir, and Aisha Hassan Abdalla. "Review and Assessment of Electromagnetic
Wave Propagation in Sand and Dust Storms at Microwave and Millimeter Wave Bands---Part I." Progress In
Electromagnetics Research 40 (2014): 91-100.
BIOGRAPHIES OF AUTHORS
Currently, Dr. Shayla Islam is appointed as a post-doctoral fellow in International Islamic University
Malaysia (IIUM). In addition, she is working as an assistant professor in Green University of
Bangladesh (on leave). She has completed PhD degree in Engineering from Electrical and Computer
Engineering (ECE) department at International Islamic University Malaysia (IIUM) in 2016 under
Malaysian International Scholarship (MIS). She completed her MSc. at the department of Electrical
and Computer Engineering in International Islamic University Malaysia in 2012. She completed her
BSc. in Computer Science and Engineering from International Islamic University Chittagong,
Bangladesh. Dr. Shayla has awarded a Silver medal for her research work at International Islamic
University Malaysia. In consequences, she has also awarded a Young Scientist Award for the
11. Bulletin of Electr Eng and Inf ISSN: 2302-9285
MM-PNEMO: a mathematical model to assess handoff delay and packet loss (Shayla Islam)
621
contribution of research paper at 2nd International Conference on Green Computing and Engineering
Technologies, 2016 (ICGCET’16), Organized by the Department of Energy Technology, Aalborg
University, Esbjerg, Denmark. Previously, she was appointed as a lecturer in Green University of
Bangladesh (GUB) from 2007 to 2009. Her current research interests include data communications and
networking, computer networks and wireless communication, network mobility in heterogeneous
network, computer architecture &cloud computing. She published more than 50 papers in international
journals and conferences (WoS/ISI/ESCI and Scopus indexed). She works as a reviewer for many
international conferences as well as journals.
Aisha-Hassan Abdalla Hashim is currently a Professor at the Department of Electrical and Computer
Engineering, Faculty of Engineering, International Islamic University Malaysia. She completed his
bachelor degree studies in Electrical Engineering at University of Gezira, Sudan. She completed her
MSc and PhD in Electrical and Computer Engineering from International Islamic University Malaysia.
Her research interests include Wireless Networking, Network Mobility, and Cognitive Radio. She is a
registered senior member of the IEEE (SMIEEE) and member of the Institution of Institution of
Engineering and Technology (MIET) Professor Aisha has been serving the engineering society
through practicing engineering, technical seminars, workshop, teaching, publications, volunteer works
and patent. She is actively participating in curriculum development and program accreditation. She is a
member of the Department Board of Studies for several years. She received Best Teacher Award by
IIUM during the Quality Day in 2007. She has been appointed as external examiner/visiting
professor/adjunct professor at different universities. Professor Aisha is actively involved in research
and postgraduate programs. She has published more than 250 journal/conference papers. Professor
Aisha is actively involved in research and postgraduate programs. She has acquired several research
grants from IIUM, Ministry of Higher Education (MOHE) and Ministry of Science, Technology and
Innovation (MOSTI). She is the author of five engineering books. Dr. Aisha has been supervising at
least forty masters and PhD students.
Mohammad Kamrul Hasan is currently a postdoctoral researcher at the department of Electrical and
Computer Engineering in International Islamic University, Malaysia. He has completed his Ph.D. in
Electrical and Computer Engineering, in the year of 2016, from the department of Electrical and
Computer Engineering, International Islamic University, Malaysia. He was a research fellow in the
same university during June 2016–June 2017. He received his Masters degree in Communication
Engineering from International Islamic University, Malaysia in 2012. His current research interests
include Smart Grid Computing, Wireless Communication, Network Mobility, Cognitive Network, and
Artificial Intelligence. He published several number of international indexed journals and conferences.
He is a Senior Member of Institute of Electrical and Electronics Engineers (SMIEEE), Member of
Institution of Engineering and Technology (MIET), and Internet Society (ISOC). Dr. Mohammad is an
editor panel member of FENG Research Bulletin in Universiti Malaysia Sarawak.
Md. Abdur Razzaque received his B.S. and M.S. degrees from the University of Dhaka, Bangladesh in
1997 and 1999, respectively. He obtained his PhD degree in Wireless Networking from the
Department of the Computer Engineering, School of Electronics and Information, Kyung Hee
University, South Korea in 2009. He was a research professor in the same university during 2010–
2011. He worked as a visiting scholar in Stratford University, USA in 2017. Currently, Dr. Razzaque
is working as a Professor and Chairperson at the Department of Computer Science and Engineering,
Green University of Bangladesh (GUB). Professor Razzaque is actively contributing to the engineering
society as a group leader of Green Networking Research Group (http://cse.du.ac.bd/gnr) at the
Department of Computer Science and Engineering, University of Dhaka, Bangladesh. His research
interest is in the area of modeling, analysis and optimization of wireless networking protocols and
architectures, wireless sensor networks, body sensor networks, cooperative communications, sensor
data clouds, internet of things, cognitive radio networks, and smart grid communications. He has
published several number of research papers in international conferences and in indexed journals. Dr.
Razzaque is an editor of Journal of Network and Computer Applications (JNCA), associate editor of
IEEE Access, TPC chair of ICIET 2018, General Co-chair of IEEE R10HTC 2017, TPC member of
IEEE HPCC 2013–2018, SKIMA 2016–2018, ICOIN 2010–2018, NSysS 2015–2018. He is a senior
member of IEEE, member of IEEE Communications Society, IEEE Computer Society, Internet
Society (ISOC), Pacific Telecommunications Council (PTC) and KIPS.