This document analyzes the performance of three uplink transmission modes - single-hop direct, multi-hop cellular V2X, and store-carry-forward (SCF) - for delay sensitive real-time services in LTE-V2X networks. It presents a highway system model and compares the total energy consumption and transmission delay of the three modes using numerical simulations validated with ns-3. The results show that SCF mode consumes the least energy due to its carry phase, but incurs high delays unacceptable for real-time applications. Single-hop direct has the reverse performance. Multi-hop cellular V2X outperforms in terms of balancing low latency and moderate energy consumption beyond a cell radius of 600
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...IJCNCJournal
Millimeter-wave and mMIMO communications are the most essential success systems for next-generation wireless sensor networks to have enormous amounts of accessible throughput and spectrum. Through installing huge antenna arrays at the base station and performing coherent transceiver processing, mMIMO is a potential technology for enhancing the bandwidth efficiency of wireless sensor networks. The use of mmWave frequencies for mMIMO systems solves the problem of high path-loss through offering greater antenna gains. In this work, we provide a design with a random spatial sample structure that incorporates a totally random step before the analogue is received. It contains a totally random step before the analogue received signals are sent into the digital component of the HBF receiver. Adaptive random spatial based channel estimation (ARSCE) is proposed for channel session measurement collection, and an analogue combiner with valves has been used to estimate the signals at each receiving antenna. The proposed optimization problem formulation attempts to discover the orientations and gains of wideband channel routes. In addition, our proposed model has compared to various state-of-art techniques while considering error minimization.
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
Wireless Sensor Network (WSN) is commonly used to collect information from a remote area and one of the most important challenges associated with WSN is to monitor all targets in a given area while maximizing network lifetime. In wireless communication, energy consumption is proportional to the breadth of sensing range and path loss exponent. Hence, the energy consumption of communication can be minimized by varying the sensing range and decreasing the number of messages being sent. Sensing energy can be optimized by reducing the repeated coverage target. In this paper, an Adaptive Sensor Sensing Range (ASSR) technique is proposed to maximize the WSN Lifetime. This work considers a sensor network with an adaptive sensing range that are randomly deployed in the monitoring area. The sensor is adaptive in nature and can be modified in order to save power while achieving maximum time of monitoring to increase the lifetime of WSN network. The objective of ASSR is to find the best sensing range for each sensor to cover all targets in the network, which yields maximize the time of monitoring of all targets and eliminating double sensing for the same target. Experiments were conducted using an NS3 simulator to verify our proposed technique. Results show that ASSR is capable to improve the network lifetime by 20% as compared to other recent techniques in the case of a small network while achieving an 8% improvement for the case of a large networks.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
Deep learning applications, especially multilayer neural network models, result in network intrusion detection with high accuracy. This study proposes a model that combines a multilayer neural network with Dense Sparse Dense (DSD) multi-stage training to simultaneously improve the criteria related to the performance of intrusion detection systems on a comprehensive dataset UNSW-NB15. We conduct experiments on many neural network models such as Recurrent Neural Network (RNN), Long-Short Term Memory (LSTM), Gated Recurrent Unit (GRU), etc. to evaluate the combined efficiency with each model through many criteria such as accuracy, detection rate, false alarm rate, precision, and F1-Score.
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
An efficient Intrusion Detection System has to be given high priority while connecting systems with a network to prevent the system before an attack happens. It is a big challenge to the network security group to prevent the system from a variable types of new attacks as technology is growing in parallel. In this paper, an efficient model to detect Intrusion is proposed to predict attacks with high accuracy and less false-negative rate by deriving custom features UNSW-CF by using the benchmark intrusion dataset UNSW-NB15. To reduce the learning complexity, Custom Features are derived and then Significant Features are constructed by applying meta-heuristic FPA (Flower Pollination algorithm) and MRMR (Minimal Redundancy and Maximum Redundancy) which reduces learning time and also increases prediction accuracy. ENC (ElasicNet Classifier), KRRC (Kernel Ridge Regression Classifier), IGBC (Improved Gradient Boosting Classifier) is employed to classify the attacks in the datasets UNSW-CF, UNSW and recorded that UNSW-CF with derived custom features using IGBC integrated with FPA provided high accuracy of 97.38% and a low error rate of 2.16%. Also, the sensitivity and specificity rate for IGB attains a high rate of 97.32% and 97.50% respectively.
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...IJCNCJournal
Millimeter-wave and mMIMO communications are the most essential success systems for next-generation wireless sensor networks to have enormous amounts of accessible throughput and spectrum. Through installing huge antenna arrays at the base station and performing coherent transceiver processing, mMIMO is a potential technology for enhancing the bandwidth efficiency of wireless sensor networks. The use of mmWave frequencies for mMIMO systems solves the problem of high path-loss through offering greater antenna gains. In this work, we provide a design with a random spatial sample structure that incorporates a totally random step before the analogue is received. It contains a totally random step before the analogue received signals are sent into the digital component of the HBF receiver. Adaptive random spatial based channel estimation (ARSCE) is proposed for channel session measurement collection, and an analogue combiner with valves has been used to estimate the signals at each receiving antenna. The proposed optimization problem formulation attempts to discover the orientations and gains of wideband channel routes. In addition, our proposed model has compared to various state-of-art techniques while considering error minimization.
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
Wireless Sensor Network (WSN) is commonly used to collect information from a remote area and one of the most important challenges associated with WSN is to monitor all targets in a given area while maximizing network lifetime. In wireless communication, energy consumption is proportional to the breadth of sensing range and path loss exponent. Hence, the energy consumption of communication can be minimized by varying the sensing range and decreasing the number of messages being sent. Sensing energy can be optimized by reducing the repeated coverage target. In this paper, an Adaptive Sensor Sensing Range (ASSR) technique is proposed to maximize the WSN Lifetime. This work considers a sensor network with an adaptive sensing range that are randomly deployed in the monitoring area. The sensor is adaptive in nature and can be modified in order to save power while achieving maximum time of monitoring to increase the lifetime of WSN network. The objective of ASSR is to find the best sensing range for each sensor to cover all targets in the network, which yields maximize the time of monitoring of all targets and eliminating double sensing for the same target. Experiments were conducted using an NS3 simulator to verify our proposed technique. Results show that ASSR is capable to improve the network lifetime by 20% as compared to other recent techniques in the case of a small network while achieving an 8% improvement for the case of a large networks.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
Deep learning applications, especially multilayer neural network models, result in network intrusion detection with high accuracy. This study proposes a model that combines a multilayer neural network with Dense Sparse Dense (DSD) multi-stage training to simultaneously improve the criteria related to the performance of intrusion detection systems on a comprehensive dataset UNSW-NB15. We conduct experiments on many neural network models such as Recurrent Neural Network (RNN), Long-Short Term Memory (LSTM), Gated Recurrent Unit (GRU), etc. to evaluate the combined efficiency with each model through many criteria such as accuracy, detection rate, false alarm rate, precision, and F1-Score.
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
An efficient Intrusion Detection System has to be given high priority while connecting systems with a network to prevent the system before an attack happens. It is a big challenge to the network security group to prevent the system from a variable types of new attacks as technology is growing in parallel. In this paper, an efficient model to detect Intrusion is proposed to predict attacks with high accuracy and less false-negative rate by deriving custom features UNSW-CF by using the benchmark intrusion dataset UNSW-NB15. To reduce the learning complexity, Custom Features are derived and then Significant Features are constructed by applying meta-heuristic FPA (Flower Pollination algorithm) and MRMR (Minimal Redundancy and Maximum Redundancy) which reduces learning time and also increases prediction accuracy. ENC (ElasicNet Classifier), KRRC (Kernel Ridge Regression Classifier), IGBC (Improved Gradient Boosting Classifier) is employed to classify the attacks in the datasets UNSW-CF, UNSW and recorded that UNSW-CF with derived custom features using IGBC integrated with FPA provided high accuracy of 97.38% and a low error rate of 2.16%. Also, the sensitivity and specificity rate for IGB attains a high rate of 97.32% and 97.50% respectively.
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...ijwmn
Efficient and practical communications between large numbers of vehicles are critical in providing high level of safety and convenience to drivers. Crucial real-time information on road hazard, traffic conditions and driver services must be communicated to vehicles rapidly even in adverse environments, such as “urban canyons” and tunnels. We propose a novel routing protocol in vehicular networks that does not require position information (e.g. from GPS) but instead rely on relative position that can be determined dynamically. This GPS-Free Geographic Routing (GPSFR) protocol uses the estimated relative position of vehicles and greedily chooses the best next hop neighbor based on a Balance Advance (BADV) metric which balances between proximity and link stability in order to improve routing performance. In this paper, we focuses primarily on the complexity of routing in highways and solves routing problems that arise when vehicles are near interchanges, curves, and merge or exit lanes of highways. Our simulation results show that by taking relative velocity into account, GPSFR reduces link breakage to only 27% that of GPSR in the dense network. Consequently, GPSFR outperforms GPSR in terms of higher data delivery ratio, lower delay, less sensitivity of the network density and route paths’length
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
Massive multiple-input multiple-output (MIMO) systems are considered a promising solution to minimize multiuser interference (MUI) based on simple precoding techniques with a massive antenna array at a base station (BS). This paper presents a novel approach of beam division multiple access (BDMA) which BS transmit signals to multiusers at the same time via different beams based on hybrid beamforming and user-beam schedule. With the selection of users whose steering vectors are orthogonal to each other, interference between users is significantly improved. While, the efficiency spectrum of proposed scheme reaches to the performance of fully digital solutions, the multiuser interference is considerably reduced.
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
Network Enabled Capability (NEC) and the Land Open Systems Architecture (LOSA) are novel approaches to enable interoperability between a heterogeneous collection of assets in the battlefield. These paradigms utilise an underlying network for cooperation between deployed battlefield equipment. NEC and LOSA have great potential to transform military communications and enhance integrated survivability as well as situational awareness, but the Achilles’ heel of NEC and LOSA is the wireless spectrum over which they must communicate. A noisy and dynamic battlefield wireless spectrum as well as an array of heterogeneous wireless communications equipment handling multiple types of data with different Quality of Service (QoS) requirements requires a system which manages and allocates these communication resources effectively. This paper presents the High Availability Wireless Communications (HAWC) system, a hardware agnostic communications controller middleware to manage any combination of existing and future multiband wireless resources. The system utilises a vehicle’s data model to gather information about available radio resources and enable LOSA by meeting communications data requirements and delivering appropriate QoS to the appropriate traffic in a fleet of vehicles. The functionality of the system is verified by using behavioural simulation on a virtual battlefield.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
Mobile ad hoc Network (MANET) is an assortment of mobile nodes that area unit needed to transmit packets on behalf of every alternative. The mobile nodes maintain the topology data during a dynamic network among a selected vary. All nodes should remember of its neighbors that area unit directly approachable. The every node in network maintained next hop data of close neighbor nodes. The routing protocols area unit routed knowledge packets in between sender and receiver during a specific time instant. The time synchronization is maintained the communication clock cycle between the nodes. Time synchronization is an important element of a MANET. Time synchronization during a network aims at providing a typical duration for local clocks of nodes within the network. Since all hardware clocks area unit imperfect, local clocks of nodes could alienate from one another in time, thus determined time or durations of your
A novel low computational complexity robust adaptive blind multiuser detector, based on the minimum output energy (MOE) detector with multiple constraints and a quadratic inequality (QI) constraint is developed in this paper. Quadratic constraint has been a widespread approach to improve robustness against mismatch errors, uncertainties in estimating the data covariance matrix, and random perturbations in detector parameters. A diagonal loading technique is compulsory to achieve the quadratic constraint where the diagonal loading level is adjusted to satisfy the constrained value. Integrating the quadratic constraint into recursive algorithms seems to be a moot point since there is no closed-form solution for the diagonal loading term. In this paper, the MOE detector of DS/CDMA system is implemented using a fast recursive steepest descent adaptive algorithm anchored in the generalized sidelobe canceller (GSC) structure with multiple constraints and a QI constraint on the adaptive portion of the GSC structure. The Lagrange multiplier method is exploited to solve the QI constraint. An optimal variable loading technique, which is capable of providing robustness against uncertainties and mismatch errors with low computational complexity is adopted. Simulations for several mismatch and random perturbations scenarios are conducted in a rich multipath environment with near–far effect to explore the robustness of the proposed detector.
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN
channel and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
In recent years, a new wireless network called vehicular ad-hoc network (VANET), has become a popular research topic. VANET allows communication among vehicles and with roadside units by providing information to each other, such as vehicle velocity, location and direction. In general, when many vehicles likely to use the common route to proceed to the same destination, it can lead to a congested route that should be avoided. It may be better if vehicles are able to predict accurately the traffic congestion and then avoid it. Therefore, in this work, the deep reinforcement learning in VANET to enhance the ability to predict traffic congestion on the roads is proposed. Furthermore, different types of neural networks namely Convolutional Neural Network (CNN), Multilayer Perceptron (MLP) and Long Short-Term Memory (LSTM) are investigated and compared in this deep reinforcement learning model to discover the most effective one. Our proposed method is tested by simulation. The traffic scenarios are created using traffic simulator called Simulation of Urban Mobility (SUMO) before integrating with deep reinforcement learning model. The simulation procedures, as well as the programming used, are described in detail. The performance of our proposed method is evaluated using two metrics; the average travelling time delay and average waiting time delay of vehicles. According to the simulation results, the average travelling time delay and average waiting time delay are gradually improved over the multiple runs, since our proposed method receives feedback from the environment. In addition, the results without and with three different deep learning algorithms, i.e., CNN, MLP and LSTM are compared. It is obvious that the deep reinforcement learning model works effectively when traffic density is neither too high nor too low. In addition, it can be concluded that the effective algorithms for traffic congestion prediction models in descending order are MLP, CNN, and LSTM, respectively.
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
Vehicular ad-hoc network (VANET) is a promising project related to intelligent transportation systems (ITS), which aims at connecting vehicles and providing a set of functionalities for the efficient management of the network. However, the high mobility of the network nodes is considered a significant challenge for implementing a reliable, secure, and efficient exchange system. Furthermore, VANET faces the issue of packet delivery due to the high mobility of the nodes and packet collisions complicate the process of sending and receiving packets. We propose to combine two technologies which are unmanned aerial vehicle (UAV) and information centric networks (ICN) and apply it in VANET architecture as supporting technology. The UAV are more reliable and less affected by channel fading. And can be used in areas where we cannot install network infrastructure. The UAV has many advantages that we have cited in this article and can solve many issues of VANET. Using ICN can solve some of the problems of VANET since ICN has many strategies to capture and retrieve data. This study proposes a new VANET model based on an UAV and ICN, to reduce the overload of the vehicles, which in most cases require more resources and have a limited time to process and act especially in case of an accident or emergency.
Network parameters impact on dynamic transmission power control in vehicular ...ijngnjournal
the throughput of the wireless vehicular network and decrease the delay of the message communication
between vehicular nodes on the highway. Whenever an event occurs on the highway, the reliability
of the communication in the vehicular network becomes so vital so that event created messages should
reach to all the moving network nodes. It becomes necessary that there should be no interference from
outside of the network and all the neighbor nodes should lie in the transmission range of the
reference vehicular node. Transmission range is directly proportional to the transmission power the
moving node. If the transmission power will be high, the interference increases that can cause higher
delay in message reception at receiver end, hence the performance of the network decreased. In this
paper, it is analyzed that how transmission power can be controlled by considering other different
parameter of the network such as; density, distance between moving nodes, different types of messages
dissemination with their priority, selection of an antenna also affects on the transmission power. The
dynamic control of transmission power in VANET serves also for the optimization of the resources
where it needs, can be decreased and increased depending on the circumstances of the network.
Different applications and events of different types also cause changes in transmission power to enhance
the reachability. The analysis in this paper is comprised of density, distance with single hop and multi
hop message broadcasting based dynamic transmission power control as well as antenna selection and
applications based. Some summarized tables are produced according to the respective parameters of
the vehicular network. At the end some valuable observations are made and discussed in detail. This
paper concludes with a grand summary of all the protocols discussed in it.
Network Parameters Impact on Dynamic Transmission Power Control in Vehicular ...josephjonse
In vehicular ad hoc networks, the dynamic change in transmission power is very effective to increase the throughput of the wireless vehicular network and decrease the delay of the message communication between vehicular nodes on the highway. Whenever an event occurs on the highway, the reliability of the communication in the vehicular network becomes so vital so that event created messages should reach to all the moving network nodes. It becomes necessary that there should be no interference from outside of the network and all the neighbor nodes should lie in the transmission range of the reference vehicular node. Transmission range is directly proportional to the transmission power the moving node. If the transmission power will be high, the interference increases that can cause higher delay in message reception at receiver end, hence the performance of the network decreased. In this paper, it is analyzed that how transmission power can be controlled by considering other different parameter of the network such as; density, distance between moving nodes, different types of messages dissemination with their priority, selection of an antenna also affects on the transmission power. The dynamic control of transmission power in VANET serves also for the optimization of the resources where it needs, can be decreased and increased depending on the circumstances of the network. Different applications and events of different types also cause changes in transmission power to enhance the reachability. The analysis in this paper is comprised of density, distance with single hop and multi hop message broadcasting based dynamic transmission power control as well as antenna selection and applications based. Some summarized tables are produced according to the respective parameters of the vehicular network. At the end some valuable observations are made and discussed in detail. This paper concludes with a grand summary of all the protocols discussed in it.
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...ijwmn
Efficient and practical communications between large numbers of vehicles are critical in providing high level of safety and convenience to drivers. Crucial real-time information on road hazard, traffic conditions and driver services must be communicated to vehicles rapidly even in adverse environments, such as “urban canyons” and tunnels. We propose a novel routing protocol in vehicular networks that does not require position information (e.g. from GPS) but instead rely on relative position that can be determined dynamically. This GPS-Free Geographic Routing (GPSFR) protocol uses the estimated relative position of vehicles and greedily chooses the best next hop neighbor based on a Balance Advance (BADV) metric which balances between proximity and link stability in order to improve routing performance. In this paper, we focuses primarily on the complexity of routing in highways and solves routing problems that arise when vehicles are near interchanges, curves, and merge or exit lanes of highways. Our simulation results show that by taking relative velocity into account, GPSFR reduces link breakage to only 27% that of GPSR in the dense network. Consequently, GPSFR outperforms GPSR in terms of higher data delivery ratio, lower delay, less sensitivity of the network density and route paths’length
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
Massive multiple-input multiple-output (MIMO) systems are considered a promising solution to minimize multiuser interference (MUI) based on simple precoding techniques with a massive antenna array at a base station (BS). This paper presents a novel approach of beam division multiple access (BDMA) which BS transmit signals to multiusers at the same time via different beams based on hybrid beamforming and user-beam schedule. With the selection of users whose steering vectors are orthogonal to each other, interference between users is significantly improved. While, the efficiency spectrum of proposed scheme reaches to the performance of fully digital solutions, the multiuser interference is considerably reduced.
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
Network Enabled Capability (NEC) and the Land Open Systems Architecture (LOSA) are novel approaches to enable interoperability between a heterogeneous collection of assets in the battlefield. These paradigms utilise an underlying network for cooperation between deployed battlefield equipment. NEC and LOSA have great potential to transform military communications and enhance integrated survivability as well as situational awareness, but the Achilles’ heel of NEC and LOSA is the wireless spectrum over which they must communicate. A noisy and dynamic battlefield wireless spectrum as well as an array of heterogeneous wireless communications equipment handling multiple types of data with different Quality of Service (QoS) requirements requires a system which manages and allocates these communication resources effectively. This paper presents the High Availability Wireless Communications (HAWC) system, a hardware agnostic communications controller middleware to manage any combination of existing and future multiband wireless resources. The system utilises a vehicle’s data model to gather information about available radio resources and enable LOSA by meeting communications data requirements and delivering appropriate QoS to the appropriate traffic in a fleet of vehicles. The functionality of the system is verified by using behavioural simulation on a virtual battlefield.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
Mobile ad hoc Network (MANET) is an assortment of mobile nodes that area unit needed to transmit packets on behalf of every alternative. The mobile nodes maintain the topology data during a dynamic network among a selected vary. All nodes should remember of its neighbors that area unit directly approachable. The every node in network maintained next hop data of close neighbor nodes. The routing protocols area unit routed knowledge packets in between sender and receiver during a specific time instant. The time synchronization is maintained the communication clock cycle between the nodes. Time synchronization is an important element of a MANET. Time synchronization during a network aims at providing a typical duration for local clocks of nodes within the network. Since all hardware clocks area unit imperfect, local clocks of nodes could alienate from one another in time, thus determined time or durations of your
A novel low computational complexity robust adaptive blind multiuser detector, based on the minimum output energy (MOE) detector with multiple constraints and a quadratic inequality (QI) constraint is developed in this paper. Quadratic constraint has been a widespread approach to improve robustness against mismatch errors, uncertainties in estimating the data covariance matrix, and random perturbations in detector parameters. A diagonal loading technique is compulsory to achieve the quadratic constraint where the diagonal loading level is adjusted to satisfy the constrained value. Integrating the quadratic constraint into recursive algorithms seems to be a moot point since there is no closed-form solution for the diagonal loading term. In this paper, the MOE detector of DS/CDMA system is implemented using a fast recursive steepest descent adaptive algorithm anchored in the generalized sidelobe canceller (GSC) structure with multiple constraints and a QI constraint on the adaptive portion of the GSC structure. The Lagrange multiplier method is exploited to solve the QI constraint. An optimal variable loading technique, which is capable of providing robustness against uncertainties and mismatch errors with low computational complexity is adopted. Simulations for several mismatch and random perturbations scenarios are conducted in a rich multipath environment with near–far effect to explore the robustness of the proposed detector.
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN
channel and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
In recent years, a new wireless network called vehicular ad-hoc network (VANET), has become a popular research topic. VANET allows communication among vehicles and with roadside units by providing information to each other, such as vehicle velocity, location and direction. In general, when many vehicles likely to use the common route to proceed to the same destination, it can lead to a congested route that should be avoided. It may be better if vehicles are able to predict accurately the traffic congestion and then avoid it. Therefore, in this work, the deep reinforcement learning in VANET to enhance the ability to predict traffic congestion on the roads is proposed. Furthermore, different types of neural networks namely Convolutional Neural Network (CNN), Multilayer Perceptron (MLP) and Long Short-Term Memory (LSTM) are investigated and compared in this deep reinforcement learning model to discover the most effective one. Our proposed method is tested by simulation. The traffic scenarios are created using traffic simulator called Simulation of Urban Mobility (SUMO) before integrating with deep reinforcement learning model. The simulation procedures, as well as the programming used, are described in detail. The performance of our proposed method is evaluated using two metrics; the average travelling time delay and average waiting time delay of vehicles. According to the simulation results, the average travelling time delay and average waiting time delay are gradually improved over the multiple runs, since our proposed method receives feedback from the environment. In addition, the results without and with three different deep learning algorithms, i.e., CNN, MLP and LSTM are compared. It is obvious that the deep reinforcement learning model works effectively when traffic density is neither too high nor too low. In addition, it can be concluded that the effective algorithms for traffic congestion prediction models in descending order are MLP, CNN, and LSTM, respectively.
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
Vehicular ad-hoc network (VANET) is a promising project related to intelligent transportation systems (ITS), which aims at connecting vehicles and providing a set of functionalities for the efficient management of the network. However, the high mobility of the network nodes is considered a significant challenge for implementing a reliable, secure, and efficient exchange system. Furthermore, VANET faces the issue of packet delivery due to the high mobility of the nodes and packet collisions complicate the process of sending and receiving packets. We propose to combine two technologies which are unmanned aerial vehicle (UAV) and information centric networks (ICN) and apply it in VANET architecture as supporting technology. The UAV are more reliable and less affected by channel fading. And can be used in areas where we cannot install network infrastructure. The UAV has many advantages that we have cited in this article and can solve many issues of VANET. Using ICN can solve some of the problems of VANET since ICN has many strategies to capture and retrieve data. This study proposes a new VANET model based on an UAV and ICN, to reduce the overload of the vehicles, which in most cases require more resources and have a limited time to process and act especially in case of an accident or emergency.
Network parameters impact on dynamic transmission power control in vehicular ...ijngnjournal
the throughput of the wireless vehicular network and decrease the delay of the message communication
between vehicular nodes on the highway. Whenever an event occurs on the highway, the reliability
of the communication in the vehicular network becomes so vital so that event created messages should
reach to all the moving network nodes. It becomes necessary that there should be no interference from
outside of the network and all the neighbor nodes should lie in the transmission range of the
reference vehicular node. Transmission range is directly proportional to the transmission power the
moving node. If the transmission power will be high, the interference increases that can cause higher
delay in message reception at receiver end, hence the performance of the network decreased. In this
paper, it is analyzed that how transmission power can be controlled by considering other different
parameter of the network such as; density, distance between moving nodes, different types of messages
dissemination with their priority, selection of an antenna also affects on the transmission power. The
dynamic control of transmission power in VANET serves also for the optimization of the resources
where it needs, can be decreased and increased depending on the circumstances of the network.
Different applications and events of different types also cause changes in transmission power to enhance
the reachability. The analysis in this paper is comprised of density, distance with single hop and multi
hop message broadcasting based dynamic transmission power control as well as antenna selection and
applications based. Some summarized tables are produced according to the respective parameters of
the vehicular network. At the end some valuable observations are made and discussed in detail. This
paper concludes with a grand summary of all the protocols discussed in it.
Network Parameters Impact on Dynamic Transmission Power Control in Vehicular ...josephjonse
In vehicular ad hoc networks, the dynamic change in transmission power is very effective to increase the throughput of the wireless vehicular network and decrease the delay of the message communication between vehicular nodes on the highway. Whenever an event occurs on the highway, the reliability of the communication in the vehicular network becomes so vital so that event created messages should reach to all the moving network nodes. It becomes necessary that there should be no interference from outside of the network and all the neighbor nodes should lie in the transmission range of the reference vehicular node. Transmission range is directly proportional to the transmission power the moving node. If the transmission power will be high, the interference increases that can cause higher delay in message reception at receiver end, hence the performance of the network decreased. In this paper, it is analyzed that how transmission power can be controlled by considering other different parameter of the network such as; density, distance between moving nodes, different types of messages dissemination with their priority, selection of an antenna also affects on the transmission power. The dynamic control of transmission power in VANET serves also for the optimization of the resources where it needs, can be decreased and increased depending on the circumstances of the network. Different applications and events of different types also cause changes in transmission power to enhance the reachability. The analysis in this paper is comprised of density, distance with single hop and multi hop message broadcasting based dynamic transmission power control as well as antenna selection and applications based. Some summarized tables are produced according to the respective parameters of the vehicular network. At the end some valuable observations are made and discussed in detail. This paper concludes with a grand summary of all the protocols discussed in it.
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
This paper presents the unmanned aerial vehicle (UAV) relays’ assisted vehicle-to-everything (V2X) network to implement the internet of things (IoT) systems with improvement in the coverage area. Such a network benefits from many advantages of the non-orthogonal multiple access (NOMA) scheme. We have implemented a decode-and-forward (DF) scheme for these UAVs. Then, we characterize the channels as Nakagami-m fading to evaluate the performance of the system. We derive closed-form expressions of outage probability (OP), ergodic capacity (EC), and throughput. The results show that the performance of the system depends on the transmitted signal-to-noise ratio (SNR) at the base station and the heights of the UAV relays. Target rate and power allocation factors are two main parameters that can be adjusted to achieve better performance. The results also compare to the system without UAV and OMA technique that shows the advantages of deploying UAV-assisted NOMA. Therefore, the design of NOMA for UAV relay-assisted V2X systems provides sufficient demand. The simulation results verified the effectiveness of the proposed UAV network and the precision of the theoretical analysis.
Recent advances in wireless networks have led to the introduction of a new type of networks called Vehicular Networks. Vehicular Ad Hoc Network (VANET) is a form of Mobile Ad Hoc Networks (MANET). VANETs provide us with the infrastructure for developing new systems to enhance drivers’ and passengers’ safety and comfort. VANETs are distributed self organizing networks formed between moving vehicles equipped with wireless communication devices. This type of networks is developed as part of the Intelligent Transportation Systems (ITS) to bring significant improvement to the transportation systems performance. One of the main goals of the ITS is to improve safety on the roads, and reduce traffic congestion, waiting times, and fuel consumptions. The integration of the embedded computers, sensing devices, navigation systems (GPS), digital maps, and the wireless communication devices along with intelligent algorithms will help to develop numerous types of applications for the ITS to improve safety on the roads. The up to date information provided by the integration of all these systems helps drivers to acquire real-time information about road conditions allowing them to react on time. For example, warning messages sent by vehicles involved in an accident enhances traffic safety by helping the approaching drivers to take proper decisions before entering the crash dangerous zone (ElBatt et al., 2006) (Xu et al., 2007). And Information about the current transportation conditions facilitate driving by taking new routes in case of congestion, thus saving time and adjusting fuel consumption (Dashtinezhad et al., 2004) (Nadeem et al., 2004). In addition to safety concerns, VANET can also support other non-safety applications that require a Quality of Service (QoS) guarantee. This includes Multimedia (e.g., audio/video) and data (e.g., toll collection, internet access, weather/maps/ information) applications.
Vehicular networks are composed of mobile nodes, vehicles equipped with On Board Units (OBU), and stationary nodes called Road Side Units (RSU) attached to infrastructure that will be deployed along the roads.
The feasibility of obstacle awareness forwarding scheme in a visible light c...IJECEIAES
A vehicular-to-vehicular (V2V) communication is a part of a vehicular ad-hoc network (VANET) that emerges recently due to the heavy traffic environment. V2V is a frequently changing network since it implements vehicles as mobile nodes. The challenges in implementing V2V are the relatively short duration of possible communication and the uneven city environment caused by high rise buildings or other objects that distract the signal transmission. The limited transmitting duration between vehicles requires efficient coordination and communication. This work focuses on the utility of visible light communication in vehicular network (VLC-VN) in data transmitting and the obstacle awareness in the forwarding scheme based on our knowledge in previous researches. The result of evaluating the feasibility of VLC-VN forwarding in a freeway environment the transmission delay is lower than 1 second in 500 byte data transmission, however it reaches to only about 4% in throughput as a drawback.
Architecture harmonization between cloud radio access network and fog networkredpel dot com
Architecture harmonization between cloud radio access network and fog network
for more ieee paper / full abstract / implementation , just visit www.redpel.com
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...IJCNCJournal
Wireless communications, nowadays, becomes a vital element of people’s daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities, enabling technologies, and challenges from the perspective of the
integrated wireless systems. This paper aims to drive a comprehensive and comparative study on terrestrial-aerial platforms- satellite wireless communications systems, includes their characteristics and unravelling challenges. The comparison focuses on issues that reportedly can evaluate any wireless
systems for temporary events. These issues are altitude and coverage, Radio Frequency (RF) propagation, interference, handover, power supply constraints, deployment and maintenance challenges, reliability on special events or disaster relief, cost-effectiveness and environmental impact. Last, Quality of service (QoS) performance is analysed for the four wireless communication systems from the temporary events
perspective using the OPNET Modeller simulation tool. Results infer that space-based wireless systems outperform terrestrial ones.
Multicast routing protocol for advanced vehicular ad hoc networksTELKOMNIKA JOURNAL
Transport sector has great impact on our daily life. Despite the huge number of vehicular models, driving process still faces many challenges due to the lack information about the roads and the surrounding sudden events, which can result in high number of accidents globally and especially in Saudi Arabia. A new technology, vehicular ad hoc networks (VANETs), has emerged to support Intelligent Transport System (ITS) and to offer advanced solutions for drivers to avoid different hazard events that occur on the road. In this paper, we discuss the multicast and broadcast communications in VANETs, Quality of Sevice (QoS) awaregroup addressing/managing solutions to VANETs which help inclassifying different application that explore and design a new cross-layer framework, aware of high mobility and efficiency.
V2V communication systems communicates with the approaching vehicle and avoids the accident by alerting the driver and often it drives away the vehicle if the driver fails to stop it. V2I communication system communicates with the server in the road and reduces the traffic taking place in the road.
International Journal of Computational Engineering Research (IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
A PRACTICAL ROUTE RECONSTRUCTION METHOD FOR WI-FI MESH NETWORKS IN DISASTER S...ijwmn
Computer networks comprise essential infrastructure in modern society and must function even in a disaster situation. Therefore, fault-tolerant networks are being actively studied. Disaster information systems, however, suffer from two main issues: lack of their utilization in peacetime and the difficulty for a non-expert to manage them should a disaster strike. Therefore, we place special emphasis on the development of a reliable network infrastructure that can function during both normal and disaster times, using a Wi-Fi-based wireless mesh network. In a large-scale disaster situation, our goal is to identify a way to reconstruct the mesh network by adding the minimum number of spare access points (APs) to ensure the reachability of all mesh routers to the backbone network. Furthermore, we consider that only public workers without any experience with wireless communication technologies must decide upon the adequate locations for spare APs and install them. Both of simulation experiments and field trial prove the effectiveness of the proposed methods.
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
VANET (Vehicular Ad hoc NETwork) is the emerging research area that making the phrase
“Network on Wheel” true. In this new age network the basic WLAN (IEEE 802.11) standard is
used. As the necessity of such network increases the implementation challenges are being taken
into account. They are broadcasting, routing, priority scheduling and security and privacy. In
this paper the routing is considered as the research factor. A proposal for routing with
frequently changing topology to avoid disconnection of network on road and for the routing
among overlapping networks in flyovers with multiple ramps and stack to avoid wrong
messaging is given.
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
VANET (Vehicular Ad hoc NETwork) is the emerging research area that making the phrase
“Network on Wheel” true. In this new age network the basic WLAN (IEEE 802.11) standard is
used. As the necessity of such network increases the implementation challenges are being taken
into account. They are broadcasting, routing, priority scheduling and security and privacy. In
this paper the routing is considered as the research factor. A proposal for routing with
frequently changing topology to avoid disconnection of network on road and for the routing among overlapping networks in flyovers with multiple ramps and stack to avoid wrong messaging is given.
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
Vehicular Ad Hoc Networks (VANETs) is a technology supporting two types of applications, safety and service applications with higher and lower priorities respectively. Thereby, Medium Access Control (MAC) protocol is designed to provide reliable and efficient data broadcasting based on prioritization. Different from the IEEE 1609.4 (legacy), HER-MAC protocol is a new multi-channel MAC proposed for VANETs, offering remarkable performance with regards to safety applications transmission. This paper focuses on the analysis of packet delivery ratio of the HER-MAC protocol under non-saturated conditions. 1-D and 2-D Markov chains have been developed for safety and non-safety applications respectively, to evaluate mathematically the performance of HER-MAC protocol. The presented work has taken into account the freezing of the backoff timer for both applications and the backoff stages along with short retry limit for non-safety applications in order to meet the IEEE 802.11p specifications. It highlights that taking these elements into consideration are important in modeling the system, to provide an accurate estimation of the channel access, and guarantees that no packet is served indefinitely. More precise results of the system packet delivery ratio have been yield. The probability of successful transmission and collisions were derived and used to compute the packet delivery ratio. The simulation results validate the analytical results of our models and indicate that the performance of our models outperformed the existing models in terms of the packet delivery ratio under different number of vehicles and contention window.
The performance of the vehicular communication-clustering processTELKOMNIKA JOURNAL
For the new wireless systems and beyond, the intelligent transportation system is considered as one of the main features that could be covered in the new research topics. Furthermore, both high-speed data transmission and data processing play a crucial role for these generations. Our work covers two main propositions in order to attain an improvement in such intelligent systems performance. A clustering algorithm is proposed and presented for grouping mobile nodes based on their speeds with some modified head assignments processes. This will be combined with a parallel-processing technique that enhances the QoS. Mainly, this work concerns enhancing the V2V data transmission and the processing speed. Thus, a wavelet processing stage has been imposed to optimize the transmitted power phenomenon. In order to check the validity of such proposition, five main efficiency factors have been investigated; namely complementary cumulative distributions, bit rates, energy efficiency, the lifetime of cluster head and the ordinary nodes reattaching-head average times.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
Similar to Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive Real-Time Services (20)
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive Real-Time Services
1. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
DOI: 10.5121/ijcnc.2022.14103 41
PERFORMANCE ANALYSIS OF ENERGY
OPTIMIZED LTE-V2X NETWORKS FOR DELAY
SENSITIVE REAL-TIME SERVICES
Palash Kundu, Atunu Sarkar and Bhaskar Sardar
Department of Information Technology, Jadavpur University, Kolkata, India
ABSTRACT
Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in
cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency
service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National
Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user
equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the
application data. To support these scenarios, we present a high way based system model in rural area and
enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-Carry-
Forward (SCF) modes of uplink data transmission. We compare the performance of three modes of
transmissions in terms of overall energy consumption and overall transmission delay with specific delay
constraints of VoIP and video applications. With the varying cell radius and irrespective type of
applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF
mode due to its inherent property but applications suffer a lot due to high delay incurred whereas single-
hop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay
for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop
cellular-V2X mode always outperforms (with low latency and moderate energy consumption).
KEYWORDS
V2X communication, Energy efficiency, Direct communication, Store-carry-forward, Delay sensitive.
1. INTRODUCTION
With the exponential growth of high data rate demand, the next-generation wireless networks
have been put under pressure to offload mobile data [1][4] and simultaneously include cellular-
V2X (as Vehicle-to-Everything) communication. Cellular-V2X is a promising technology
providing the requirements of public safety services such as Public Protection and Disaster Relief
(PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc.
This emerging technology aims to fulfil the requirements of new set of applications with
optimized energy efficiency to enhancements of road safety and traffic efficiency by enabling
reliable and low latency services. Thus, cellular-V2X is highly suitable for providing emergency
services which require delay sensitive networks, supporting real time and interactive applications
such as audio and video calls, Internet browsing etc. Moreover, energy consumption of the user
equipment (UE) is surprisingly increasing with the rapid growth of bandwidth-hungry
applications. Due to limited battery power constraint of UE/vehicular-UE (VUE), performance of
the system affects the quality-of-experience (QoE) of the users [5]. Hence, energy efficiency for
handheld equipments (with limited battery power) has become a key performance indicator (KPI)
of the cellular system which draws attention from research community to industry.
2. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
42
As known, components of V2X communication include not only the communication between
vehicles as V2V but also communication between vehicle and infrastructure as V2I, vehicle and
pedestrian as V2P, and vehicle and network as V2N (shown in Figure 1). All components of
V2X communication enable VUEs to communicate with a higher data rate for transmitting its
cached data, roadside information such as accident, speed limit, etc. quickly [6]. Thus, quality of
the effective communication provides high traffic safety and high quality-of-service (QoS) by
minimizing latency and maximizing the reliability of the network.
Figure 1. Use case with various components of V2X communication used in Public Safety Networks
In-coverage UE/VUE can directly communicate to eNB (in a single hop transmission) resulting
in high energy consumption, high end-to-end delay for long-distance communication.
Furthermore, direct mode of transmission increases network load when transceivers are at the cell
edge. In contrast, cellular-V2X mode can alleviate the issues of single-hop direct communication.
In this mode, VUEs can play a dual role i.e., 1. they can be a source/destination at the end of the
entire communication or 2. they can act as relays for receiving, processing, and forwarding data.
Relaying data reduces power consumption of the devices in one side and in other side, it
decreases latency which has potential impact on applications running at the ends. Significant
performance of out-of-coverage V2X mode is also seen when compared with in-coverage V2X
mode. The later mode cannot be intervened by eNB which results autonomous resource selection
based on sensing the environment. Thus, this mode may suffer from significant collisions and
interferences in a dense environment but still it is widely accepted for multi-hop short range
communications. Due to unavailability of the VUE in the proximity, store-carry-forward (SCF)
mode of transmission is also used as another competent scheme. Though SCF mode, as a derived
mode of cellular-V2X, is well-known least energy consumption scheme but it incurs high delay
[7].
In general, VUE (as mobile relay compared to UE as the stationary relay) broadens the scope of
seamless communication due to availability and mobility in high ways. Consequently, VUE can
help in providing emergency requirements of Public Safety Network (PSN) services depending
on efficient mission-critical applications such as voice, and video communications between first
responders/receivers and victims. Areas belonging to natural disasters such as earthquakes,
floods, tsunamis, hurricanes etc. demand emergency service requirements with immediate effect.
Due to communication infrastructure being often damaged by natural calamities to large extent,
made services unavailable or at least heavily congested, the stationary UEs in newly formed
3. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
43
adhoc network may use cellular-V2X/SCF mode of transmission for sending information to
traditional network via relay-assisted VUEs (as shown in the use case of Figure 1).
The main objective of this article is to find out the best suitable mode of transmissions among
single-hop direct mode, SCF mode, and relay-assisted multi-hop cellular-V2X mode by
optimizing the overall energy consumption of the UE and/or VUEs and average transmission
delay (from UE to eNB). The goal also includes to minimizing the power consumption in uplink
(UL) data transmission with the delay constraints of various delay sensitive applications such as
VoIP and video.
To optimize energy consumption with specific delay constraints, we first present a system model
and enhance its scope in a high way platform through rural areas. Second, by exploiting VUE as
mobile relay, we apply traditional single-hop direct (to eNB), multi-hop cellular-V2X, and SCF
mode of UL transmission on the enhanced system model. Third, based on numerical results,
validated with ns-3, we measure overall energy consumption and delay metric for three modes of
transmissions with the respective delay constraints of VoIP, and video applications.
The rest of this paper is organized as follows. In section 2, some background research works
related to the topic of the article with the overview of their contributions are discussed. We
present a system model and enhance it over the proposed scenario and formulate the problem in
section 3. Simulation and numerical results with the analysis and comparison of the performances
of three modes of data transmissions are discussed in section 4. Section 5 concludes the article
and finally, section 6 gives some future research directions.
2. RELATED WORKS
To use the potential benefit of V2X communications, many works have been done on PSN
(especially in ITS platform) in [5] and [8]-[12]. Authors in [5] formulate and propose an efficient
solution methodology of optimization problem for minimizing the total power consumption by
associating VUE. In [8], authors propose a hybrid communication approach using LTE and
DSRC (i.e., 802.11p) for supporting high bandwidth and reliable applications of road safety and
traffic efficiency such as video streaming. A new protocol architecture based on V2X
communications has been suggested in [9]-[10] to avoid traffic jam at intersections. To improve
the packet reception probability by reducing access latency and increasing high reliability, non-
orthogonal multiple access has been exploited in [11]. For safety applications, authors of [12]
improve reliability and reduce the latency of V2X communication by optimizing the network
performance against signal power and delay constraints. In communications between users and
vehicles on a highway scenario, they consider orthogonal resource block allocation and show
significant performance gain.
Relay based multi-hop cellular networks (MCNs) concept is exploited in [13]-[15] to increase the
efficiency of energy consumption in great extent for delay-tolerant applications. Authors in [13]
propose a context-based opportunistic forwarding scheme (i.e., SCF) using location based
optimum mobile relaying in two hop scenario for MCNs with D2D communications and show
significant energy benefits for delay tolerant services by comparing with other forwarding
schemes and traditional single-hop cellular communication. In [14], authors use the MCN
concept to dramatically reduce the energy consumption of eNB and UE both, by exploiting
vehicles as mobile relay in cellular network. The key concept in [15] is to search the next mobile
relay within its short transmission zone in MCN. If the next mobile relay is found, the message is
immediately forwarded otherwise it is carried. Based on the approach, authors reduce the energy
consumption compared to traditional single hop communication. To extend cellular coverage,
4. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
44
multi-hop D2D architecture on ISM band (using 802.11) is proposed in [16]. In this, authors also
propose a modified Optimized Link State Routing Protocol (OLSR) based proactive routing, i.e.,
cell-OSLR to improve QoS of 4G/5G based applications.
In [7] and its extension [17], energy-efficient V2X communication has been proposed and
analysed over LTE networks. In their articles, authors compare their proposed optimal resource
allocation based V2X enable transmission and show their proposed scheme is more energy
conserving than traditional direct transmission, decoding-and-forwarding (DF) based
transmission and opportunistic SCF transmission with varying cell radius.
All existing works show an immense potentiality of V2X communications in PSNs (including
ITS). However, no such extensive investigations made in the recent past on optimal energy
efficiency with delay constraints for delay sensitive applications which is crucial not only in the
performance of road safety and traffic efficiency applications but also helps in providing the
requirements of emergency services fast.
3. OVERVIEW OF CELLULAR-V2X AND SCF MODES OF TRANSMISSIONS
3.1. Cellular-V2X mode
For being an advance low latency communication technology, V2X mode is exhaustively used in
road transportation system to exchange information with other vehicles, pedestrian,
infrastructure, network etc. Due to several limitations of Dedicated Short Range Communication
(DSRC), such as unreliable broadcasts, short range communication etc., cellular-V2X has been
evolved in LTE and 5G-NR architectures (in 3GPP released 14 and 16 respectively) to meet the
traffic safety requirements such as high capacity, low latency, and long-range communications.
From the resource scheduling perspective, LTE-V2X supports two modes named as LTE-
cellular-V2X and LTE-direct-V2X (as Transmission Mode 3 and Mode 4 respectively). In both
the approaches, Cooperative Awareness Message (CAM) is periodically broadcasted by a VUE to
its neighbours to inform about its identification, state, velocity, location, public safety
information etc. In LTE-cellular-V2X, centralized scheduling is used over Uu interface with 1.8-
2.0 GHz band which is fully controlled by eNB. This mode of communication is operated (in UL
and downlink (DL)), when a VUE is within the coverage of eNB. On the other hand, LTE-direct-
V2X uses distributed scheduling approach over PC5 interface with 5.9 GHz band. As no
involvement of eNB is required, LTE-direct-V2X mode can be operated in-coverage as well as
out-of-coverage of eNB (using SL communication in PSSCH and PSCCH channels). LTE-direct-
V2X (as cellular-V2X Mode 4) uses SC-FDM to cover larger transmission range with limited
power. A VUE (using both dedicated and shared band in LTE-direct and LTE-cellular
respectively) must need two individual transceivers otherwise single transceiver is sufficient for
both the modes with shared band. Thus, the cellular-V2X mode of transmission not only
improves application reliability but also conserves energy compared to direct transmission.
3.2. SCF mode
Another well-accepted energy efficient mode of transmission in the domain of V2X
communications is SCF. Unlike cellular-V2X mode, SCF mode of transmission takes place in a
chunk of data rather than on a per-packet basis. Applications where delay is not a crucial
constraint such as file transfer, email, audio/video on demand etc. can run smoothly using SCF
mode of transmission. This mode is not only a delay feeding but also a highly energy conserving
mechanism. During prolonged carry phase of SCF mode, instead of transmission, data are
transported which results significant energy saving. Thus, for being highly energy optimized, this
5. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
45
mode of transmission is considered in this article. In contrary, all real time applications such as
IP telephony, video conferencing and interactive applications such as web-access, remote login
etc. suffer a lot in this mode. Moreover, SCF mode of transmission internally uses V2X mode in
terms of V2P and V2I while receiving text/data from UE and uploading to eNB respectively. The
store and followed by carry operations of SCF mode also reduces the energy consumption by
minimizing the required internal nodes-processing and protocol overhead. For more, readers may
study [13]-[15].
4. SYSTEM MODEL AND PROBLEM FORMULATION
In this section, we present a highway based system model and formulate the problem to measure
energy consumption and overall transmission delay due to the transmission of VoIP/video data
from an UE (which is almost at the cell edge) to eNB in single-hop direct mode, multi-hop
cellular-V2X mode, and SCF mode of transmissions. Various notations used in the problem
formulation and their meanings are given in Table I.
Table I. Nomenclature
Notations Meanings Notations Meanings
ω Antenna characteristics heNB Antenna height of eNB
v Velocity of the vehicle hUE Antenna height of UE
r Radius of the cell pmax Max. transmit power of UE
α Path loss constant pd Transmit power of UE
Ψ Noise power pc Circuit power of UE
M VoIP/video data size B Channel bandwidth
w Width of the road Dmax Max. transmission delay
rUE-eNB Distance between UE and eNB n Effective no. of vehicles in V2V
communication
rV-V Distance between vehicle and vehicle pUE-V Transmit power of UE to vehicle
sUE-V Slant height between UE and vehicle pV-V Transmit power of vehicle to vehicle
sV-eNB Slant height between vehicle and eNB pV-eNB Transmit power of vehicle to eNB
dmax Max. transmission range of V2V
communication
TUE-eNB Transmission delay from UE to eNB
TV-eNB Transmission delay from vehicle to
eNB
TUE-V Transmission delay from UE to vehicle
Ei Energy consumed in ith
phase, iϵ{1, 2,
3}
TV-V Transmission delay from vehicle to vehicle
Figure 2. High way based system model supporting various modes data transmissions
6. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
46
In the system model (shown in Figure 2), we assume a two-way highway road (in rural areas)
where a stationary UE is at the LTE-cell edge with radius r (i.e., rUE_eNB) and the vehicles
(functioning as mobile relays) move along the road towards/away from UE at a constant velocity
v. We further assume that the UE (as an intelligent relay) is either a part of an ad-hoc network
where VoIP/video data with size M, is generated requiring for emergency services or itself a
source of data. By using relay assisted vehicles (i.e., VUE), data can be transmitted to
infrastructure based network using any three modes of transmissions.
4.1. Energy consumption in single-hop direct mode:
For calculating achievable data rate in conventional UL transmission, basic Shannon capacity
formula is stated as:
(1)
Following [17], SINR (Signal-to-Interference-Plus-Noise-Ratio) is calculated as:
(2)
where, (BER as bit error rate).
Substituting Eq. (2) in Eq. (1), the achievable data rate corresponds to transmit power is obtained
as:
(3)
where, K is a function of pd.
Hence, using Eq. (3), direct UL transmit power of UE for data rate K can be obtained as:
(4)
So, pd is a strictly monotonically increasing function of K (provided all other factors remain
constant).
Thus, overall energy consumption (Ed) in UL single-hop direct mode of transmission of UE is
formulated as:
(5)
The objective function in Eq. (5) satisfies the constraints:
(5.1)
and,
7. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
47
(5.2)
In eq. (5.1) and (5.2) ensure the power transmission and transmission delay within the range of
respective thresholds of cellular network.
As Eq. (4) is a strictly monotonic function and also , we get . Moreover,
at pmax the Ineq. (5.2) also satisfies the inequality: .
Thus, modifying Eq. (5), the objective function is reconstructed as:
(6)
subject to,
(6.1)
4.2. Energy consumption in multi-hop cellular-V2X mode
In cellular-V2X mode, data are first transmitted by UE to a nearby vehicle (i.e., relay assisted
VUE) moving towards eNB, and then receiving VUE decodes, processes, and forwards the data
to the next VUE. Thus, the transmission repeats in multi-hop until the data are forwarded by the
VUE to eNB in close proximity. Hence, overall transmission in this mode can be divided in three
following phases as shown in Figure 2.
1st
phase: As VUE is within the coverage, UE directly transmits data to VUE (which is
nothing but a V2P transmission and spanned from A1 to A2).
2nd
phase: VUEs move gradually towards/away from the eNB and transmission in this phase
is due to relaying data in a multi-hop fashion (which is nothing but a multi-hop V2V
transmission and spanned from A2 to B1).
3rd
phase: As and when eNB is in the close proximity of the VUE, the received data is directly
sent to eNB by UL transmission (which is nothing but a V2I transmission and spanned from
B1 to B2).
4.2.1. Energy consumption in 1st
phase of cellular-V2X mode
Since, UE directly uploads the data to its nearest VUE, the energy consumption (E1) in this phase
can be obtained as:
(7)
It is obvious that E1 << Ed. However, for complete transmission of data, the following constraint
should be satisfied by TUE_V.
(8)
where, sUT-V is a function of t and defined by: sUE-V = [hUE
2
+ (v.TUE-V – v.t)2
]1/2
.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
48
4.2.2. Energy consumption in 2nd
phase of the cellular-V2X mode
In this phase, each VUE transmits data to nearby VUE at each hop of entire multi-hop V2V
transmissions. To send data destined to eNB, each VUE functions as a relay for receiving and
transmitting the data unit. Hence, energy consumption (E2) in this phase is the summation of
energy consumed by each VUE of an individual hop. For simplicity, it is assumed that VUEs are
equidistant (as they are moving with uniform velocity) and data transmission time is constant for
VUE. Thus, E2 can be calculated as:
(9)
For guaranteed transmission of the message in TV-V interval at each hop of V2V transmission, the
following constraint is satisfied by TV-V, which is stated as:
(10)
4.2.3. Energy consumption in 3rd
phase of cellular-V2X mode
Like E1 in Eq. (7), the energy consumption (E3) in 3rd
phase for uploading data unit to eNB by the
VUE (in close proximity of eNB) of the entire multi-hop V2V transmission can be obtained as:
(11)
For complete transmission of the message to eNB, the transmission time (i.e., TV_eNB) of the
vehicle satisfies the following condition which is stated as:
(12)
where, sV-eNB = [heNB
2
+ w2
+ (v.TV-eNB – v.t)2
]1/2
is a function of t.
Combining Eq. (9), Eq. (11), and Eq. (13), total energy consumption in multi-hop cellular-V2X
mode can be formulated as:
(13)
In eq. (13) also satisfies the constraints, sUE_V ≤ dmax and rV-V ≤ dmax.
To obtain optimized energy consumption in cellular-V2X mode, the following inequalities are
also satisfied by In eq. (13), which are stated as:
(13.1)
(13.2)
(13.3)
4.3. Energy consumption in SCF mode
In SCF mode, UE transmits data unit to nearby VUE which is similar to 1st
phase of cellular-V2X
mode. Unlike its 2nd
phase, the receiving VUE transmits data neither to adjacent VUE nor to eNB
directly (in UL transmission). Instead, the receiving VUE stores the entire unit of data and carries
it towards eNB. Thus, energy consumption in this phase of SCF mode is zero. Like 3rd
phase of
9. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
49
cellular-V2X mode, the transceiver-VUE simply uploads the data unit to eNB in its close
proximity and thus completes the entire transmission. Overall energy consumption in this mode
depends on 1st
and 3rd
phases only. Therefore, using Eq. (7) and Eq. (11), total energy
consumption in SCF mode is obtained as:
(14)
where, In eq. (14) also satisfies the constraints (8) and (12).
4.4. Average transmission delay (UE-to-eNB)
Average respective transmission delays (D1 and D3) of 1st
phase and 3rd
phase of cellular-V2X
and SCF modes are equal and can be computed as:
and, (15)
Average respective transmission and transportation delay in 2nd
phase of cellular-V2X and SCF
modes are calculated as:
(16.1)
(16.2)
Thus, average transmission delay from UE to eNB of direct, cellular-V2X and SCF modes can be
formulated as:
(17.1)
(17.2)
(17.3)
5. RESULT ANALYSIS
The goal of this section is to evaluate the performance of single-hop direct mode, multi-hop
cellular-V2X mode, and SCF mode of UL data transmission in an LTE cell in terms of energy
consumption and average transmission delay (from UE to eNB). To optimize the metrics (i.e.,
energy and transmission delay), we use the derived equations (of section 4) and parameter values
of Table II (which are adopted from [7] and [17]) and carry out the (numerical and simulation)
results. Based on optimized metrics value, we find out the best suitable mode of transmission for
delay-sensitive applications.
Table II. Parameter Values
Parameter Value Parameter Value
r 500-1000 m pc 100 mW
M (Mbit) VoIP data: 0.5 - 3.0
Video data: 10 - 60
v 72 Km/h
Dmax (sec) 15 (VoIP), 20 (Video)
B 15 MHz dmax 200 m
Ψ -114 dBm/MHz pmax 250 mW
α 3.75 heNB 30 m
10. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
50
ω 10-2
hUE 1.5 m
BER 10-6
w 40 m
5.1. Simulation setup
Entire simulation is carried out in ns-31
version 3.0 over LTE module. Inside the LTE module, we
use LTE-Lena and LTE-D2D2
modules. To simulate the system model in LTE-V2X
environment, we explore the programs of [18]-[19] as the base model of LTE-D2D
communication, and its extension in [20] to support UE-to-Network relay operation. This
includes D2D communication over sidelink (SL) application which only supports IPv6-based
relaying feature in UE-to-Network. Data rate varies with the variation of transmission power,
controlled by LteUePhy::TxPower of UE. For simplicity, we consider six moving nodes (as
VUEs at an average speed 72 km/hr) in between UE and eNB where five nodes move in the
direction of eNB and one node moves in the reverse direction which is a typical case, seen in a
highway. The classes LteUeRrc and LteSlUeRrc2
are responsible for creating and maintaining
one-to-one direct communication via SL between every pair of UEs/VUEs. All intermediary
nodes (i.e., VUEs) are connected through the SL for providing relay services using the object
ProseHelper of the class LteSideLinkHelper2
.
To employ UDP applications, we set up UDP client-server model by adding UdpClientHelper
and UdpServerHelper classes at UE and Remote UE respectively. We also provide required set of
attributes values in the constructor such as server port number at UE etc. To send UDP-
datagrams, the object of ApplicationContainer class always remains active at UE. The
SetAttribute method of the class UdpClientHelper, sets maximum number of packets to be
transmitted, packet intervals, and maximum packet size etc. To simulate the entire system model,
we consider datagram size as 1024 bytes and packet interval as 1 msec. To support relay-assisted
cellular-V2X mode, we run the simulator for 5 sec and 22 sec for sending 185 VoIP data packets
and 3691 video data packets respectively, one after another from UE/VUEs to remote-UE.
5.2. Simulation and numerical results
Both simulation and numerical results are shown in Figure 3, Figure 4, and Figure 5. In all
figures, the simulation results are slightly higher than numerical results. This bit of deviation is
due to: 1. there is an impact of signal strength in simulation results leading higher delay and more
energy consumption. 2. an inter packet delay is set to 1 msec in simulation which causes higher
delay compared to numerical results. For SCF mode of all the figures, energy consumption and
delay in the simulation and numerical results are almost same which noticeably differ in case of
single-hop direct and multi-hop cellular-V2X modes. Table III, IV, and V explicitly show the
detailed empirical results of three modes of transmissions for VoIP and video applications.
Table III. Overall Energy Consumption W.R.T. Messaze Size
Overall energy consumption
for VoIP application
Overall energy consumption
for Video application
Message size
(Mbit)
Direct mode
(mJ)
SCF mode
(mJ)
V2X mode
(mJ)
Message size
(Mbit)
Direct mode
(mJ)
SCF mode
(mJ)
V2X mode
(mJ)
0.5 32.00 2.50 19.04 10.00 600.00 50.00 385.00
1.0 66.89 5.00 38.49 20.00 1200.00 100.00 769.00
1.5 100.34 7.50 57.93 30.00 1800.00 150.00 1158.00
1
https://www.nsnam.org/
2
https://github.com/usnistgov/psc-ns3/blob/psc-4.0/src/lte/examples/d2d-examples/lte-sl-in-covrg-relay-building.cc
11. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
51
2.0 134.89 10.00 76.98 40.00 2400.00 200.00 1543.00
2.5 169.00 12.50 96.42 50.00 3000.00 250.00 1928.00
3.0 197.00 15.10 115.87 60.00 3600.00 300.00 2313.00
Table IV. Overall Energy Consumption W.R.T. Cell Radius
Overall energy consumption
for VoIP application
Overall energy consumption
for Video application
Cell radius
(m)
Direct mode
(mJ)
SCF mode
(mJ)
V2X mode
(mJ)
Cell radius
(m)
Direct mode
(mJ)
SCF mode
(mJ)
V2X mode
(mJ)
500 90.00 7.50 57.93 500 1800.00 150.00 1158.00
600 180.00 7.50 59.27 600 3600.00 150.00 1189.00
700 321.00 7.50 61.95 700 6300.00 150.00 1243.00
800 --- 7.50 64.00 800 --- 150.00 1287.00
900 --- 7.50 70.90 900 --- 150.00 1423.00
1000 --- 7.50 74.69 1000 --- 150.00 1498.00
Table V. Overall Transmission Delay W.R.T. Cell Radius
Overall transmission delay
for VoIP application
Overall transmission delay
for Video application
Cell radius
(m)
Direct mode
(sec)
SCF mode
(sec)
V2X mode
(sec)
Cell radius
(m)
Direct mode
(sec)
SCF mode
(sec)
V2X mode
(sec)
500 0.30 25.075 0.189 500 6.00 26.50 11.50
600 0.60 30.075 0.382 600 13.00 31.50 11.78
700 1.07 35.075 0.575 700 23.42 36.05 12.26
800 --- 40.075 0.764 800 --- 41.05 12.50
900 --- 45.075 0.957 900 --- 46.05 13.30
1000 --- 50.075 1.150 1000 --- 51.05 13.62
Figure 3 demonstrates the total energy consumptions in three modes with the fixed cell radius,
500 m and 6 vehicles. It is clearly seen that energy consumption increases gradually with the
increase of message size. Being at the cell edge, UE transmits data to eNB and covers a long
distance and thus energy consumption is achieved the maximum in single-hop direct mode of
transmission. In relay-assisted multi-hop cellular-V2X mode, energy consumption depends not
only on UE but also relay-assisted VUEs moving towards eNB. As a result, cellular-V2X mode is
always comparable than other two modes. On the other hand, SCF mode internally uses V2X
transmission in first and last hops of its entire path of communication with transmission &
transportation. Since energy consumption in the intermediary hops of SCF mode is zero as
transmission is entirely stopped in this phase for carrying data, the overall energy consumption
reaches to minimum. Though SCF mode is most energy efficient, but delay sensitive applications
suffer a lot in this mode for its transportation phase.
12. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
52
Figure 3. Energy consumption w.r.t. (a) VoIP data size, and (b) video data size for r = 500 m and n = 6
Performance of three modes transmissions in terms of energy consumption w.r.t. varying cell
radius are compared in Figure 4. It is clearly seen that, overall energy consumption increases
exponentially in direct mode, almost linearly in cellular-V2X mode, and remains constant in SCF
mode with the increase of cell radius for respective average data size of VoIP and video
applications. Being at the cell edge and covering long distance, the channel gain between UE and
eNB reduces significantly, which results more transmission power and longer transmission time
in direct mode. In this mode, UE transmits data with its full battery power (i.e., 250 mW) at the
cell radius 500 m, and entire transmission stops at cell radius 700 m which is due to fully
exhausted battery power. In contrary, least power and least transmission delay are incurred at
each hop of V2V mode which results overall significant performance. On the other hand, total
energy consumption of SCF mode depends only on 1st
and 3rd
phases and thus, it is independent
of cell radius. As a consequence, SCF mode is most advantageous only in term of energy
consumption for large cell radius.
13. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
53
Figure 4. Energy consumption w.r.t. cell radius, where (a) average VoIP data size = 1.5 Mb and (b) average
video data size = 30 Mb with n = 6
Figure 5, shows the effect of cell radius on average transmission delay (from UE to eNB) of three
modes for average respective data sizes (of VoIP and video applications). Transmission delay has
a significant impact on delay-sensitive applications. Due to huge delay incurred by SCF mode,
none of the real-time applications run smoothly. On the other hand, average transmission delays
of single-hop direct and multi-hop cellular-V2X mode are always considerable (with delay
thresholds 15 sec for VoIP, and 20 sec for video applications with their respective acceptable data
rates). Irrespective type of applications, transmission delay of direct mode is much better than
cellular-V2X mode within cell radius 600 m, which is more prominent for video application (in
Fig. 4(b)). In direct mode, the entire transmission stops at the cell radius 700 m onwards as the
battery power is full exhausted, which cripples the applications running at the ends. This is due to
the maximum power allocation of UE for achieving high data rate. However, average
transmission delay of cellular-V2X mode always outperforms than direct mode beyond 600 m
cell radius. This is because of total power allocation of 6 VUEs (in our experiment) is greater
than maximum power of UE in direct mode. Thus, cellular-V2X mode is the best suitable
14. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
54
transmission mode, optimizing both overall energy and overall transmission delay for all delay
sensitive real time applications than other two because this mode exploits the relaying and
mobility features of VUEs.
From Figure 3, Figure 4, and Figure 5, the following points are derived:
Delay sensitive applications seamlessly run in direct mode satisfying conditions: cell radius <
700 m and transmission delay ≤ Dmax (which is application specific constraint).
SCF mode of transmission should be avoided for the applications with the requirement of
(soft) guaranteed latency.
Relying-based multi-hop cellular V2X mode is proved to be provided services requiring
accessibility, latency and throughput with sustainable energy consumption.
Figure 5. Average transmission delay (from UE to eNB) w.r.t. cell radius where Mavg.(VoIP) = 1.5 Mb, avg.
Mavg.(Video) = 30 Mb, Dmax(VoIP) = 15 sec, Dmax(Video) = 20 sec with n = 6
15. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
55
6. CONCLUSIONS
In this article, we consider relaying-based cellular-V2X enabled delay-sensitive model to achieve
energy-saving and low latency communication while UE transmits data from the cell edge.
Satisfying the system model, we formulate the problem for direct, cellular-V2X, and SCF mode
of transmissions with the guaranteed delay constraints of various delay sensitive applications.
Numerical results validated by ns-3, demonstrate that direct mode always consumes maximum
energy with the considerable delay, whereas least energy with maximum delay (beyond the
threshold) is always incurred in SCF mode. On contrary, cellular-V2X mode requires moderate
energy and minimum delay. Though there is always a trade-of between energy consumption and
delay, the multi-hop cellular-V2X mode is most preferable for Public Safety Networks (PSNs)
due to its moderate power with satisfactory energy-saving-low-delay requirement. Thus, the
relay-assisted cellular-V2X mode is exhaustively used in UL data transmission for real-time
applications of PSN.
7. FUTURE WORKS
The system model (used in this article) may be further enhanced to support highway scenarios in
rural as well as urban areas for analyzing the impact of relay-based LTE-V2X/5G-NR-V2X
networks for various services provided by transport protocols. Some optimal and/or opportunistic
transmission modes may also be included for providing better services.
CONFLICT OF INTEREST
Authors of the paper declare no conflict of interest in all respects.
ACKNOWLEDGEMENTS
This work is partially supported by the RUSA 2.0 project, Ref. no.: R-11/662/19, and the DST
SERB project, File no.: EEQ/2017/000563, at Jadavpur University, Kolkata, India.
REFERENCES
[1] K. Nasim and T. J. Hall, "Techniques for Offloading LTE Evolved Packet Core Traffic Using
Openflow : A Comparative Survey & Design Reference," International Journal of Computer
Networks & Communications (IJCNC), vol. 11, no. 1, pp. 109-125, Jan. 2019.
[2] N. N. Sirhan, G. L. Heileman, C. C. Lamb, "TRAFFIC OFFLOADING IMPACT ON THE
PERFORMANCE OF CHANNEL-AWARE/QOS-AWARE SCHEDULING ALGORITHMS FOR
VIDEO-APPLICATIONS OVER LTE-A HETNETS USING CARRIER AGGREGATION,"
International Journal of Computer Networks & Communications (IJCNC), vol. 7, no. 3, pp. 75-90,
May 2015.
[3] P. Kundu, M. K. Rana, B. Sardar, and D. Saha, "Finding Practicable Nesting Level in Multi-level
Nested Mobile Networks," in proc. of 2019 IEEE International Conference on Advanced Networks
and Telecommunications Systems (ANTS), pp. 1-6, Dec. 2019.
[4] P. Kundu, M. Mahata, M. K. Rana, and B. Sardar, "Improving Spectral Efficiency for Device-to-
Device Data Offloading in Underlay Cellular Networks," in proc. of 3rd
IEEE Conference on
Information and Communication Technology, pp. 1-6, Dec. 2019.
[5] M.Saimler, and S.C. Ergen, "Power Efficient Communication Interface Selection in Cellular Vehicle
to Everything Networks," in proc. of 2019 IEEE Wireless Communications and Networking
Conference (WCNC), pp. 1-6, Oct. 2019.
[6] U. Demir, C. Toker and Ö. Ekici, "Energy-Efficient Deployment of UAV in V2X Network
Considering Latency and Backhaul Issues," in proc. of 2020 IEEE International Black Sea
Conference on Communications and Networking (BlackSeaCom), 2020, pp. 1-6, May 2020.
16. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
56
[7] C. Zheng, D. Feng, S. Zhang, X. Xia, G. Qian, and G. Y. Li, "V2X-Enabled Energy-Efficient
Transmission in Cellular Networks," 2018 10th
International Conference on Wireless
Communications and Signal Processing (WCSP), pp. 1-6, Oct. 2018.
[8] M. B. Brahim, Z. H. Mir, W. Znaidi, F. Filali, and N. Hamdi, “QoS aware video transmission over
hybrid wireless network for connected vehicles,” IEEE Access, vol. 5, pp. 8313–8323, June 2017.
[9] S. E. Li, S. Xu, X. Huang, B. Cheng, and H. Peng, “Eco-departure of connected vehicles with V2X
communication at signalized intersections,” IEEE Trans. Veh. Technology, vol. 64, no. 12, pp. 5439–
5449, Dec. 2015.
[10] L. Le, A. Festag, R. Baldessari, and W. Zhang, “Vehicular wireless short range communication for
improving intersection safety,” IEEE Communication Mag., vol. 47, no. 11, pp. 104–110, Nov. 2009.
[11] B. Di, L. Song, Y. Li, and G. Y. Li, “Non-orthogonal multiple access for high-reliable and low-
latency V2X communications in 5G systems,” IEEE J. Select. Areas Communication, vol. 35, no. 10,
pp. 2383–2397, Oct. 2017.
[12] A. Masmoudi, S. Feki, K. Mnif, and F. Zarai, “A mixed traffic sharing and resource allocation for
V2X communication,” in proc. of Int. Conf. EBus. Telecommunication New York, NY, USA:
Springer, pp. 219–233, Nov. 2019.
[13] B. Coll-Perales, J. Gozalvez, and V. Friderikos, “Energy-efficient opportunistic forwarding in multi-
hop cellular networks using device-to-device communication” in Emerging Telecommunication
Technologies,” in Transactions on Emerging Telecommunications Technologies, vol. 27 , no. 2 , pp.
249-265, Feb. 2016.
[14] P. Kolios, V. Friderikos, and K. Papadaki, "Ultra Low Energy Store-Carry and Forward Relaying
within the Cell," 2009 IEEE 70th Vehicular Technology Conference Fall, pp. 1-5, Sep. 2009.
[15] B. Coll-Perales, J. Gozalvez, and V. Friderikos, "Opportunistic networking for improving the energy
efficiency of multi-hop cellular networks," in proc. of 2014 IEEE 11th
Consumer Communications
and Networking Conference (CCNC), pp. 569-574, Jan. 2014.
[16] Y. Lmoumen, Y. Ruichek, and R. Touahni,"A Cooperative Approach to Extend Cellular Coverage
via D2D Architecture based on OLSR Protocol," International Journal of Computer Networks &
Communications (IJCNC), vol. 12, no. 5, pp. 81-96, Sept. 2020.
[17] C. Zheng, D. Feng, S. Zhang, X. Xia, G. Qian, and G. Y. Li, "Energy Efficient V2X-Enabled
Communications in Cellular Networks," in IEEE Transactions on Vehicular Technology, vol. 68, no.
1, pp. 554-564, Jan. 2019.
[18] R. Rouil, F.J. Cintrón, A. Ben Mosbah, and S. Gamboa, “An LTE Device-to-Device module for ns-
3”, in proc. of the Workshop on ns-3, 15-16 June 2016, Seattle (Washington).
[19] R. Rouil, F.J. Cintrón, A. Ben Mosbah, and S. Gamboa, “Implementation and Validation of an LTE-
D2D Model for ns-3”, in proc. of the Workshop on ns-3, 13-14 June 2017, Porto (Portugal).
[20] Gamboa, S., Thanigaivel, R. and Rouil, R., “System Level Evaluation of UE-to-Network Relays in
D2D enabled LTE Networks”, in proc. 2019 IEEE 24th
International Workshop on Computer Aided
Modeling and Design of Communication Links and Networks, September 2019, Limassol (Cyprus).
17. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.1, January 2022
57
AUTHORS
Palash Kundu was born in West Bengal, India. He received his MCA degree from the
Department of Computer Science and Engineering, and ME degree in Software
Engineering from the Department of Information Technology, Jadavpur University,
Kolkata, India in 2009 and 2014 respectively. He is currently working as an Assistant
Professor in the Department of Information Technology, Jadavpur University. His
research interest includes Mobile and Wireless Communications. He published various
papers in reputed IEEE conferences.
Atunu Sarkar was born in West Bengal, India. He received his ME degree in Software
Engineering from the Department of Information Technology, Jadavpur University,
Kolkata, India in 2021. His research interest includes Mobile and Wireless
Communications. He has a keen interest in ns-3.
Bhaskar Sardar was born in West Bengal, India. He received his Ph.D., M.E, and B.E.
in 2010, 2003, and 2001 respectively from the Department of Computer Science and
Engineering, Jadavpur University, Kolkata, India. He is currently working as a Professor
in the Department of Information Technology, Jadavpur University. His research
interest includes Mobile and Wireless Communications. He published various papers in
reputed International Journals and Conferences including IEEE, Elsevier, Springer, etc.