Traffic congestion has been one of the major performance limiting factors of heterogeneous networks (HetNets). There have been several load balancing schemes put up to solve this by balancing load among base stations (BSs), but they appear to be unfeasible due to the complexity required and other unsatisfactory performance aspects. Cell range extension (CRE) has been a promising technique to overcome this challenge. In this paper, a permutation based CRE technique is proposed to find the best possible formation of bias for BSs to achieve load balance among BSs. In comparison to the baseline scheme, results depict that the suggested method attains superior performance in terms of network load balancing and average throughput. The complexity of the suggested algorithm is considerably reduced in comparison to the proposed permutation based CRE method it is further modified from.
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkIJECEIAES
In present scenario, the high speed data transmission services has pushed limits for wireless communication network capacity, at same time multimedia transmission in real-time needs provision of QoS, therefore the network capacity and small cell coverage has comes with lots of challenges. Improving the channel capacity and coverage area within the available bandwidth is necessary to provide better QoS to users, and improved channel capacity for the FCUs and MCUs in network. In this paper, we are proposing an NQHN approach that incorporate with efficient power allocation, improving the channel capacity by optimized traffic scheduling process in a small cell HetNets scenario. This work efficiently handle the interference with maintaining the user QoS and the implemented power controller uses HeNB power as per the real time based approach for macro-cell and femto-cell. Moreover, we consider the real traffic scenario to check the performance of our proposed approach with respect to existing algorithm.
QoS controlled capacity offload optimization in heterogeneous networksjournalBEEI
An efficient resource allocation mechanism in the physical layer of wireless networks ensures that resources such as bandwidth and power are used with high efficiency in spite of low delay and high edge user data rate. Microcells in the network are typically set with bias settings to artificially increase the Signal-to-Interference-Plus-Noise Ratio, thus encouraging users to offload to the microcell. However, the artificial bias settings are tedious and often suboptimal. This work presents a low complexity algorithm for maximization of network capacity with load balancing in a heterogeneous network without the need for bias setting. The small cells were deployed in a grid topology at a selected distance from macrocell to enhance network capacity through coverage overlap. User association and minimum user throughput were incorporated as constraints to enable closer simulation to real word Quality of Service requirements. The results showed that the proposed algorithm was able to maintain less than 10% user drop rate. The proposed algorithm can increase user confidence as well as maintain load balancing, maintain the scalability, and reduce power consumption of the wireless network.
Network efficiency enhancement by reactive channel state based allocation sch...IJECEIAES
Now a day the large MIMO has considered as the efficient approach to improve the spectral and energy efficiency at WMN. However, the PC is a big issue that caused by reusing similar pilot sequence at cells, which also restrict the performance of massive MIMO network. Here, we give the alternative answer, where each of UEs required allotting a channel sequences before passing the payload data, so as to avoid the channel collision of inter-cell. Our proposed protocol will ready to determine the channel collisions in distributed and scalable process, however giving unique properties of the large MIMO channels. Here we have proposed a RCSA (Reactive channel state based allocation) scheme, which will very productively work with the RAP blockers at large network of MIMO. The position of time-frequency of RAP blocks is modified in the middle of the adjacent cells, because of this design decision the RAP defend from the hardest types of interference at inter-cell. Further, to validate the performance of our proposed scheme it will be compared with other existing technique.
Load aware self organising user-centric dynamic co mp clustering for 5g networksredpel dot com
Load aware self organising user-centric dynamic co mp clustering for 5g networks
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Block diagonalization precoding and power allocation for clustering small-cel...journalBEEI
The clustering network is a solution to improve data-rate transmission in small-cells. In this case, clustering small-cells (CSCs) adopt a multiple antennas concept. The multiple antennas are used to maximize the downlink data-rate transmission at the users, but it requires precoding techniques to minimize interference among CSC users. This paper proposes a block diagonalization (BD) as a precoding technique for minimizing interference among CSC users. The performance of the BD precoding implemented on the clustering network under various numbers of small-cells. The CSC also implements a water-filling power allocation (PA-CoopWF) to distribute the available transmission power along with the CSCs antennas. To show the performance, our paper simulates two types of precoding techniques; those are the proposed BD and minimum mean square error (MMSE) in CSCs. Based on the receiver user parts under the overlapping coordination of CSCs, our method based on the BD precoding achieves considerably higher data-rate transmission compared to the MMSE precoding, especially on larger clusters. The simulation also shows that by implementing CSC with the BD in short-range distances and higher numbers of antennas, it promotes better data-rate performances compared to the MMSE precoding by 2.75 times at distance 100m and 67% at 50 antennas.
Lifetime centric load balancing mechanism in wireless sensor network based Io...IJECEIAES
Wireless sensor network (WSN) is a vital form of the underlying technology of the internet of things (IoT); WSN comprises several energy-constrained sensor nodes to monitor various physical parameters. Moreover, due to the energy constraint, load balancing plays a vital role considering the wireless sensor network as battery power. Although several clustering algorithms have been proposed for providing energy efficiency, there are chances of uneven load balancing and this causes the reduction in network lifetime as there exists inequality within the network. These scenarios occur due to the short lifetime of the cluster head. These cluster head (CH) are prime responsible for all the activity as it is also responsible for intra-cluster and inter-cluster communications. In this research work, a mechanism named lifetime centric load balancing mechanism (LCLBM) is developed that focuses on CH-selection, network design, and optimal CH distribution. Furthermore, under LCLBM, assistant cluster head (ACH) for balancing the load is developed. LCLBM is evaluated by considering the important metrics, such as energy consumption, communication overhead, number of failed nodes, and one-way delay. Further, evaluation is carried out by comparing with ES-Leach method, through the comparative analysis it is observed that the proposed model outperforms the existing model.
Energy sink-holes avoidance method based on fuzzy system in wireless sensor ...IJECEIAES
The existence of a mobile sink for gathering data significantly extends wireless sensor networks (WSNs) lifetime. In recent years, a variety of efficient rendezvous points-based sink mobility approaches has been proposed for avoiding the energy sink-holes problem nearby the sink, diminishing buffer overflow of sensors, and reducing the data latency. Nevertheless, lots of research has been carried out to sort out the energy holes problem using controllable-based sink mobility methods. However, further developments can be demonstrated and achieved on such type of mobility management system. In this paper, a well-rounded strategy involving an energy-efficient routing protocol along with a controllablebased sink mobility method is proposed to extirpate the energy sink-holes problem. This paper fused the fuzzy A-star as a routing protocol for mitigating the energy consumption during data forwarding along with a novel sink mobility method which adopted a grid partitioning system and fuzzy system that takes account of the average residual energy, sensors density, average traffic load, and sources angles to detect the optimal next location of the mobile sink. By utilizing diverse performance metrics, the empirical analysis of our proposed work showed an outstanding result as compared with fuzzy A-star protocol in the case of a static sink.
Approach to minimizing consumption of energy in wireless sensor networks IJECEIAES
The Wireless Sensor Networks (WSN) technology has benefited from a central position in the research space of future emerging networks by its diversity of applications fields and also by its optimization techniques of its various constraints, more essentially, the minimization of nodal energy consumption to increase the global network lifetime. To answer this saving energy problem, several solutions have been proposed at the protocol stack level of the WSN. In this paper, after presenting a state of the art of this technology and its conservation energy techniques at the protocol stack level, we were interested in the network layer to propose a routing solution based on a localization aspect that allows the creation of a virtual grid on the coverage area and introduces it to the two most well-known energy efficiency hierarchical routing protocols, LEACH and PEGASIS. This allowed us to minimize the energy consumption and to select the clusters heads in a deterministic way unlike LEACH which is done in a probabilistic way and also to minimize the latency in PEGASIS, by decomposing its chain into several independent chains. The simulation results, under "MATLABR2015b", have shown the efficiency of our approach in terms of overall residual energy and network lifetime.
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkIJECEIAES
In present scenario, the high speed data transmission services has pushed limits for wireless communication network capacity, at same time multimedia transmission in real-time needs provision of QoS, therefore the network capacity and small cell coverage has comes with lots of challenges. Improving the channel capacity and coverage area within the available bandwidth is necessary to provide better QoS to users, and improved channel capacity for the FCUs and MCUs in network. In this paper, we are proposing an NQHN approach that incorporate with efficient power allocation, improving the channel capacity by optimized traffic scheduling process in a small cell HetNets scenario. This work efficiently handle the interference with maintaining the user QoS and the implemented power controller uses HeNB power as per the real time based approach for macro-cell and femto-cell. Moreover, we consider the real traffic scenario to check the performance of our proposed approach with respect to existing algorithm.
QoS controlled capacity offload optimization in heterogeneous networksjournalBEEI
An efficient resource allocation mechanism in the physical layer of wireless networks ensures that resources such as bandwidth and power are used with high efficiency in spite of low delay and high edge user data rate. Microcells in the network are typically set with bias settings to artificially increase the Signal-to-Interference-Plus-Noise Ratio, thus encouraging users to offload to the microcell. However, the artificial bias settings are tedious and often suboptimal. This work presents a low complexity algorithm for maximization of network capacity with load balancing in a heterogeneous network without the need for bias setting. The small cells were deployed in a grid topology at a selected distance from macrocell to enhance network capacity through coverage overlap. User association and minimum user throughput were incorporated as constraints to enable closer simulation to real word Quality of Service requirements. The results showed that the proposed algorithm was able to maintain less than 10% user drop rate. The proposed algorithm can increase user confidence as well as maintain load balancing, maintain the scalability, and reduce power consumption of the wireless network.
Network efficiency enhancement by reactive channel state based allocation sch...IJECEIAES
Now a day the large MIMO has considered as the efficient approach to improve the spectral and energy efficiency at WMN. However, the PC is a big issue that caused by reusing similar pilot sequence at cells, which also restrict the performance of massive MIMO network. Here, we give the alternative answer, where each of UEs required allotting a channel sequences before passing the payload data, so as to avoid the channel collision of inter-cell. Our proposed protocol will ready to determine the channel collisions in distributed and scalable process, however giving unique properties of the large MIMO channels. Here we have proposed a RCSA (Reactive channel state based allocation) scheme, which will very productively work with the RAP blockers at large network of MIMO. The position of time-frequency of RAP blocks is modified in the middle of the adjacent cells, because of this design decision the RAP defend from the hardest types of interference at inter-cell. Further, to validate the performance of our proposed scheme it will be compared with other existing technique.
Load aware self organising user-centric dynamic co mp clustering for 5g networksredpel dot com
Load aware self organising user-centric dynamic co mp clustering for 5g networks
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Block diagonalization precoding and power allocation for clustering small-cel...journalBEEI
The clustering network is a solution to improve data-rate transmission in small-cells. In this case, clustering small-cells (CSCs) adopt a multiple antennas concept. The multiple antennas are used to maximize the downlink data-rate transmission at the users, but it requires precoding techniques to minimize interference among CSC users. This paper proposes a block diagonalization (BD) as a precoding technique for minimizing interference among CSC users. The performance of the BD precoding implemented on the clustering network under various numbers of small-cells. The CSC also implements a water-filling power allocation (PA-CoopWF) to distribute the available transmission power along with the CSCs antennas. To show the performance, our paper simulates two types of precoding techniques; those are the proposed BD and minimum mean square error (MMSE) in CSCs. Based on the receiver user parts under the overlapping coordination of CSCs, our method based on the BD precoding achieves considerably higher data-rate transmission compared to the MMSE precoding, especially on larger clusters. The simulation also shows that by implementing CSC with the BD in short-range distances and higher numbers of antennas, it promotes better data-rate performances compared to the MMSE precoding by 2.75 times at distance 100m and 67% at 50 antennas.
Lifetime centric load balancing mechanism in wireless sensor network based Io...IJECEIAES
Wireless sensor network (WSN) is a vital form of the underlying technology of the internet of things (IoT); WSN comprises several energy-constrained sensor nodes to monitor various physical parameters. Moreover, due to the energy constraint, load balancing plays a vital role considering the wireless sensor network as battery power. Although several clustering algorithms have been proposed for providing energy efficiency, there are chances of uneven load balancing and this causes the reduction in network lifetime as there exists inequality within the network. These scenarios occur due to the short lifetime of the cluster head. These cluster head (CH) are prime responsible for all the activity as it is also responsible for intra-cluster and inter-cluster communications. In this research work, a mechanism named lifetime centric load balancing mechanism (LCLBM) is developed that focuses on CH-selection, network design, and optimal CH distribution. Furthermore, under LCLBM, assistant cluster head (ACH) for balancing the load is developed. LCLBM is evaluated by considering the important metrics, such as energy consumption, communication overhead, number of failed nodes, and one-way delay. Further, evaluation is carried out by comparing with ES-Leach method, through the comparative analysis it is observed that the proposed model outperforms the existing model.
Energy sink-holes avoidance method based on fuzzy system in wireless sensor ...IJECEIAES
The existence of a mobile sink for gathering data significantly extends wireless sensor networks (WSNs) lifetime. In recent years, a variety of efficient rendezvous points-based sink mobility approaches has been proposed for avoiding the energy sink-holes problem nearby the sink, diminishing buffer overflow of sensors, and reducing the data latency. Nevertheless, lots of research has been carried out to sort out the energy holes problem using controllable-based sink mobility methods. However, further developments can be demonstrated and achieved on such type of mobility management system. In this paper, a well-rounded strategy involving an energy-efficient routing protocol along with a controllablebased sink mobility method is proposed to extirpate the energy sink-holes problem. This paper fused the fuzzy A-star as a routing protocol for mitigating the energy consumption during data forwarding along with a novel sink mobility method which adopted a grid partitioning system and fuzzy system that takes account of the average residual energy, sensors density, average traffic load, and sources angles to detect the optimal next location of the mobile sink. By utilizing diverse performance metrics, the empirical analysis of our proposed work showed an outstanding result as compared with fuzzy A-star protocol in the case of a static sink.
Approach to minimizing consumption of energy in wireless sensor networks IJECEIAES
The Wireless Sensor Networks (WSN) technology has benefited from a central position in the research space of future emerging networks by its diversity of applications fields and also by its optimization techniques of its various constraints, more essentially, the minimization of nodal energy consumption to increase the global network lifetime. To answer this saving energy problem, several solutions have been proposed at the protocol stack level of the WSN. In this paper, after presenting a state of the art of this technology and its conservation energy techniques at the protocol stack level, we were interested in the network layer to propose a routing solution based on a localization aspect that allows the creation of a virtual grid on the coverage area and introduces it to the two most well-known energy efficiency hierarchical routing protocols, LEACH and PEGASIS. This allowed us to minimize the energy consumption and to select the clusters heads in a deterministic way unlike LEACH which is done in a probabilistic way and also to minimize the latency in PEGASIS, by decomposing its chain into several independent chains. The simulation results, under "MATLABR2015b", have shown the efficiency of our approach in terms of overall residual energy and network lifetime.
OPTIMIZATION OF 5G VIRTUAL-CELL BASED COORDINATED MULTIPOINT NETWORKS USING D...ijwmn
Providing seamless mobility and a uniform user experience, independent of location, is an important challenge for 5G wireless networks. The combination of Coordinated Multipoint (CoMP) networks and Virtual- Cells (VCs) are expected to play an important role in achieving high throughput independent of the mobile’s location by mitigating inter-cell interference and enhancing the cell-edge user throughput. Userspecific VCs will distinguish the physical cell from a broader area where the user can roam without the need for handoff, and may communicate with any Base Station (BS) in the VC area. However, this requires rapid decision making for the formation of VCs. In this paper, a novel algorithm based on a form of Recurrent Neural Networks (RNNs) called Gated Recurrent Units (GRUs) is used for predicting the triggering condition for forming VCs via enabling Coordinated Multipoint (CoMP) transmission.
Simulation results, show that based on the sequences of Received Signal Strength (RSS) values of different mobile nodes used for training the RNN, the future RSS values from the closest three BSs can be accurately predicted using GRU, which is then used for making proactive decisions on enabling CoMP transmission and forming VCs.
OPTIMIZATION OF 5G VIRTUAL-CELL BASED COORDINATED MULTIPOINT NETWORKS USING D...ijwmn
Providing seamless mobility and a uniform user experience, independent of location, is an important challenge for 5G wireless networks. The combination of Coordinated Multipoint (CoMP) networks and Virtual- Cells (VCs) are expected to play an important role in achieving high throughput independent of the mobile’s location by mitigating inter-cell interference and enhancing the cell-edge user throughput. Userspecific VCs will distinguish the physical cell from a broader area where the user can roam without the need for handoff, and may communicate with any Base Station (BS) in the VC area. However, this requires rapid decision making for the formation of VCs. In this paper, a novel algorithm based on a form of Recurrent Neural Networks (RNNs) called Gated Recurrent Units (GRUs) is used for predicting the triggering condition for forming VCs via enabling Coordinated Multipoint (CoMP) transmission. Simulation results, show that based on the sequences of Received Signal Strength (RSS) values of different mobile nodes used for training the RNN, the future RSS values from the closest three BSs can be accurately predicted using GRU, which is then used for making proactive decisions on enabling CoMP transmission and forming VCs.
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
Relay technology promises appreciable network throughput and coverage enhancement which is required
for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing
the link performance of a relay-based WiMAX network under varying conditions. Comparison is made
between relay and direct link communication in terms of BER (Bit Error Rate), spectral efficiency and
capacity. Effect of multipath fading and user speed on performance are investigated as well. The entire
study involves a hypothetical view as well as MATLAB simulations to predict the benefit of relay
deployment. This is aimed at solving pertinent issues such as coverage holes and cell edge problems which
are associated with traditional non-relay based cellular networks.
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
Relay technology promises appreciable network throughput and coverage enhancement which is required
for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing
the link performance of a relay-based WiMAX network under varying conditions. Comparison is made
between relay and direct link communication in terms of BER (Bit Error Rate), spectral efficiency and
capacity. Effect of multipath fading and user speed on performance are investigated as well. The entire
study involves a hypothetical view as well as MATLAB simulations to predict the benefit of relay
deployment. This is aimed at solving pertinent issues such as coverage holes and cell edge problems which
are associated with traditional non-relay based cellular networks
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...IJECEIAES
Improving the network lifetime is still a vital challenge because most wireless sensor networks (WSNs) run in an unreached environment and offer almost impossible human access and tracking. Clustering is one of the most effective methods for ensuring that the relevant device process takes place to improve network scalability, decrease energy consumption and maintain an extended network lifetime. Many researches have been developed on the numerous effective clustering algorithms to address this problem. Such algorithms almost dominate on the cluster head (CH) selection and cluster formation; using the intelligent type1 fuzzy-logic (T1-FL) scheme. In this paper, we suggest an interval type2 FL (IT2-FL) methodology that assumes uncertain levels of a decision to be more efficient than the T1-FL model. It is the so-called energy-efficient interval type2 fuzzy (EEIT2-F) low energy adaptive clustering hierarchical (LEACH) protocol. The IT2-FL system depends on three inputs of the residual energy of each node, the node distance from the base station (sink node), and the centrality of each node. Accordingly, the simulation results show that the suggested clustering protocol outperforms the other existing proposals in terms of energy consumption and network lifetime.
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...cscpconf
An efficient resource allocation is one of the greatest challenges in wireless cellular
communication. The resource allocation schemes avoid wastage of resources by allocating
resources to a mobile terminal over a short period of time, providing quality of service over
wireless networks is the most stressing point for service providers. In general a high degree of
sharing is efficient, but requires service protection mechanisms to guarantee the QoS for all
services. In this paper we address the multi cell interference on overall radio resource
utilization and propose a new strategy for resource allocation in multi cell systems. we also
propose a joint management of interference within and between cells for allocation of radio
resources , Simulation results are showing that there is a significant improvement in the resource utilization so that overall network performance.
An energy aware scheme for layered chain in underwater wireless sensor networ...IJECEIAES
Extending the network lifetime is a very challenging problem that needs to be taken into account during routing data in wireless sensor networks in general and particularly in underwater wireless sensor networks (UWSN). For this purpose, the present paper proposes a multilayer chain based on genetic algorithm routing (MCGA) for routing data from nodes to the sink. This algorithm consists to create a limited number of local chains constructed by using genetic algorithm in order to obtain the shortest path between nodes; furthermore, a leader node (LN) is elected in each chain followed by constructing a global chain containing LNs. The selection of the LN in the closest chain to the sink is as follows: Initially, the closest node to sink is elected LN in this latter because all nodes have initially the same energy value; then the future selection of the LN is based on the residual energy of the nodes. LNs in the other chains are selected based on the proximity to the previous LNs. Data transmission is performed in two steps: intra-chain transmission and inter-chain transmission. Furthermore, MCGA is simulated for different scenarios of mobility and density of nodes in the networks. The performance evaluation of the proposed technique shows a considerable reduction in terms of energy consumption and network lifespan.
Interference aware resource allocation model for D2D under cellular network IJECEIAES
Device-to-Device communication (D2D) has emerged as an efficient communication model in future generation cellular network for offloading cellular traffic and enhance overall network performance. D2D communication aid in attaining better spectrum utilization, lower delay, and less energy consumption, which can well adapt to meet demand of higher transmission rate, larger network capacity. Further, enhances spectral efficiency by reutilizing resource. However, it may result in severe cross-tier interference and co-tier interference. Therefore, efficient interference modelling design are required to address performance degradation caused by the interferences. The existing model has focused on addressing interference considering D2D association operating on same cell with the cellular association. As a result, it incurs interference to the cellular user located in the same cell. However, practically D2D association in overlapping area will reutilize spectrum of multiple neighboring cells. As a result, it incurs interference in multiple cells. For overcoming research challenges, this work presented Interference Aware Resource Allocation (IARA) model for D2D under cellular network as a game theory model. This work consider a resource allocation game where base station as a contender for catering D2D resource needs under different assumptions. Experiment are conducted to evaluate performance of IARA. The outcome shows IARA attained significant performance improvement over state-of-art models in terms of sum rate (utility), successful packet transmission, revenue, and delay.
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksCSCJournals
A wireless sensor network (WSN) consists of large number of sensor nodes where each node operates by a finite battery for sensing, computing, and performing wireless communication tasks. Energy aware routing and MAC protocols were proposed to prolong the lifetime of WSNs. MAC protocols reduce energy consumption by putting the nodes into sleep mode for a relatively longer period of time; thereby minimizing collisions and idle listening time. On the other hand, efficient energy aware routing is achieved by finding the best path from the sensor nodes to the Base Sta-tion (BS) where energy consumption is minimal. In almost all solutions there is always a tradeoff between power consumption and delay reduction. This paper presents an improved hierarchical coordination for data gathering (HCDG) routing schema for WSNs based on multi-level chains formation with data aggregation. Also, this paper provides an analytical model for energy consumption in WSN to compare the performance of our proposed HCDG schema with the near optimal energy reduction methodology, PEGASIS. Our results demonstrate that the proposed routing schema provides relatively lower energy consumption with minimum delay for large scale WSNs.
Inter-cell Interference Management Technique for Multi-Cell LTE-A Network IJECEIAES
In modern cellular system such as LTE Advanced (LTE-A), frequency reuse scheme is targeted to be applied to fulfill the requirement of high capacity broadband access and high spectrum efficiency. But this kind of frequency planning may lead to the worse inter-cell interference (ICI) level experienced especially by a user located at the cell edge. Soft Frequency Reuse (SFR) is considered as an effective way to mitigate inter-cell interference and maintain capacity. We propose a power division SFR, known as multi level SFR technique to minimize ICI in a designed LTE-A network for sub-urban environment. Service area of LTE-A network was first developed to deploy particular number of eNB by using LTE network planning tools in the frequency of 1800 MHz with the use of SISO (Single Input Single Output) antennas. Coverage dimensioning and propagation consideration determine LTE-A parameters which were used in the simulation. Monte carlo simulation is executed to examine the performance of SFR for LTE-A downlink transmission to address different power ratio and traffic loads problem. Both performance of cell edge users and overall cell performance are evaluated in terms of CINR, BLER, and throughput. Performance with SFR is also compared with the classical frequency reuse one and three.
Energy efficient intelligent routing in WSN using dominant genetic algorithmIJECEIAES
In the current era of wireless sensor network development, among the various challeng- ing issues, the life enhancement has obtained the prime interest. Reason is clear and straight: the battery operated sensors do have limited period of life hence to keep the network active as much as possible, life of network should be larger. To enhance the life of the network, at different level different approaches has been applied, broadly defining the proper scheduling of sensors and defining the energy efficient communication. In this paper heuristic based energy efficient communication approch has applied. A new development in the Genetic algorithm has presented and called as Dominant Genetic algorithm to determine the optimum energy efficient routing path between sensor nodes and to define the optimal energy efficient trajectory for mobile data gathering node. Dominancy of high fitness solution has included in the Genetic algorithm because of its natural existence. The proposed solution has applied the connection oriented crossover and mutation operator to maintain the feasibility of generated solution. The proposed solution has applied with various simulation experiments under two different scenarios: in first case energy efficient routes among the sensors have explored to deliver the information from source sensor to the sink node and in second case, energy efficient route among all local data hubs for mobile data gathering node has obtained. The proposed solution performances have been analyzed quantitatively and analytically. It has observed with various experimental results that proposed method not only has delivered the better solution but also has faster convergence and high level of reliability in compared to conventional form of Genetic algorithm.
Energy efficient clustering and routing optimization model for maximizing lif...IJECEIAES
Recently, the wide adoption of WSNs (Wireless-Sensor-Networks) is been seen for provision non-real time and real-time application services such as intelligent transportation and health care monitoring, intelligent transportation etc. Provisioning these services requires energy-efficient WSN. The clustering technique is an efficient mechanism that plays a main role in reducing the energy consumption of WSN. However, the existing model is designed considering reducing energy- consumption of the sensor-device for the homogenous network. However, it incurs energy-overhead (EO) between cluster-head (CH). Further, maximizing coverage time is not considered by the existing clustering approach considering heterogeneous networks affecting lifetime performance. In order to overcome these research challenges, this work presents an energy efficient clustering and routing optimization (EECRO) model adopting cross-layer design for heterogeneous networks. The EECRO uses channel gain information from the physical layer and TDMA based communication is adopted for communication among both intra-cluster and inter-cluster communication. Further, clustering and routing optimization are presented to bring a good trade-off among minimizing the energy of CH, enhancing coverage time and maximizing the lifetime of sensor-network (SN). The experiments are conducted to estimate the performance of EECRO over the existing model. The significantperformance is attained by EECRO over the existing model in terms of minimizing routing and communication overhead and maximizing the lifetime of WSNs.
Novel evaluation framework for sensing spread spectrum in cognitive radioIJECEIAES
The cognitive radio network is designed to cater to the optimization demands of restricted spectrum availability. A review of existing literature on spectrum sensing shows that there is still a broader scope for its improvement. Therefore, this paper introduces an efficient computational framework capable of evaluating the effectiveness of the spread spectrum concept in the context of cognitive radio network in a more scalable and granular way. The proposed method introduces a dual hypothesis using a different set of dependable parameters to emphasize the detection of optimal energy for a low signal quality state over the noise. The proposed evaluation framework is benchmarked using a statistical analysis method not present in any existing approaches toward spread spectrum sensing. The simulated outcome of the study exhibits that the proposed system offers a significantly better probability of detection than the current system using a simplified evaluation scheme with multiple test parameters.
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...IJERA Editor
Cellular communications has experienced explosive growth in the past two decades. Today millions of people around the world use cellular phones. Cellular phones allow a person to make or receive a call from almost anywhere. Likewise, a person is allowed to continue the phone conversation while on the move. Cellular communications is supported by an infrastructure called a cellular network, which integrates cellular phones into the public switched telephone network. The cellular network has gone through three generations.The first generation of cellular networks is analog in nature. To accommodate more cellular phone subscribers, digital TDMA (time division multiple access) and CDMA (code division multiple access) technologies are used in the second generation (2G) to increase the network capacity. With digital technologies, digitized voice can be coded and encrypted. Therefore, the 2G cellular network is also more secure. The third generation (3G) integrates cellular phones into the Internet world by providing highspeed packet-switching data transmission in addition to circuit-switching voice transmission. The 3G cellular networks have been deployed in some parts of Asia, Europe, and the United States since 2002 and will be widely deployed in the coming years. The high increase in traffic and data rate for future generations of mobile communication systems, with simultaneous requirement for reduced power consumption, makes Multihop Cellular Networks (MCNs) an attractive technology. To exploit the potentials of MCNs a new network paradigm is proposed in this paper. In addition, a novel sequential genetic algorithm (SGA) is proposed as a heuristic approximation to reconfigure the optimum relaying topology as the network traffic changes. Network coding is used to combine the uplink and downlink transmissions, and incorporate it into the optimum bidirectional relaying with ICI awareness. Numerical results have shown that the algorithms suggested in this thesis provide significant improvement with respect to the existing results, and are expected to have significant impact in the analysis and design of future cellular networks.
Performance of symmetric and asymmetric links in wireless networks IJECEIAES
Wireless networks are designed to provide the enabling infrastructure for emerging technological advancements. The main characteristics of wireless networks are: Mobility, power constraints, high packet loss, and lower bandwidth. Nodes’ mobility is a crucial consideration for wireless networks, as nodes are moving all the time, and this may result in loss of connectivity in the network. The goal of this work is to explore the effect of replacing the generally held assumption of symmetric radii for wireless networks with asymmetric radii. This replacement may have a direct impact on the connectivity, throughput, and collision avoidance mechanism of mobile networks. The proposed replacement may also impact other mobile protocol’s functionality. In this work, we are mainly concerned with building and maintaining fully connected wireless network with the asymmetric assumption. For this extent, we propose to study the effect of the asymmetric links assumption on the network performance using extensive simulation experiments. Extensive simulation experiments were performed to measure the impact of these parameters. Finally, a resource allocation scheme for wireless networks is proposed for the dual rate scenario. The performance of the proposed framework is evaluated using simulation.
Advancement of Zone Based Energy Efficient Protocol for WSNijtsrd
The Wireless Sensor Networks WSNs is an area of emerging technology which involves numerous number of sensor nodes motes, a base station, processing power and storage. However, these have very limited power. The nodes exchange data and control messages with each other and towards the base station to fulfill a sensing and monitoring process. In present work, we have suggested a region based routing protocol for heterogeneous WSNs. In proposed technique, few motes forward data straight to the base station BS whereas other motes follow clustering method to forward data to the BS. We have employed R SEP protocol and equated with standard Low Energy adaptive clustering hierarchy LEACH and SEP protocols. Experimental outcomes exhibits that R SEP improves the lifetime of WSN and the amount of work accomplished in the network by R SEP is much more than the conventional LEACH and SEP protocols. Anita | Kirti Bhatia | Shalini Bhadola "Advancement of Zone Based Energy Efficient Protocol for WSN" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32987.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-network/32987/advancement-of-zone-based-energy-efficient-protocol-for-wsn/anita
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
More Related Content
Similar to Permutation based load balancing technique for long term evolution advanced heterogeneous networks
OPTIMIZATION OF 5G VIRTUAL-CELL BASED COORDINATED MULTIPOINT NETWORKS USING D...ijwmn
Providing seamless mobility and a uniform user experience, independent of location, is an important challenge for 5G wireless networks. The combination of Coordinated Multipoint (CoMP) networks and Virtual- Cells (VCs) are expected to play an important role in achieving high throughput independent of the mobile’s location by mitigating inter-cell interference and enhancing the cell-edge user throughput. Userspecific VCs will distinguish the physical cell from a broader area where the user can roam without the need for handoff, and may communicate with any Base Station (BS) in the VC area. However, this requires rapid decision making for the formation of VCs. In this paper, a novel algorithm based on a form of Recurrent Neural Networks (RNNs) called Gated Recurrent Units (GRUs) is used for predicting the triggering condition for forming VCs via enabling Coordinated Multipoint (CoMP) transmission.
Simulation results, show that based on the sequences of Received Signal Strength (RSS) values of different mobile nodes used for training the RNN, the future RSS values from the closest three BSs can be accurately predicted using GRU, which is then used for making proactive decisions on enabling CoMP transmission and forming VCs.
OPTIMIZATION OF 5G VIRTUAL-CELL BASED COORDINATED MULTIPOINT NETWORKS USING D...ijwmn
Providing seamless mobility and a uniform user experience, independent of location, is an important challenge for 5G wireless networks. The combination of Coordinated Multipoint (CoMP) networks and Virtual- Cells (VCs) are expected to play an important role in achieving high throughput independent of the mobile’s location by mitigating inter-cell interference and enhancing the cell-edge user throughput. Userspecific VCs will distinguish the physical cell from a broader area where the user can roam without the need for handoff, and may communicate with any Base Station (BS) in the VC area. However, this requires rapid decision making for the formation of VCs. In this paper, a novel algorithm based on a form of Recurrent Neural Networks (RNNs) called Gated Recurrent Units (GRUs) is used for predicting the triggering condition for forming VCs via enabling Coordinated Multipoint (CoMP) transmission. Simulation results, show that based on the sequences of Received Signal Strength (RSS) values of different mobile nodes used for training the RNN, the future RSS values from the closest three BSs can be accurately predicted using GRU, which is then used for making proactive decisions on enabling CoMP transmission and forming VCs.
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
Relay technology promises appreciable network throughput and coverage enhancement which is required
for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing
the link performance of a relay-based WiMAX network under varying conditions. Comparison is made
between relay and direct link communication in terms of BER (Bit Error Rate), spectral efficiency and
capacity. Effect of multipath fading and user speed on performance are investigated as well. The entire
study involves a hypothetical view as well as MATLAB simulations to predict the benefit of relay
deployment. This is aimed at solving pertinent issues such as coverage holes and cell edge problems which
are associated with traditional non-relay based cellular networks.
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
Relay technology promises appreciable network throughput and coverage enhancement which is required
for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing
the link performance of a relay-based WiMAX network under varying conditions. Comparison is made
between relay and direct link communication in terms of BER (Bit Error Rate), spectral efficiency and
capacity. Effect of multipath fading and user speed on performance are investigated as well. The entire
study involves a hypothetical view as well as MATLAB simulations to predict the benefit of relay
deployment. This is aimed at solving pertinent issues such as coverage holes and cell edge problems which
are associated with traditional non-relay based cellular networks
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...IJECEIAES
Improving the network lifetime is still a vital challenge because most wireless sensor networks (WSNs) run in an unreached environment and offer almost impossible human access and tracking. Clustering is one of the most effective methods for ensuring that the relevant device process takes place to improve network scalability, decrease energy consumption and maintain an extended network lifetime. Many researches have been developed on the numerous effective clustering algorithms to address this problem. Such algorithms almost dominate on the cluster head (CH) selection and cluster formation; using the intelligent type1 fuzzy-logic (T1-FL) scheme. In this paper, we suggest an interval type2 FL (IT2-FL) methodology that assumes uncertain levels of a decision to be more efficient than the T1-FL model. It is the so-called energy-efficient interval type2 fuzzy (EEIT2-F) low energy adaptive clustering hierarchical (LEACH) protocol. The IT2-FL system depends on three inputs of the residual energy of each node, the node distance from the base station (sink node), and the centrality of each node. Accordingly, the simulation results show that the suggested clustering protocol outperforms the other existing proposals in terms of energy consumption and network lifetime.
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...cscpconf
An efficient resource allocation is one of the greatest challenges in wireless cellular
communication. The resource allocation schemes avoid wastage of resources by allocating
resources to a mobile terminal over a short period of time, providing quality of service over
wireless networks is the most stressing point for service providers. In general a high degree of
sharing is efficient, but requires service protection mechanisms to guarantee the QoS for all
services. In this paper we address the multi cell interference on overall radio resource
utilization and propose a new strategy for resource allocation in multi cell systems. we also
propose a joint management of interference within and between cells for allocation of radio
resources , Simulation results are showing that there is a significant improvement in the resource utilization so that overall network performance.
An energy aware scheme for layered chain in underwater wireless sensor networ...IJECEIAES
Extending the network lifetime is a very challenging problem that needs to be taken into account during routing data in wireless sensor networks in general and particularly in underwater wireless sensor networks (UWSN). For this purpose, the present paper proposes a multilayer chain based on genetic algorithm routing (MCGA) for routing data from nodes to the sink. This algorithm consists to create a limited number of local chains constructed by using genetic algorithm in order to obtain the shortest path between nodes; furthermore, a leader node (LN) is elected in each chain followed by constructing a global chain containing LNs. The selection of the LN in the closest chain to the sink is as follows: Initially, the closest node to sink is elected LN in this latter because all nodes have initially the same energy value; then the future selection of the LN is based on the residual energy of the nodes. LNs in the other chains are selected based on the proximity to the previous LNs. Data transmission is performed in two steps: intra-chain transmission and inter-chain transmission. Furthermore, MCGA is simulated for different scenarios of mobility and density of nodes in the networks. The performance evaluation of the proposed technique shows a considerable reduction in terms of energy consumption and network lifespan.
Interference aware resource allocation model for D2D under cellular network IJECEIAES
Device-to-Device communication (D2D) has emerged as an efficient communication model in future generation cellular network for offloading cellular traffic and enhance overall network performance. D2D communication aid in attaining better spectrum utilization, lower delay, and less energy consumption, which can well adapt to meet demand of higher transmission rate, larger network capacity. Further, enhances spectral efficiency by reutilizing resource. However, it may result in severe cross-tier interference and co-tier interference. Therefore, efficient interference modelling design are required to address performance degradation caused by the interferences. The existing model has focused on addressing interference considering D2D association operating on same cell with the cellular association. As a result, it incurs interference to the cellular user located in the same cell. However, practically D2D association in overlapping area will reutilize spectrum of multiple neighboring cells. As a result, it incurs interference in multiple cells. For overcoming research challenges, this work presented Interference Aware Resource Allocation (IARA) model for D2D under cellular network as a game theory model. This work consider a resource allocation game where base station as a contender for catering D2D resource needs under different assumptions. Experiment are conducted to evaluate performance of IARA. The outcome shows IARA attained significant performance improvement over state-of-art models in terms of sum rate (utility), successful packet transmission, revenue, and delay.
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksCSCJournals
A wireless sensor network (WSN) consists of large number of sensor nodes where each node operates by a finite battery for sensing, computing, and performing wireless communication tasks. Energy aware routing and MAC protocols were proposed to prolong the lifetime of WSNs. MAC protocols reduce energy consumption by putting the nodes into sleep mode for a relatively longer period of time; thereby minimizing collisions and idle listening time. On the other hand, efficient energy aware routing is achieved by finding the best path from the sensor nodes to the Base Sta-tion (BS) where energy consumption is minimal. In almost all solutions there is always a tradeoff between power consumption and delay reduction. This paper presents an improved hierarchical coordination for data gathering (HCDG) routing schema for WSNs based on multi-level chains formation with data aggregation. Also, this paper provides an analytical model for energy consumption in WSN to compare the performance of our proposed HCDG schema with the near optimal energy reduction methodology, PEGASIS. Our results demonstrate that the proposed routing schema provides relatively lower energy consumption with minimum delay for large scale WSNs.
Inter-cell Interference Management Technique for Multi-Cell LTE-A Network IJECEIAES
In modern cellular system such as LTE Advanced (LTE-A), frequency reuse scheme is targeted to be applied to fulfill the requirement of high capacity broadband access and high spectrum efficiency. But this kind of frequency planning may lead to the worse inter-cell interference (ICI) level experienced especially by a user located at the cell edge. Soft Frequency Reuse (SFR) is considered as an effective way to mitigate inter-cell interference and maintain capacity. We propose a power division SFR, known as multi level SFR technique to minimize ICI in a designed LTE-A network for sub-urban environment. Service area of LTE-A network was first developed to deploy particular number of eNB by using LTE network planning tools in the frequency of 1800 MHz with the use of SISO (Single Input Single Output) antennas. Coverage dimensioning and propagation consideration determine LTE-A parameters which were used in the simulation. Monte carlo simulation is executed to examine the performance of SFR for LTE-A downlink transmission to address different power ratio and traffic loads problem. Both performance of cell edge users and overall cell performance are evaluated in terms of CINR, BLER, and throughput. Performance with SFR is also compared with the classical frequency reuse one and three.
Energy efficient intelligent routing in WSN using dominant genetic algorithmIJECEIAES
In the current era of wireless sensor network development, among the various challeng- ing issues, the life enhancement has obtained the prime interest. Reason is clear and straight: the battery operated sensors do have limited period of life hence to keep the network active as much as possible, life of network should be larger. To enhance the life of the network, at different level different approaches has been applied, broadly defining the proper scheduling of sensors and defining the energy efficient communication. In this paper heuristic based energy efficient communication approch has applied. A new development in the Genetic algorithm has presented and called as Dominant Genetic algorithm to determine the optimum energy efficient routing path between sensor nodes and to define the optimal energy efficient trajectory for mobile data gathering node. Dominancy of high fitness solution has included in the Genetic algorithm because of its natural existence. The proposed solution has applied the connection oriented crossover and mutation operator to maintain the feasibility of generated solution. The proposed solution has applied with various simulation experiments under two different scenarios: in first case energy efficient routes among the sensors have explored to deliver the information from source sensor to the sink node and in second case, energy efficient route among all local data hubs for mobile data gathering node has obtained. The proposed solution performances have been analyzed quantitatively and analytically. It has observed with various experimental results that proposed method not only has delivered the better solution but also has faster convergence and high level of reliability in compared to conventional form of Genetic algorithm.
Energy efficient clustering and routing optimization model for maximizing lif...IJECEIAES
Recently, the wide adoption of WSNs (Wireless-Sensor-Networks) is been seen for provision non-real time and real-time application services such as intelligent transportation and health care monitoring, intelligent transportation etc. Provisioning these services requires energy-efficient WSN. The clustering technique is an efficient mechanism that plays a main role in reducing the energy consumption of WSN. However, the existing model is designed considering reducing energy- consumption of the sensor-device for the homogenous network. However, it incurs energy-overhead (EO) between cluster-head (CH). Further, maximizing coverage time is not considered by the existing clustering approach considering heterogeneous networks affecting lifetime performance. In order to overcome these research challenges, this work presents an energy efficient clustering and routing optimization (EECRO) model adopting cross-layer design for heterogeneous networks. The EECRO uses channel gain information from the physical layer and TDMA based communication is adopted for communication among both intra-cluster and inter-cluster communication. Further, clustering and routing optimization are presented to bring a good trade-off among minimizing the energy of CH, enhancing coverage time and maximizing the lifetime of sensor-network (SN). The experiments are conducted to estimate the performance of EECRO over the existing model. The significantperformance is attained by EECRO over the existing model in terms of minimizing routing and communication overhead and maximizing the lifetime of WSNs.
Novel evaluation framework for sensing spread spectrum in cognitive radioIJECEIAES
The cognitive radio network is designed to cater to the optimization demands of restricted spectrum availability. A review of existing literature on spectrum sensing shows that there is still a broader scope for its improvement. Therefore, this paper introduces an efficient computational framework capable of evaluating the effectiveness of the spread spectrum concept in the context of cognitive radio network in a more scalable and granular way. The proposed method introduces a dual hypothesis using a different set of dependable parameters to emphasize the detection of optimal energy for a low signal quality state over the noise. The proposed evaluation framework is benchmarked using a statistical analysis method not present in any existing approaches toward spread spectrum sensing. The simulated outcome of the study exhibits that the proposed system offers a significantly better probability of detection than the current system using a simplified evaluation scheme with multiple test parameters.
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...IJERA Editor
Cellular communications has experienced explosive growth in the past two decades. Today millions of people around the world use cellular phones. Cellular phones allow a person to make or receive a call from almost anywhere. Likewise, a person is allowed to continue the phone conversation while on the move. Cellular communications is supported by an infrastructure called a cellular network, which integrates cellular phones into the public switched telephone network. The cellular network has gone through three generations.The first generation of cellular networks is analog in nature. To accommodate more cellular phone subscribers, digital TDMA (time division multiple access) and CDMA (code division multiple access) technologies are used in the second generation (2G) to increase the network capacity. With digital technologies, digitized voice can be coded and encrypted. Therefore, the 2G cellular network is also more secure. The third generation (3G) integrates cellular phones into the Internet world by providing highspeed packet-switching data transmission in addition to circuit-switching voice transmission. The 3G cellular networks have been deployed in some parts of Asia, Europe, and the United States since 2002 and will be widely deployed in the coming years. The high increase in traffic and data rate for future generations of mobile communication systems, with simultaneous requirement for reduced power consumption, makes Multihop Cellular Networks (MCNs) an attractive technology. To exploit the potentials of MCNs a new network paradigm is proposed in this paper. In addition, a novel sequential genetic algorithm (SGA) is proposed as a heuristic approximation to reconfigure the optimum relaying topology as the network traffic changes. Network coding is used to combine the uplink and downlink transmissions, and incorporate it into the optimum bidirectional relaying with ICI awareness. Numerical results have shown that the algorithms suggested in this thesis provide significant improvement with respect to the existing results, and are expected to have significant impact in the analysis and design of future cellular networks.
Performance of symmetric and asymmetric links in wireless networks IJECEIAES
Wireless networks are designed to provide the enabling infrastructure for emerging technological advancements. The main characteristics of wireless networks are: Mobility, power constraints, high packet loss, and lower bandwidth. Nodes’ mobility is a crucial consideration for wireless networks, as nodes are moving all the time, and this may result in loss of connectivity in the network. The goal of this work is to explore the effect of replacing the generally held assumption of symmetric radii for wireless networks with asymmetric radii. This replacement may have a direct impact on the connectivity, throughput, and collision avoidance mechanism of mobile networks. The proposed replacement may also impact other mobile protocol’s functionality. In this work, we are mainly concerned with building and maintaining fully connected wireless network with the asymmetric assumption. For this extent, we propose to study the effect of the asymmetric links assumption on the network performance using extensive simulation experiments. Extensive simulation experiments were performed to measure the impact of these parameters. Finally, a resource allocation scheme for wireless networks is proposed for the dual rate scenario. The performance of the proposed framework is evaluated using simulation.
Advancement of Zone Based Energy Efficient Protocol for WSNijtsrd
The Wireless Sensor Networks WSNs is an area of emerging technology which involves numerous number of sensor nodes motes, a base station, processing power and storage. However, these have very limited power. The nodes exchange data and control messages with each other and towards the base station to fulfill a sensing and monitoring process. In present work, we have suggested a region based routing protocol for heterogeneous WSNs. In proposed technique, few motes forward data straight to the base station BS whereas other motes follow clustering method to forward data to the BS. We have employed R SEP protocol and equated with standard Low Energy adaptive clustering hierarchy LEACH and SEP protocols. Experimental outcomes exhibits that R SEP improves the lifetime of WSN and the amount of work accomplished in the network by R SEP is much more than the conventional LEACH and SEP protocols. Anita | Kirti Bhatia | Shalini Bhadola "Advancement of Zone Based Energy Efficient Protocol for WSN" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32987.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-network/32987/advancement-of-zone-based-energy-efficient-protocol-for-wsn/anita
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Permutation based load balancing technique for long term evolution advanced heterogeneous networks
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 6, December 2022, pp. 6311~6319
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i6.pp6311-6319 6311
Journal homepage: http://ijece.iaescore.com
Permutation based load balancing technique for long term
evolution advanced heterogeneous networks
Mohammed Jaber Alam1
, Abdul Gafur2
, Syed Zahidur Rashid2
, Md. Golam Sadeque3
,
Diponkor Kundu3
, Rosni Sayed3
1
School of Engineering and Technology, Central Queensland University, Queensland, Australia
2
Department of Electronic and Telecommunication Engineering, International Islamic University Chittagong, Chattogram, Bangladesh
3
Faculty of Engineering, Pabna University of Science and Technology, Pabna, Bangladesh
Article Info ABSTRACT
Article history:
Received Sep 27, 2021
Revised Jun 10, 2022
Accepted Jul 5, 2022
Traffic congestion has been one of the major performance limiting factors of
heterogeneous networks (HetNets). There have been several load balancing
schemes put up to solve this by balancing load among base stations (BSs),
but they appear to be unfeasible due to the complexity required and other
unsatisfactory performance aspects. Cell range extension (CRE) has been a
promising technique to overcome this challenge. In this paper, a permutation
based CRE technique is proposed to find the best possible formation of bias
for BSs to achieve load balance among BSs. In comparison to the baseline
scheme, results depict that the suggested method attains superior
performance in terms of network load balancing and average throughput.
The complexity of the suggested algorithm is considerably reduced in
comparison to the proposed permutation based CRE method it is further
modified from.
Keywords:
Cell range extension
Heterogeneous network
Interference mitigation
Load balancing
Long term evolution advanced
This is an open access article under the CC BY-SA license.
Corresponding Author:
Mohammed Jaber Alam
School of Engineering and Technology, CQ University
4721, Rockhampton, Australia
Email: alam.jaber42@gmail.com
1. INTRODUCTION
To meet the flooding traffic demands, cellular networks are evolving towards heterogeneous
networks (HetNets) by deploying small base stations (SBSs), e.g., femto-cells and pico-cells, which are
different from macro base stations (MBSs) usually in terms of physical size, transmit power, simplicity of
arrangement and expense [1]. A HetNet generally contains an MBS and several small cells, which are costly
to manage and keep up. The cell edge users of a macro cell still connect to the MBS despite the availability
of small cells nearby the cell edges; because of the high transmit power of MBS, unlike SBS. Mobile users
must be effectively offloaded onto the small cell, which will improve the data rate as small BSs can provide
more resource blocks compared to the congested macro-cell. Thus, by transferring more users to the small
BSs, the load of the macro-cell can be decreased, and the MBS can better serve its users. Moreover, the load
of BSs becomes more uniformly balanced as the users are distributed fairly among the small BSs. Hence
there will be less burden on the MBS whereas the SBSs can be effectively utilized to maximize the
capacity [2], [3].
Annually, an average mobile user is projected to download around 1 terabyte (TB) of data.
Supporting this huge and fast expansion in information use and network is an amazingly overwhelming
undertaking in present 4G keen frameworks. Accordingly, for expanding limit the remote interchanges
cannot resist the urge to confront, the new difficulties of high-recurrence data transmission [4]. 5G and 6G
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6311-6319
6312
wireless communications envision smart systems with magnitudes of rise in bandwidth, wireless data rates,
connectivity, and coverage together with energy consumption. There are several methodologies in the state of
art to handle such challenges individually, but this project aims to deliver the multi-objective solution which
is unique. Special attention will be given to minimize the cost of deployment of the network to make the
research viable in practical application. The experimental study will develop a novel algorithm to achieve the
5G and 6G based smart systems [5]–[7].
In a two-stage femto-cell network, there are two sorts of disruptions: cross-tier and co-tier.
Cross-tier interference occurs when femto-cells and macro-cells use a common channel. When the physical
resource blocks (PRBs) of femto-cells and macro-cells are the same, there is interference. There has been a
lack of attention paid to the potential for interference between the electrical network and the femto-electrical
cell’s system (FUEs). Co-tier interference, on the other hand, is interference between femto-cells [8].
Femto-cells spread uniformly within the macro-cell, and as a result there is space between each of these cells,
resulting in an evenly spaced cover.
Using the same set of PRBs throughout a network of dispersed femto-cells can cause problems in
both the uplink and the downlink. Direct links, backhaul links, and access links sharing the same set of PRBs
can cause intracell interference. There is an inter-RN interruption when the same PRBs are used by two
nearby nurseries. To describe the resulting interference as “intercellular disruption”, in a macro-cell that
shares PRBs with a neighboring macro-cell will use the term “nearby macro-cell user” [9].
This project aims to solve the critical challenges to achieve smart systems of 5G and 6G network
standards. During the most recent few decades, the world has seen a continuous, yet consistent development
of versatile remote correspondences towards 2G, 3G and 4G networks. Other than this, with the consistently
expanding ubiquity of savvy gadgets, at present, all IP based long term evolution (LTE) networks have
turned into a piece of regular daily existence. As a result, user-oriented multimedia applications such as video
conferencing, high-definition video streaming, online education, e-healthcare, and online gaming are
becoming increasingly popular. These new apps are not only meeting the needs of consumers, but they are
also opening up new business opportunities for operators, allowing them to raise their revenue [10], [11].
Bias or offset values can be applied to SBSs to extend the cell range, such that the end-user will pick
the Pico base stations (PBS) because of its cell association criterion being greater than the MBS after adding
bias. However, because to the discrepancy in transmit power between MBSs and PBSs, UEs in the increased
service area of PBSs might suffer from significant interference from the MBS [12], [13]. It is therefore vital
to investigate how the bias for each SBS may be correctly established. Several research have been done on
load balancing. The link between cell load and the signal-to-interference-and-noise ratio (SINR) was not
taken into account in the research in [14]. Because each cell was merely estimated using the number of users
in each cell, this may not be the most accurate way to measure the cell’s real load. For instance, each user’s
traffic amount has a significant impact on cell load. If full queues are assumed at all base stations in a
heterogeneous network with a CRE bias, outage and throughput of the entire network are negatively affected,
according to [15]. However, as pointed out by [16]–[18], this assumption may not be accurate and has to be
modified. In this research work, a permutation-based technique is proposed to determine the best bias
formation for CRE to obtain load balance among BSs. Although this is a heuristic search, it can be used for
all the BSs with consideration to find out the permutation that gives the improved network balance index
(NBI) [19], [20].
2. SYSTEM MODEL
One MBS and several picocells at the macrocell edge servicing several customers are taken into
account in the down-link of a 3 GPP LTE-A network, as depicted in Figure 1. The total network is simulated
in accordance with TR 36.872 and assumes orthogonal frequency-division multiple access (OFDMA) with a
frequency reuse factor of one (3 GPP, 2012 b) [21]–[23] with specifications shown in Table 1. S and U
represent the sets of BSs (with s=0 denoting the MBS) and users, respectively. The available number of
sub-channels in the heterogeneous network is represented by K and full physical resource block reuse is
permitted in the heterogeneous network. bsu is stated as the association indicator where bsu=1 if user u
associates with base station s, else bsu=0. The data rate or throughput of user u obtained on a sub-channel by
base station s is modelled as Shannon’s capacity:
𝑅𝑠𝑢 = 𝐵. log(1 + 𝛶𝑠𝑢) (1)
where B is the bandwidth of a PRB and
𝛶𝑠𝑢 = (𝑃𝑠. 𝐺𝑠𝑢)/(∑ 𝑃𝑖𝐺𝑖𝑢 + 𝑃𝐴𝑊𝐺𝑁
𝑖∈𝑆|{𝑠} ) (2)
3. Int J Elec & Comp Eng ISSN: 2088-8708
Permutation based load balancing technique for long term evolution advanced … (Mohammed Jaber Alam)
6313
is the signal-to-interference-plus-noise-ratio (SINR) between base station s and user u. In (2), Ps is the
transmission power of base station s, Gsu is the gain of down-link channel between base station s and user u,
PAWGN is the additive white Gaussian noise power. Pi is the transmission power of the interfering cells other
than the transmitting BS s, Giu is their gain. It is expected that Gsu has been averaged over all physical
resource blocks in the whole channel spectrum, i.e., frequency-selective fading and rapid fading, due to the
assumption that cell selection is carried out over an extended period of time. There are no significant
differences in SINR between base station s and user u during the association time because Gsu is constant
regardless of dynamic channel fluctuations.
Figure 1. Layout of system model consisting 1 MBS, 3 PBSs and 100 users
Table 1. The performance of
Variable Power (kW)
Macro cell radius 500 m
Small cell radius 50 m
Total number of sub-channels, k 100
Sub-channel bandwidth 180 kHz
Antenna gain 5 dB
SBS transmit power 30 dBm
MBS transmit power 43 dBm
Noise power spectral density -174 dBm/Hz
User noise figure 9 dB
Shadowing standard deviation 10 dB
PBS path loss model 140.7+36.7*log10(d) dB (d [km])
MBS path loss model 128.1+36.7*log10(d) dB (d [km])
Channel Rayleigh fading
Number of trials 1000
3. METHOD
The introduced algorithm is presented in algorithm 1, serves to find the best bias of cell range
extension individually for each of these Pico base stations (PBSs) to attain load balance across the network.
The users are associated to the BSs by the best SINR received. It is assumed that the sub-channels are
distributed to the users by round-robin scheduling, to minimize the complexity in the association part and
also to study the effect of the proposed technique solely on the load balancing of the HetNets. The proposed
method is a modified version of the permutation method with reduced complexity in terms of sorting a
smaller number of formations. The bias range selected for the permutation method is from (0-20) dB
following previous literatures [24], [25]. Permutation is a basic mathematical term which helps us to sort out
all the possible formations of the variables present. Literature’s depiction of permutation as an orderly
arrangement is diverse [15].
3.1. k-permutations of n
In certain combinatorics textbooks, the term “permutation” is used as a synonym for “ordered
arrangements where no detail occurs more than once, but without the necessity of using all the components
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6311-6319
6314
from a given set. These are not variations except in exceptional circumstances; rather, they are natural
features of the ordered association subject. Certainly, this utilizes frequently takes into account of thinking
about preparations of hard and fast elements of k length taken from a given set of length n. The number of
such k permutations of n is given by the product,
𝑃(𝑛, 𝑘) = 𝑛. (𝑛 − 1)(𝑛 − 2) … (𝑛 − 𝑘 + 1) (3)
which is zero when k>n, and otherwise is equal to (4).
𝑃(𝑛, 𝑘) = 𝑛!/(𝑛 − 𝑘)! (4)
The time period combination is strongly linked to this use of the permutation word. A combination of
k-element of an n-set S is a k detail subset of S, the factors that might not be structured. by taking all the k
detail subsets of S and arranging every of them in all feasible methods we acquire all the k-diversification of
S. The quantity of k-mixtures of an n-set, C(n,k), is hence associated with the range of k-permutations of n by
means of (5).
𝐶(𝑛, 𝑘) =
𝑃(𝑛,𝑘)
𝑝(𝑘,𝑘)
=
𝑛!
(𝑛−𝑘)!∗𝑘!
(5)
3.2. Permutations with repetition
Ordered preparations of the elements of a hard and fast S of length n in which repetition is
authorized are referred to as n-tuples, however, have now and again been referred to as permutations with
repetition even though these are no longer permutations in standard. These are also known as phrases over
the alphabet S in a few contexts. If the set S has k elements, the variety of n-tuples over S is:
𝑃(𝑛, 𝑘) = 𝑘𝑛
(6)
K-tuples have no restrictions on the number of times an element or variable appears. If restrictions are placed
on the frequency of an element or variable, this component ceases to be valid.
Here, the permutation possible for 3 PBSs is provided by (10), where n is the number of PBSs and k
is the bias range. So, for 3 PBSs and (0-20) dB bias range, it becomes 213
= 9261 possible formations.
Figure 2 shows the NBI versus permutation index graph, where we can point out the best possible bias
permutation index that provides the maximum NBI. For each of the situations, like different number of users
or change of channel parameters, the permutation index needs to be found out. Due to the situation change,
the bias also needs to change to obtain the maximum network balance. Therefore, it becomes a little bit
complex and not feasible although it gives a satisfactory NBI.
Figure 2. Proposed algorithm
As there are too many permutations to sort out for each instance, the range we need to search should
be decreased. Because we need to also consider the time it consumes to enhance the network performance
along with increasing the capacity. So, it is necessary to find an idea to decrease this number of possible
formations yet achieve almost the same best possible outcome.
Therefore, the bias range has been reduced to minimize complexity. It is done by considering the
traffic load of PBSs. By both theoretical calculation and simulation, it is concluded that the more the
5. Int J Elec & Comp Eng ISSN: 2088-8708
Permutation based load balancing technique for long term evolution advanced … (Mohammed Jaber Alam)
6315
deviation of users associated with PBS away from 10% of total users, the NBI drops. As we can see from
Figure 3, the permutation index has become 180 which was 9,261 in normal permutation that indicates a
considerable complexity reduction. To study this, we need to see through:
𝑁𝐵𝐼 = 1 −
|𝑒−𝑎|
2∗𝑁
(7)
where e is the expected associated number of users to the BSs. Actual user count is counted as a, and total
user count as N. We assume e to be 70% for MBS and 10% of total number of users for each of the 3 PBSs.
This is considered according to their transmission power disparity. We can observe that the closer the actual
number of PBS users to 10%, NBI comes closer to 1. From experiments as shown in Figure 4, it is seen that a
which refers to the actual number of users associated to BSs, the individual PBS’s users are around 12-15%
of total number when the NBI is maximum. At this point, the bias combination is observed to be 4-5 dB most
of the time, for (20-100) users when there are 3 PBSs. For a greater number of BSs, the bias range drops
because it needs a smaller number of users inside a further small area. This is because a greater number of
PBSs means the area is further divided. So, for 3 PBSs in our system model, the extension observed is about
200 m for 5 dB bias (40 m per bias) where we can find (12-15)% of total users to achieve maximum NBI. So,
we can conclude if 12-15% is under 250 m (50+200) of a PBS, we need to look for 5 dB as maximum bias
for it. Similarly, if 12-15% of total users are under 210 m (50+160), 4 dB is considered as maximum bias and
so on.
Figure 3. Network balance index for all the
permutations of bias as regard to proposed method
for 3 PBSs and 20 users
Figure 4. Network balance index for all the
permutations of 0-20 dB for permutation method for
3 PBSs and 20 users
4. RESULTS AND DISCUSSION
The number of users linked simultaneously to the Pico base stations and macro base station has been
depicted in Figure 5. It has been shown with regards to the different user number scenarios. The NBI versus
the number of users graph is plotted for multiple users in Figure 6. ‘No bias’ depicts that the PBSs are not
extended, and association is solely on best SINR among MBS and PBSs. For ‘fixed bias’, 12 dB has been
used referred from recent literature. The best formation of bias for permutation method has been found out
for (20-100) users and NBI is calculated. For permutation, bias range is set to 0-20 dB according to past
literature. However, for the proposed method the bias range is managed to be decreased with respect to the
traffic load. The range is 0-5 dB for proposed method. The result shows that NBI for proposed method is
better than ‘no bias’ and ‘fixed bias’ and almost similar to the permutation method. The complexity is
reduced a lot in the proposed method, which compromises for a slight drop at couple of instances.
In Figure 7, the average throughput is graphed against the number of users. At all instances, the
permutation method exceeds the baseline schemes whereas the proposed technique also performs neck to
neck with the permutation method. Again, considering the complexity of the permutation method, the
outcome of the suggested technique seems acceptable considering its feasibility. The suggested scheme
performs better than ‘no bias’ and ‘fixed bias’ in all instances. To prove that the algorithm is extendable to a
larger number of base stations, a 5-PBS system has been modelled as shown in Figure 8. Here, the number of
users, MBS and all other network parameters are kept like the original system model as used. The positions
of the PBSs are chosen randomly but fixed for all the trials.
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6311-6319
6316
Figure 5. Comparison of number of users connected
to PBS and MBS
Figure 6. NBI comparison for multiple number of
users
Figure 7. Average throughput performance for
multiple number of users
Figure 8. Layout for 1 MBS and 5 PBSs with multi-
users
The NBI for the 5-PBS model is similarly measured and compared to the same schemes as shown in
Figure 9. The performance of the permutation method is the best, but the proposed method also performs
better in some instances. In Figure 10, the average throughput performance is observed to have a similar
pattern for the permutation and proposed method. Thus, these two performs much better than the ‘no bias’
and ‘fixed bias’ method. The complexity of the proposed method is in fact much lesser than the permutation
method. From above we can observe that as we increase the number of PBSs in the same MBS area, the
maximum bias required to be searched for becomes less.
Figure 9. NBI for different number of users Figure 10. Average throughput performance for
multiple number of users
7. Int J Elec & Comp Eng ISSN: 2088-8708
Permutation based load balancing technique for long term evolution advanced … (Mohammed Jaber Alam)
6317
As a result, the complexity will also be lower because a smaller number of formations needs to be
searched whereas if the maximum bias would have been more than it would be actually not feasible. For
example, if the maximum bias needed to be searched for in 5-PBS model is 6 in place of 3, the total
formations would become 75
than 45
This trend is shown in Figure 11. Also, each of the PBS will have a less
percentage of associated users individually to achieve the load balance.
Figure 11. Trend of required maximum bias versus increasing number of PBSs
5. CONCLUSION
In this work, a permutation-based heuristic user association algorithm is suggested to locate the best
bias formation based on the cell range extension (CRE) method for heterogeneous networks. Compared to the
baseline techniques, the suggested solution outperforms them hands down, except for the initially proposed
permutation method. The modified version of the permutation method has a considerably lower complexity,
compared to initially proposed one. The proposed method is shown to be feasible, compatible, and
extendable for load balancing in HetNets.
ACKNOWLEDGEMENTS
The author wants to acknowledge the support provided by the ICT department of Bangladesh for
this work.
REFERENCES
[1] B.-J. Chang and S.-H. Liou, “Adaptive cooperative communication for maximizing reliability and reward in ultra-dense small
cells LTE-A toward 5G cellular networking,” Computer Networks, vol. 115, pp. 16–28, Mar. 2017, doi:
10.1016/j.comnet.2017.01.014.
[2] M. Agiwal, A. Roy, and N. Saxena, “Next generation 5G wireless networks: A comprehensive survey,” IEEE Communications
Surveys & Tutorials, vol. 18, no. 3, pp. 1617–1655, 2016, doi: 10.1109/COMST.2016.2532458.
[3] M. J. Alam, A. A. El-Saleh, C. K. Tan, I. Ku, Y. L. Lee, and T. C. Chuah, “Improved joint cell association and interference
mitigation for LTE-a heterogeneous networks,” in 2018 IEEE 4th International Symposium on Telecommunication Technologies
(ISTT), Nov. 2018, pp. 1–4., doi: 10.1109/ISTT.2018.8701715.
[4] Y. Chen, J. Li, Z. Lin, G. Mao, and B. Vucetic, “User association with unequal user priorities in heterogeneous cellular
networks,” IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 7374–7388, 2016, doi: 10.1109/TVT.2015.2488039.
[5] J. G. Andrews, S. Singh, Q. Ye, X. Lin, and H. S. Dhillon, “An overview of load balancing in hetnets: old myths and open
problems,” IEEE Wireless Communications, vol. 21, no. 2, pp. 18–25, Apr. 2014, doi: 10.1109/MWC.2014.6812287.
[6] H. Elshaer, M. N. Kulkarni, F. Boccardi, J. G. Andrews, and M. Dohler, “Downlink and uplink cell association with traditional
macrocells and millimeter wave small cells,” IEEE Transactions on Wireless Communications, vol. 15, no. 9, pp. 6244–6258,
Sep. 2016, doi: 10.1109/TWC.2016.2582152.
[7] Y. Huang, S. Durrani, P. Dmochowski, and X. Zhou, “A proposed network balance index for heterogeneous networks,” IEEE
Wireless Communications Letters, p. 1, 2016, doi: 10.1109/LWC.2016.2633996.
[8] H.-S. Jo, Y. J. Sang, P. Xia, and J. G. Andrews, “Heterogeneous cellular networks with flexible cell association: a comprehensive
downlink SINR analysis,” IEEE Transactions on Wireless Communications, vol. 11, no. 10, pp. 3484–3495, Oct. 2012, doi:
10.1109/TWC.2012.081612.111361.
[9] M. Kamel, W. Hamouda, and A. Youssef, “Ultra-dense networks: a survey,” IEEE Communications Surveys and Tutorials,
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6311-6319
6318
vol. 18, no. 4, pp. 2522–2545, 2016, doi: 10.1109/COMST.2016.2571730.
[10] D. Liu et al., “User association in 5G networks: a survey and an outlook,” IEEE Communications Surveys and Tutorials, vol. 18,
no. 2, pp. 1018–1044, 2016, doi: 10.1109/COMST.2016.2516538.
[11] S. Moon et al., “Cell selection and resource allocation for interference management in a macro-picocell heterogeneous network,”
Wireless Personal Communications, vol. 83, no. 3, pp. 1887–1901, Aug. 2015, doi: 10.1007/s11277-015-2489-9.
[12] E. Rakotomanana and F. Gagnon, “Optimum biasing for cell load balancing under QoS and interference management in
HetNets,” IEEE Access, vol. 4, pp. 5196–5208, 2016, doi: 10.1109/ACCESS.2016.2607702.
[13] J. Roessler, “LTE-Advanced (3GPP Rel. 12) technology introduction white paper,” White paper, Munchen: Application
Note=1MA252-Rhode and Swarz International, pp. 1–58, 2015.
[14] Y. Qi and H. Wang, “Interference-aware user association under cell sleeping for heterogeneous cloud cellular networks,” IEEE
Wireless Communications Letters, vol. 6, no. 2, pp. 242–245, Apr. 2017, doi: 10.1109/LWC.2017.2665556.
[15] R. Sedgewick, “Permutation generation methods,” ACM Computing Surveys, vol. 9, no. 2, pp. 137–164, Jun. 1977, doi:
10.1145/356689.356692.
[16] A. De Domenico, L.-F. Diez, R. Aguero, D. Ktenas, and V. Savin, “EMF-aware cell selection in heterogeneous cellular
networks,” IEEE Communications Letters, vol. 19, no. 2, pp. 271–274, Feb. 2015, doi: 10.1109/LCOMM.2014.2385094.
[17] J. Liu, R. Xie, and F. R. Yu, “Resource allocation and user association for HTTP adaptive streaming in heterogeneous cellular
networks with small cells,” China Communications, vol. 13, no. 9, pp. 1–11, Sep. 2016, doi: 10.1109/CC.2016.7582291.
[18] K. Sheikhidris, M. Y. Alias, M. Roslee, and M. J. Alam, “Throughput maximization based on user association in heterogeneous
networks,” in 2018 6th International Conference on Information and Communication Technology (ICoICT), May 2018,
pp. 34–37., doi: 10.1109/ICoICT.2018.8528793.
[19] M. A. Lema, E. Pardo, O. Galinina, S. Andreev, and M. Dohler, “Flexible dual-connectivity spectrum aggregation for decoupled
uplink and downlink access in 5G heterogeneous systems,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 11,
pp. 2851–2865, Nov. 2016, doi: 10.1109/JSAC.2016.2615185.
[20] Y. L. Lee, J. Loo, T. C. Chuah, and A. A. El-Saleh, “Multi-objective resource allocation for LTE/LTE-A femtocell/HeNB
networks using ant colony optimization,” Wireless Personal Communications, vol. 92, no. 2, pp. 565–586, Jan. 2017, doi:
10.1007/s11277-016-3557-5.
[21] Y. L. Lee, J. Loo, T. C. Chuah, and A. A. El-Saleh, “Fair resource allocation with interference mitigation and resource reuse for
LTE/LTE-A femtocell networks,” IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8203–8217, Oct. 2016, doi:
10.1109/TVT.2016.2514535.
[22] M. D. M. Hasan and S. Kwon, “Cluster-based load balancing algorithm for ultra-dense heterogeneous networks,” IEEE Access,
vol. 8, pp. 2153–2162, 2020, doi: 10.1109/ACCESS.2019.2961949.
[23] M. A. Gadam, M. A. Ahmed, C. K. Ng, N. K. Nordin, A. Sali, and F. Hashim, “Review of adaptive cell selection techniques in
LTE-Advanced heterogeneous networks,” Journal of Computer Networks and Communications, vol. 2016, pp. 1–12, 2016, doi:
10.1155/2016/7394136.
[24] M. Eguizábal and Á. Hernández, “Joint dynamic resource allocation and load balancing-cell selection in LTE-A HetNet scenarios
based on Type 1 inband relay deployments,” Computer Networks, vol. 100, pp. 90–109, May 2016, doi:
10.1016/j.comnet.2016.02.018.
[25] A. Alhammadi et al., “An intelligent spectrum handoff scheme based on multiple attribute decision making for LTE-A network,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 6, pp. 5330–5339, Dec. 2019, doi:
10.11591/ijece.v9i6.pp5330-5339.
BIOGRAPHIES OF AUTHORS
Mohammed Jaber Alam has been pursuing his PhD degree from CQ University,
Australia. He is a research fellow at the School of Engineering and Technology, CQ
University. He has completed his Master of Engineering Science by research from Multimedia
University, Malaysia in 2019. He has been a Research Scholar in the same institution for
couple of years. Previously in 2016, he has completed his Bachelor of Engineering Science
degree with distinction achieving the best CGPA among the departments from IIUC,
Bangladesh. He has authored and co-authored several publications in the field of engineering.
His research interests include wireless communication, antenna systems, electrical systems,
and semiconductor electronics fields. He can be contacted at email: alam.jaber42@gmail.com.
Abdul Gafur received the M.Sc. degree in Electrical Engineering
(Telecommunication) from Blekinge Institute of Technology, Sweden. He is currently working
as an Associate Professor in the department of Electronic and Telecommunication Engineering
(ETE) under the Faculty of Science and Engineering (FSE) of International Islamic University
Chittagong (IIUC), Bangladesh. He has contributed more than 23 technical articles in different
international journals and conferences as an author and co-author. His main research interests
include coherent optical transmission systems, free space optic and optical wireless
communication systems. He can be contacted at email:engr.abdul.gafur@gmail.com.
9. Int J Elec & Comp Eng ISSN: 2088-8708
Permutation based load balancing technique for long term evolution advanced … (Mohammed Jaber Alam)
6319
Syed Zahidur Rashid received the M.Sc. degree in Computer Science and
Engineering from Daffodil International University, Bangladesh. Previously he received the
B.Sc. degree in Computer and Communication Engineering from International Islamic
University Chittagong, Bangladesh. He is currently working as the Chairman of the
Department of Electronics and Telecommunication Engineering, Faculty of Science and
Engineering, International Islamic University Chittagong, Bangladesh. He has contributed to
numerous research articles in various international refereed journals and conferences. His main
research interests include free-space optical communications, wireless communications,
enabling technologies for IoT, and machine learning. He can be contacted at email:
szrashidcce@yahoo.com.
Md. Golam Sadeque has received B. Sc. Eng. degree in Electrical and
Electronics Engineering (EEE) from Rajshahi University of Engineering and Technology
(RUET) in 2011. He is pursuing a master of engineering science (M. Eng. Sc.) degree under
the faculty of engineering at Multimedia University. He is also working as an assistant
professor since 23 June 2015 in the department of EEE at Pabna University of Science and
Technology (PUST), Pabna-6600, Bangladesh. His research interest includes the design of
Radiofrequency power amplifier (RFPA) and Biomedical engineering. He can be contacted at
email: msadeque.eee@pust.ac.bd.
Diponkar Kundu received the Master of Engineering Science (M.Eng.Sc.)
degree from the department of Electrical Engineering of University of Malaya, Malaysia on
2015 and the B.Sc. Engineering degree from the department of Electrical and Electronic
Engineering of Khulna University of Engineering and Technology, Khulna, Bangladesh on
2009. He joined as a Lecturer in the department of Electrical and Electronic Engineering
(EEE) of Pabna University of Science and Technology (PUST), Bangladesh on 1 April 2009
and now he is serving as an Associate Professor, Department of EEE, PUST. He has published
several publications in the field of Electrical and Electronic engineering. His current research
interests are in antenna design, electronics and communication engineering. He can be
contacted at email: d.kundu.eee@gmail.com.
Rosni Sayed has completed her B.Sc. and M.Sc. Engineering Degrees from
Rajshahi University of Engineering and Technology, Bangladesh in 2012 and 2017,
respectively. She has been working as a lecturer of Pabna University of Science and
Technology (PUST), Pabna-6600, Bangladesh since 25th November, 2014. Currently she is an
Assistant Professor. She has authored and co-authored several publications in the field of
Electrical and Electronic Engineering. Her research interests include wireless communication,
Bio-medical Engineering and Control System. She can be contacted at email:
rosnisayed@gmail.com.