Cognitive radio networks emerge as a solution to fixed allocation issues and spectrum scarcity through the dynamic access to spectrum. In cognitive networks, users must make intelligent decisions based on spectrum variation and actions taken by other users. Under this dynamic, cooperative systems can significantly improve quality of service parameters. This article presents the comparative study of the multi-criteria decision-making algorithms SAW and FFAHP through four levels of cooperation (10%, 20%, 50%, 80% y 100%) established between secondary users. The results show the performance evaluation obtained through of simulations and experimental measurements. The analysis is carried out based on throughput, depending on the class of service and the type of traffic.
Generalized optimal placement of PMUs considering power system observability,...IJECEIAES
This paper presents a generalized optimal placement of Phasor Measurement Units (PMUs) considering power system observability, reliability, Communication Infrastructure (CI), and latency time associated with this CI. Moreover, the economic study for additional new data transmission paths is considered as well as the availability of predefined locations of some PMUs and the preexisting communication devices (CDs) in some buses. Two cases for the location of the Control Center Base Station (CCBS) are considered; predefined case and free selected case. The PMUs placement and their required communication network topology and channel capacity are co-optimized simultaneously. In this study, two different approaches are applied to optimize the objective function; the first approach is combined from Binary Particle Swarm Optimization-Gravitational Search Algorithm (BPSOGSA) and the Minimum Spanning Tree (MST) algorithm, while the second approach is based only on BPSOGSA. The feasibility of the proposed approaches are examined by applying it to IEEE 14-bus and IEEE 118-bus systems.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
PERFORMANCE ENHANCEMENT OF DYNAMIC CHANNEL ALLOCATION IN CELLULAR MOBILE NETW...ijcseit
In cellular mobile communication system the existing dynamic channel allocation scheme suffer from
high blocking probability and forced termination probability. To mitigate this problem, in this paper we
evaluated the performance of dynamic channel allocation scheme based on carrier-to-noise interference
ratio. In our system model, uplink power strength from a call-initiating user to the base station is
examined. This power is provided by the carrier-to-noise ratio (C/N). The channel search is conducted in
the repeated channel numbers of that cell based on the carrier-to-noise ratio so that this system provides
the low blocking probability and initiates large number of calls in dynamic channel allocation
environment. We have presented the momentous performance in blocking probability and forced
termination probability through this research.
This document provides an overview of existing multi-attribute decision making (MADM) algorithms for vertical handoff decision making in heterogeneous wireless networks. It describes several popular MADM methods used as the basis for vertical handoff decision algorithms, including simple additive weighting, multiplicative exponential weighting, technique for order preference by similarity to ideal solution, grey relational analysis, and analytic hierarchy process. For each method, it provides an example of a vertical handoff decision algorithm from literature that uses that particular MADM approach. The document concludes that vertical handoff decision algorithms based on MADM methods can help provide seamless connectivity in next generation wireless networks.
IRJET- Channel and Rate Selection in Cognitive Radio NetworkIRJET Journal
This document summarizes channel and rate selection techniques in cognitive radio networks. It discusses three main types of channel selection algorithms: fixed, hybrid, and dynamic. It also summarizes two specific techniques:
1) Using multi-armed bandits to formulate channel and rate selection as a stochastic optimization problem to maximize successful packet transmissions over time. The technique involves learning transmission probabilities on different channel-rate pairs through trials.
2) Using an upper confidence bound (UCB) algorithm for channel selection, where a secondary user selects channels based on both estimated throughput and uncertainty to balance exploitation and exploration of channels.
The document is the International Journal of Electronics and Communication Engineering & Technology (IJECET) from January 2014. It discusses a hybrid optimization method for multi-user detection in SDMA-OFDM systems that combines genetic algorithms and particle swarm optimization. This approach aims to overcome limitations of existing detection methods. The hybrid method is shown to provide better performance than minimum mean square error and maximum likelihood detection, especially when the number of users is high relative to base station antennas. The document provides details on the proposed hybrid method and compares its performance to other approaches through simulation.
In this paperwe present a low complexity user grouping algorithm for multi-user MIMO system employing opportunistic fair scheduling (OFS) and zero forcing beamforming (ZFB), and develop a framework for cross-layer resource scheduling. Given a particular subset of users and their channel conditions, the optimal beamforming scheme can be calculated. The multi-user esource scheduling problem then refers to the selection of the optimal subset of users for transmission at each time instant to maximize the total throughput of the system. The simulation result shows that the performance of resource scheduling algorithm based on user grouping method proposed in this paper is close to the optimal performance which used exhaustion method. In addition, user grouping does not affect the fairness among all users.
Spectral opportunity selection based on the hybrid algorithm AHP-ELECTRETELKOMNIKA JOURNAL
Due to an ever-growing demand for spectrum and the fast-paced developmentof wireless applications, technologies such as cognitive radio enablethe efficient use of the spectrum. The objective of the present article is todesign an algorithm capable of choosing the best channel for data transmission.It uses quantitative methods that can modify behavior by changing qualityparameters in the channel. To achieve this task, a hybrid decision-makingalgorithm is designed that combinesanalytical hierarchy process(AHP)algorithms and adjusts the weights of each channel parameter, using a prioritytable. TheElimination Et Choix Tranduisant La Realité(ELECTRE)algorithm processes the information from each channel through a weightmatrix and then delivers the most favorable result for the transmitted data. Theresults reveal that the hybrid AHP-ELECTRE algorithm has a suitableperformance, which improves the throughput rate by 14% compared to similaralternatives.
Generalized optimal placement of PMUs considering power system observability,...IJECEIAES
This paper presents a generalized optimal placement of Phasor Measurement Units (PMUs) considering power system observability, reliability, Communication Infrastructure (CI), and latency time associated with this CI. Moreover, the economic study for additional new data transmission paths is considered as well as the availability of predefined locations of some PMUs and the preexisting communication devices (CDs) in some buses. Two cases for the location of the Control Center Base Station (CCBS) are considered; predefined case and free selected case. The PMUs placement and their required communication network topology and channel capacity are co-optimized simultaneously. In this study, two different approaches are applied to optimize the objective function; the first approach is combined from Binary Particle Swarm Optimization-Gravitational Search Algorithm (BPSOGSA) and the Minimum Spanning Tree (MST) algorithm, while the second approach is based only on BPSOGSA. The feasibility of the proposed approaches are examined by applying it to IEEE 14-bus and IEEE 118-bus systems.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
PERFORMANCE ENHANCEMENT OF DYNAMIC CHANNEL ALLOCATION IN CELLULAR MOBILE NETW...ijcseit
In cellular mobile communication system the existing dynamic channel allocation scheme suffer from
high blocking probability and forced termination probability. To mitigate this problem, in this paper we
evaluated the performance of dynamic channel allocation scheme based on carrier-to-noise interference
ratio. In our system model, uplink power strength from a call-initiating user to the base station is
examined. This power is provided by the carrier-to-noise ratio (C/N). The channel search is conducted in
the repeated channel numbers of that cell based on the carrier-to-noise ratio so that this system provides
the low blocking probability and initiates large number of calls in dynamic channel allocation
environment. We have presented the momentous performance in blocking probability and forced
termination probability through this research.
This document provides an overview of existing multi-attribute decision making (MADM) algorithms for vertical handoff decision making in heterogeneous wireless networks. It describes several popular MADM methods used as the basis for vertical handoff decision algorithms, including simple additive weighting, multiplicative exponential weighting, technique for order preference by similarity to ideal solution, grey relational analysis, and analytic hierarchy process. For each method, it provides an example of a vertical handoff decision algorithm from literature that uses that particular MADM approach. The document concludes that vertical handoff decision algorithms based on MADM methods can help provide seamless connectivity in next generation wireless networks.
IRJET- Channel and Rate Selection in Cognitive Radio NetworkIRJET Journal
This document summarizes channel and rate selection techniques in cognitive radio networks. It discusses three main types of channel selection algorithms: fixed, hybrid, and dynamic. It also summarizes two specific techniques:
1) Using multi-armed bandits to formulate channel and rate selection as a stochastic optimization problem to maximize successful packet transmissions over time. The technique involves learning transmission probabilities on different channel-rate pairs through trials.
2) Using an upper confidence bound (UCB) algorithm for channel selection, where a secondary user selects channels based on both estimated throughput and uncertainty to balance exploitation and exploration of channels.
The document is the International Journal of Electronics and Communication Engineering & Technology (IJECET) from January 2014. It discusses a hybrid optimization method for multi-user detection in SDMA-OFDM systems that combines genetic algorithms and particle swarm optimization. This approach aims to overcome limitations of existing detection methods. The hybrid method is shown to provide better performance than minimum mean square error and maximum likelihood detection, especially when the number of users is high relative to base station antennas. The document provides details on the proposed hybrid method and compares its performance to other approaches through simulation.
In this paperwe present a low complexity user grouping algorithm for multi-user MIMO system employing opportunistic fair scheduling (OFS) and zero forcing beamforming (ZFB), and develop a framework for cross-layer resource scheduling. Given a particular subset of users and their channel conditions, the optimal beamforming scheme can be calculated. The multi-user esource scheduling problem then refers to the selection of the optimal subset of users for transmission at each time instant to maximize the total throughput of the system. The simulation result shows that the performance of resource scheduling algorithm based on user grouping method proposed in this paper is close to the optimal performance which used exhaustion method. In addition, user grouping does not affect the fairness among all users.
Spectral opportunity selection based on the hybrid algorithm AHP-ELECTRETELKOMNIKA JOURNAL
Due to an ever-growing demand for spectrum and the fast-paced developmentof wireless applications, technologies such as cognitive radio enablethe efficient use of the spectrum. The objective of the present article is todesign an algorithm capable of choosing the best channel for data transmission.It uses quantitative methods that can modify behavior by changing qualityparameters in the channel. To achieve this task, a hybrid decision-makingalgorithm is designed that combinesanalytical hierarchy process(AHP)algorithms and adjusts the weights of each channel parameter, using a prioritytable. TheElimination Et Choix Tranduisant La Realité(ELECTRE)algorithm processes the information from each channel through a weightmatrix and then delivers the most favorable result for the transmitted data. Theresults reveal that the hybrid AHP-ELECTRE algorithm has a suitableperformance, which improves the throughput rate by 14% compared to similaralternatives.
Cognitive radio networks enable a more efficient use of the radioelectric spectrum through dynamic access. Decentralized cognitive radio networks have gained popularity due to their advantages over centralized networks. The purpose of this article is to propose the collaboration between secondary users for cognitive Wi-Fi networks, in the form of two multi-criteria decision-making algorithms known as TOPSIS and VIKOR and assess their performance in terms of the number of failed handoffs. The comparative analysis is established under four different scenarios, according to the service class and the traffic level, within the Wi-Fi frequency band. The results show the performance evaluation obtained through simulations and experimental measurements, where the VIKOR algorithm has a better performance in terms of failed handoffs under different scenarios and collaboration levels.
Recent many works have concentrated on
dynamically turning on/off some base stations (BSs) in order to
improve energy efficiency in radio access networks (RANs). In
this survey, we broaden the research over BS switching
operations, which should competition up with traffic load
variations. The proposed method formulate the traffic variations
as a Markov decision process which should differ from dynamic
traffic loads which are still quite challenging to precisely forecast.
A reinforcement learning framework based BS switching
operation scheme was designed in order to minimize the energy
consumption of RANs. Furthermore a transfer actor-critic
algorithm (TACT) is used to speed up the ongoing learning
process, which utilizes the transferred learning expertise in
historical periods or neighboring regions. The proposed TACT
algorithm performs jumpstart and validates the feasibility of
significant energy efficiency increment.
This document discusses using the analytical hierarchy process (AHP) to select the best type of transmission line for telecommunications. Six criteria are identified for comparing fiber optic, VSAT, and microwave transmission lines: installation cost, capacity, security, immunity to noise, latency, and distance. Pairwise comparisons are made between the alternatives for each criterion. The comparisons are normalized and weighted to calculate each alternative's priority for each criterion. Consistency ratios are also calculated to validate the judgments. The AHP process aims to systematically evaluate the transmission line alternatives based on both qualitative and quantitative decision factors.
Integrative Model for Quantitative Evaluation of Selection Telecommunication ...TELKOMNIKA JOURNAL
This paper analyzes the weight of impact factors on selection the antenna places for mobile
telecommunication system in Jordan. The new technique plays a lead role in divided area and selects the
place of antennas' sites. The main objective of this research is to minimize the antenna numbers in order
to reduce the cost. Research follows flowcharting categories and stages as: The first stage aim to classify
the effective factors on the: signal radius, better position of antenna from candidate points, reserved area,
and non-preferring position. The second stage focuses on finding the effective weight of these factors on
the decision. The third stage suggest the new proposed approach by implement the MCLP and P-center
problems in linear function. The last stage has the pseudo code for the proposed approach, where the
proposed approach provides the solution that helps the planners in telecommunication industry and in
related government agencies make informed position of the antennas.
Ant-colony and nature-inspired heuristic models for NOMA systems: a reviewTELKOMNIKA JOURNAL
The increasing computational complexity in scheduling the large number of users for non-orthogonal multiple access (NOMA) system and future cellular networks lead to the need for scheduling models with relatively lower computational complexity such as heuristic models. The main objective of this paper is to conduct a concise study on ant-colony optimization (ACO) methods and potential nature-inspired heuristic models for NOMA implementation in future high-speed networks. The issues, challenges and future work of ACO and other related heuristic models in NOMA are concisely reviewed. The throughput result of the proposed ACO method is observed to be close to the maximum theoretical value and stands 44% higher than that of the existing method. This result demonstrates the effectiveness of ACO implementation for NOMA user scheduling and grouping.
Mobile positioning for location dependent services in GSM networks marwaeng
1. The document discusses methods for mobile positioning in GSM networks without requiring changes to the network or mobile devices. It proposes techniques using signal measurement data, probabilistic geometry, and path loss models.
2. Key techniques include probabilistic geometric elimination to exclude improbable areas based on cell ID, timing advance, and neighbor cell measurements. Path loss analysis and models are used to correlate actual measurements with predicted signal strengths to locate the mobile terminal.
3. The quality of position is also considered to determine the accuracy of position approximations for location-based applications and services. Both positioning accuracy and user experience are important factors for successful location-based services.
Bio-inspired route estimation in cognitive radio networks IJECEIAES
Cognitive radio is a technique that was originally created for the proper use of the radio electric spectrum due its underuse. A few methods were used to predict the network traffic to determine the occupancy of the spectrum and then use the ‘holes’ between the transmissions of primary users. The goal is to guarantee a complete transmission for the second user while not interrupting the trans-mission of primary users. This study seeks the multifractal generation of traffic for a specific radio electric spectrum as well as a bio-inspired route estimation for secondary users. It uses the MFHW algorithm to generate multifractal traces and two bio-inspired algo-rithms: Ant Colony Optimization and Max Feeding to calculate the secondary user’s path. Multifractal characteristics offer a predic-tion, which is 10% lower in comparison with the original traffic values and a complete transmission for secondary users. In fact, a hybrid strategy combining both bio-inspired algorithms promise a reduction in handoff. The purpose of this research consists on deriving future investigation in the generation of multifractal traffic and a mobility spectrum using bio-inspired algorithms.
MULTI USER DETECTOR IN CDMA USING ELLIPTIC CURVE CRYPTOGRAPHYVLSICS Design
Code division multiple access (CDMA) is used in various radio communication techniques due to its advantages. In CDMA one of the most important processes is multi user detection (MUD). There are numerous methods for MUD in CDMA, but in most of the methods, they identify the exact user but the interference signal is high. One of the methods used for MUD in CDM A is elliptic curve cryptography (ECC). Normally, the multi user detector in CDMA using elliptic curve cryptography is performed by using one prime field. In ECC method the exact user is identified and also interference signal reduces comparing with other techniques. To reduce the interference signal to very low, here propose a new technique for MUD in CDMA using ECC. The proposed technique uses multiple prime numbers for key generation. By generating key using different prime numbers using ECC, the bit error rate was very low. The results shows the performance of the proposed for reduce in bit error rate for MUD in CDMA.
This document proposes a semiblind channel estimation approach for MIMO-OFDM systems that combines training-based and blind techniques. It derives a linear prediction-based blind constraint and incorporates it into a training-based least squares cost function using a weighting factor. A perturbation analysis justifies the superiority of the semiblind solution and derives a closed-form expression for the mean square error of the blind constraint, facilitating the calculation of the optimal weighting factor. Computer simulations show the proposed semiblind approach achieves very high channel estimation accuracy compared to purely training-based or blind methods.
Q-learning vertical handover scheme in two-tier LTE-A networks IJECEIAES
The document presents a Q-learning based vertical handover scheme for two-tier LTE-A networks. It proposes using Q-learning to improve the handover decision process by taking into account the user's mobility history and environment. The key aspects of the proposed scheme are:
1) It defines the environment, agent, and states for applying Q-learning to the handover decision process between the macrocell and femtocell layers.
2) It proposes using distance and direction parameters to create a shortlist of candidate neighboring cells for handover based on the user's location and movement direction.
3) It uses a weight adjustment algorithm to select the target cell from the candidate list by considering both the
Hybrid multi objectives genetic algorithms and immigrants scheme for dynamic ...khalil IBRAHIM
the main concept of intelligent optimization techniques, artificial neural networks, and new genetic algorithms to solve the multi-objective multicast routing problems with shortest path (SP) problem that used in the addresses networks and improve all processes addressing in the wireless communications based on multi-objective optimization. The most important characteristics in mobile wireless networks is the topology dynamics and the network topology changes over time, the routing problem (SPRP) in mobile ad hoc networks (MANETs) turns out to be a dynamic optimization problem[13], the hybrid immigrants multiple-objective genetic algorithm (HIMOGAs) in the real- world are dynamic in nature, that has objective functions, constraints, and parameters, the dynamic optimization problems (DOPs) are a big challenges to evolutionary multi-objective, since any environmental change may affect the objective vector, constraints, and parameters, HIMOGA for the optimization goal is to track the moving of parameters and get a sequence of approximations solutions over time. The quantity of services (QoS) is supporting guarantee for all data traffic and getting the maximizing utilization for network, the QoS based on multicast routing offers significant challenges, and increases to use an efficient multicast routing protocol that will be able to check multicast routing and satisfying QoS constraints, The author propose to use HIMOGAs and SP algorithm to solve multicast problem that produces new generation wireless networks with immigrants schema to get high-quality solutions after each change and satisfying all objectives.
A SELECTIVE PAGING SCHEME BASED ON ACTIVITY IN CELLULAR MOBILE NETWORKS FOR R...ijwmn
This document presents a selective paging scheme based on activity for location management in cellular networks. An activity-based mobility model is used where mobile terminals move between cells according to daily activity patterns like going to work or school. A simulation is conducted with 49 cells, 100 mobile terminals, and schedules for moving between home, workplaces, colleges and fitness centers. The proposed scheme applies prediction-based selective paging at reporting centers to reduce paging cost without increasing location update cost. Simulation results are analyzed to compare the location management costs of the conventional and proposed schemes.
On the Performance Analysis of Blind Spectrum Sensing Methods for Different C...IRJET Journal
This document analyzes the performance of blind spectrum sensing methods under different communication channels. It discusses Rayleigh, Nakagami-m, Nakagami-n, and Nakagami-q fading channels in the context of a cognitive radio system using multiple-input multiple-output orthogonal frequency-division multiplexing (MIMO-OFDM). Blind eigenvalue-based detection methods are evaluated, which do not require prior knowledge of signals or noise variance. Simulations are performed in MATLAB to analyze the performance of these methods in different fading environments.
COMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES FOR OFDM SYSTEMS USING MATLABijwmn
This document compares the performance of five channel estimation techniques for OFDM systems over quasi-static channels using MATLAB simulations. The techniques evaluated are: decision directed (DD), linear interpolation, second-order interpolation, discrete Fourier transform (DFT) interpolation, and minimum mean square error (MMSE) interpolation. Simulation results show that DD channel estimation provides the lowest bit-error rate and mean square error, but has extra processing delay and is sensitive to channel variations. MMSE interpolation outperforms the other interpolation techniques.
Probability Density Functions of the Packet Length for Computer Networks With...IJCNCJournal
The research on Internet traffic classification and identification, with application on prevention of attacks
and intrusions, increased considerably in the past years. Strategies based on statistical characteristics of
the Internet traffic, that use parameters such as packet length (size) and inter-arrival time and their
probability density functions, are popular. This paper presents a new statistical modeling for packet length,
which shows that it can be modeled using a probability density function that involves a normal or a beta
distribution, according to the traffic generated by the users. The proposed functions has parameters that
depend on the type of traffic and can be used as part of an Internet traffic classification and identification
strategy. The models can be used to compare, simulate and estimate the computer network traffic, as well
as to generate synthetic traffic and estimate the packets processing capacity of Internet routers
Game-Theoretic Channel Allocation in Cognitive Radio Networks IJECEIAES
Cognitive radio networks provide dynamic spectrum access techniques to support the increase in spectrum demand. In particular, the spectrum sharing among primary and secondary users can improve spectrum utilization in unused spectrum by primary users. In this paper, we propose a novel game theoretic channel allocation framework to maximize channel utilization in cognitive radio networks. We degisn the utility function based on the cochannel interference among primary and secondary users. In addition, we embed the property of the adjacent channel intererence to consider real wireless environment. The results show that the utility function converges quickly to Nash equilibrium and achieves channel gain by up to 25 dB compared to initial assignment.
This document proposes techniques to reduce processing delay and the number of unnecessary handovers in multi-attribute decision making for network selection in heterogeneous wireless networks. It introduces three approaches - first approach eliminates networks that do not meet criteria, second approach adjusts weighting of criteria, and third approach combines the first two. Simulation results show the proposed approaches reduce processing delay compared to conventional methods, and the second approach most reduces the number of unnecessary handovers. The goal is to improve quality of connection for users by minimizing these impacts.
The document proposes an adaptive energy detection technique for spectrum sensing in cognitive radio networks. It uses an adaptive parameter ωm rather than raw energy estimates or their linear combination. This parameter is computed using an adaptive algorithm to minimize a cost function. The cost function aims to improve the deflection coefficient of the test statistic by increasing the distance between the mean values under the two hypotheses and reducing the variance. Simulation results show the proposed technique significantly outperforms other algorithms in terms of probability of miss detection for a given probability of false alarm, especially in cooperative scenarios.
This document summarizes and compares various relay selection techniques for cooperative communication systems. It begins by introducing cooperative communication and describing the basic system model involving a source, destination, and multiple relays. It then reviews seven categories of relay selection methods: 1) threshold-based techniques, 2) multiple relay beamforming, 3) cross-layer techniques, 4) distributed techniques, 5) delay-optimized techniques, 6) joint relay selection and resource optimization techniques, and 7) techniques that perform joint uplink and downlink relay selection. Each category is described and examples of approaches within that category are provided. The techniques are compared in terms of their benefits, challenges, and ability to optimize parameters such as power, throughput, and delay.
Iaetsd adaptive modulation in mimo ofdm system for4 gIaetsd Iaetsd
This paper proposes applying hybrid adaptation techniques in MIMO OFDM systems to improve spectral efficiency and reduce transmit power. It first analyzes the bit error rate of M-QAM modulation in OFDM systems with different numbers of subcarriers. Channel estimation is performed using MMSE, which estimates the channel with less error than LS. Feedback from channel estimation is then used with hybrid adaptation techniques. Simulation results show MMSE has lower MSE and symbol errors than LS estimation.
Performance evaluation of various cooperative spectrum sensing algorithms for...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
The document discusses improving quality of service in cellular base stations using femtocells. It proposes using femtocells, which are small low-power cellular base stations installed in homes or businesses, to improve coverage, capacity, and throughput. Femtocells could help reduce packet loss and congestion by closing gaps between network cells. The document reviews existing approaches like hedonic regression models and packet delivery ratio, and analyzes signal-to-noise ratios, interference, and system capacity for macro and small cells. Femtocells may enhance conventional networks by extending coverage areas and improving mobile data capacity.
Cognitive radio networks enable a more efficient use of the radioelectric spectrum through dynamic access. Decentralized cognitive radio networks have gained popularity due to their advantages over centralized networks. The purpose of this article is to propose the collaboration between secondary users for cognitive Wi-Fi networks, in the form of two multi-criteria decision-making algorithms known as TOPSIS and VIKOR and assess their performance in terms of the number of failed handoffs. The comparative analysis is established under four different scenarios, according to the service class and the traffic level, within the Wi-Fi frequency band. The results show the performance evaluation obtained through simulations and experimental measurements, where the VIKOR algorithm has a better performance in terms of failed handoffs under different scenarios and collaboration levels.
Recent many works have concentrated on
dynamically turning on/off some base stations (BSs) in order to
improve energy efficiency in radio access networks (RANs). In
this survey, we broaden the research over BS switching
operations, which should competition up with traffic load
variations. The proposed method formulate the traffic variations
as a Markov decision process which should differ from dynamic
traffic loads which are still quite challenging to precisely forecast.
A reinforcement learning framework based BS switching
operation scheme was designed in order to minimize the energy
consumption of RANs. Furthermore a transfer actor-critic
algorithm (TACT) is used to speed up the ongoing learning
process, which utilizes the transferred learning expertise in
historical periods or neighboring regions. The proposed TACT
algorithm performs jumpstart and validates the feasibility of
significant energy efficiency increment.
This document discusses using the analytical hierarchy process (AHP) to select the best type of transmission line for telecommunications. Six criteria are identified for comparing fiber optic, VSAT, and microwave transmission lines: installation cost, capacity, security, immunity to noise, latency, and distance. Pairwise comparisons are made between the alternatives for each criterion. The comparisons are normalized and weighted to calculate each alternative's priority for each criterion. Consistency ratios are also calculated to validate the judgments. The AHP process aims to systematically evaluate the transmission line alternatives based on both qualitative and quantitative decision factors.
Integrative Model for Quantitative Evaluation of Selection Telecommunication ...TELKOMNIKA JOURNAL
This paper analyzes the weight of impact factors on selection the antenna places for mobile
telecommunication system in Jordan. The new technique plays a lead role in divided area and selects the
place of antennas' sites. The main objective of this research is to minimize the antenna numbers in order
to reduce the cost. Research follows flowcharting categories and stages as: The first stage aim to classify
the effective factors on the: signal radius, better position of antenna from candidate points, reserved area,
and non-preferring position. The second stage focuses on finding the effective weight of these factors on
the decision. The third stage suggest the new proposed approach by implement the MCLP and P-center
problems in linear function. The last stage has the pseudo code for the proposed approach, where the
proposed approach provides the solution that helps the planners in telecommunication industry and in
related government agencies make informed position of the antennas.
Ant-colony and nature-inspired heuristic models for NOMA systems: a reviewTELKOMNIKA JOURNAL
The increasing computational complexity in scheduling the large number of users for non-orthogonal multiple access (NOMA) system and future cellular networks lead to the need for scheduling models with relatively lower computational complexity such as heuristic models. The main objective of this paper is to conduct a concise study on ant-colony optimization (ACO) methods and potential nature-inspired heuristic models for NOMA implementation in future high-speed networks. The issues, challenges and future work of ACO and other related heuristic models in NOMA are concisely reviewed. The throughput result of the proposed ACO method is observed to be close to the maximum theoretical value and stands 44% higher than that of the existing method. This result demonstrates the effectiveness of ACO implementation for NOMA user scheduling and grouping.
Mobile positioning for location dependent services in GSM networks marwaeng
1. The document discusses methods for mobile positioning in GSM networks without requiring changes to the network or mobile devices. It proposes techniques using signal measurement data, probabilistic geometry, and path loss models.
2. Key techniques include probabilistic geometric elimination to exclude improbable areas based on cell ID, timing advance, and neighbor cell measurements. Path loss analysis and models are used to correlate actual measurements with predicted signal strengths to locate the mobile terminal.
3. The quality of position is also considered to determine the accuracy of position approximations for location-based applications and services. Both positioning accuracy and user experience are important factors for successful location-based services.
Bio-inspired route estimation in cognitive radio networks IJECEIAES
Cognitive radio is a technique that was originally created for the proper use of the radio electric spectrum due its underuse. A few methods were used to predict the network traffic to determine the occupancy of the spectrum and then use the ‘holes’ between the transmissions of primary users. The goal is to guarantee a complete transmission for the second user while not interrupting the trans-mission of primary users. This study seeks the multifractal generation of traffic for a specific radio electric spectrum as well as a bio-inspired route estimation for secondary users. It uses the MFHW algorithm to generate multifractal traces and two bio-inspired algo-rithms: Ant Colony Optimization and Max Feeding to calculate the secondary user’s path. Multifractal characteristics offer a predic-tion, which is 10% lower in comparison with the original traffic values and a complete transmission for secondary users. In fact, a hybrid strategy combining both bio-inspired algorithms promise a reduction in handoff. The purpose of this research consists on deriving future investigation in the generation of multifractal traffic and a mobility spectrum using bio-inspired algorithms.
MULTI USER DETECTOR IN CDMA USING ELLIPTIC CURVE CRYPTOGRAPHYVLSICS Design
Code division multiple access (CDMA) is used in various radio communication techniques due to its advantages. In CDMA one of the most important processes is multi user detection (MUD). There are numerous methods for MUD in CDMA, but in most of the methods, they identify the exact user but the interference signal is high. One of the methods used for MUD in CDM A is elliptic curve cryptography (ECC). Normally, the multi user detector in CDMA using elliptic curve cryptography is performed by using one prime field. In ECC method the exact user is identified and also interference signal reduces comparing with other techniques. To reduce the interference signal to very low, here propose a new technique for MUD in CDMA using ECC. The proposed technique uses multiple prime numbers for key generation. By generating key using different prime numbers using ECC, the bit error rate was very low. The results shows the performance of the proposed for reduce in bit error rate for MUD in CDMA.
This document proposes a semiblind channel estimation approach for MIMO-OFDM systems that combines training-based and blind techniques. It derives a linear prediction-based blind constraint and incorporates it into a training-based least squares cost function using a weighting factor. A perturbation analysis justifies the superiority of the semiblind solution and derives a closed-form expression for the mean square error of the blind constraint, facilitating the calculation of the optimal weighting factor. Computer simulations show the proposed semiblind approach achieves very high channel estimation accuracy compared to purely training-based or blind methods.
Q-learning vertical handover scheme in two-tier LTE-A networks IJECEIAES
The document presents a Q-learning based vertical handover scheme for two-tier LTE-A networks. It proposes using Q-learning to improve the handover decision process by taking into account the user's mobility history and environment. The key aspects of the proposed scheme are:
1) It defines the environment, agent, and states for applying Q-learning to the handover decision process between the macrocell and femtocell layers.
2) It proposes using distance and direction parameters to create a shortlist of candidate neighboring cells for handover based on the user's location and movement direction.
3) It uses a weight adjustment algorithm to select the target cell from the candidate list by considering both the
Hybrid multi objectives genetic algorithms and immigrants scheme for dynamic ...khalil IBRAHIM
the main concept of intelligent optimization techniques, artificial neural networks, and new genetic algorithms to solve the multi-objective multicast routing problems with shortest path (SP) problem that used in the addresses networks and improve all processes addressing in the wireless communications based on multi-objective optimization. The most important characteristics in mobile wireless networks is the topology dynamics and the network topology changes over time, the routing problem (SPRP) in mobile ad hoc networks (MANETs) turns out to be a dynamic optimization problem[13], the hybrid immigrants multiple-objective genetic algorithm (HIMOGAs) in the real- world are dynamic in nature, that has objective functions, constraints, and parameters, the dynamic optimization problems (DOPs) are a big challenges to evolutionary multi-objective, since any environmental change may affect the objective vector, constraints, and parameters, HIMOGA for the optimization goal is to track the moving of parameters and get a sequence of approximations solutions over time. The quantity of services (QoS) is supporting guarantee for all data traffic and getting the maximizing utilization for network, the QoS based on multicast routing offers significant challenges, and increases to use an efficient multicast routing protocol that will be able to check multicast routing and satisfying QoS constraints, The author propose to use HIMOGAs and SP algorithm to solve multicast problem that produces new generation wireless networks with immigrants schema to get high-quality solutions after each change and satisfying all objectives.
A SELECTIVE PAGING SCHEME BASED ON ACTIVITY IN CELLULAR MOBILE NETWORKS FOR R...ijwmn
This document presents a selective paging scheme based on activity for location management in cellular networks. An activity-based mobility model is used where mobile terminals move between cells according to daily activity patterns like going to work or school. A simulation is conducted with 49 cells, 100 mobile terminals, and schedules for moving between home, workplaces, colleges and fitness centers. The proposed scheme applies prediction-based selective paging at reporting centers to reduce paging cost without increasing location update cost. Simulation results are analyzed to compare the location management costs of the conventional and proposed schemes.
On the Performance Analysis of Blind Spectrum Sensing Methods for Different C...IRJET Journal
This document analyzes the performance of blind spectrum sensing methods under different communication channels. It discusses Rayleigh, Nakagami-m, Nakagami-n, and Nakagami-q fading channels in the context of a cognitive radio system using multiple-input multiple-output orthogonal frequency-division multiplexing (MIMO-OFDM). Blind eigenvalue-based detection methods are evaluated, which do not require prior knowledge of signals or noise variance. Simulations are performed in MATLAB to analyze the performance of these methods in different fading environments.
COMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES FOR OFDM SYSTEMS USING MATLABijwmn
This document compares the performance of five channel estimation techniques for OFDM systems over quasi-static channels using MATLAB simulations. The techniques evaluated are: decision directed (DD), linear interpolation, second-order interpolation, discrete Fourier transform (DFT) interpolation, and minimum mean square error (MMSE) interpolation. Simulation results show that DD channel estimation provides the lowest bit-error rate and mean square error, but has extra processing delay and is sensitive to channel variations. MMSE interpolation outperforms the other interpolation techniques.
Probability Density Functions of the Packet Length for Computer Networks With...IJCNCJournal
The research on Internet traffic classification and identification, with application on prevention of attacks
and intrusions, increased considerably in the past years. Strategies based on statistical characteristics of
the Internet traffic, that use parameters such as packet length (size) and inter-arrival time and their
probability density functions, are popular. This paper presents a new statistical modeling for packet length,
which shows that it can be modeled using a probability density function that involves a normal or a beta
distribution, according to the traffic generated by the users. The proposed functions has parameters that
depend on the type of traffic and can be used as part of an Internet traffic classification and identification
strategy. The models can be used to compare, simulate and estimate the computer network traffic, as well
as to generate synthetic traffic and estimate the packets processing capacity of Internet routers
Game-Theoretic Channel Allocation in Cognitive Radio Networks IJECEIAES
Cognitive radio networks provide dynamic spectrum access techniques to support the increase in spectrum demand. In particular, the spectrum sharing among primary and secondary users can improve spectrum utilization in unused spectrum by primary users. In this paper, we propose a novel game theoretic channel allocation framework to maximize channel utilization in cognitive radio networks. We degisn the utility function based on the cochannel interference among primary and secondary users. In addition, we embed the property of the adjacent channel intererence to consider real wireless environment. The results show that the utility function converges quickly to Nash equilibrium and achieves channel gain by up to 25 dB compared to initial assignment.
This document proposes techniques to reduce processing delay and the number of unnecessary handovers in multi-attribute decision making for network selection in heterogeneous wireless networks. It introduces three approaches - first approach eliminates networks that do not meet criteria, second approach adjusts weighting of criteria, and third approach combines the first two. Simulation results show the proposed approaches reduce processing delay compared to conventional methods, and the second approach most reduces the number of unnecessary handovers. The goal is to improve quality of connection for users by minimizing these impacts.
The document proposes an adaptive energy detection technique for spectrum sensing in cognitive radio networks. It uses an adaptive parameter ωm rather than raw energy estimates or their linear combination. This parameter is computed using an adaptive algorithm to minimize a cost function. The cost function aims to improve the deflection coefficient of the test statistic by increasing the distance between the mean values under the two hypotheses and reducing the variance. Simulation results show the proposed technique significantly outperforms other algorithms in terms of probability of miss detection for a given probability of false alarm, especially in cooperative scenarios.
This document summarizes and compares various relay selection techniques for cooperative communication systems. It begins by introducing cooperative communication and describing the basic system model involving a source, destination, and multiple relays. It then reviews seven categories of relay selection methods: 1) threshold-based techniques, 2) multiple relay beamforming, 3) cross-layer techniques, 4) distributed techniques, 5) delay-optimized techniques, 6) joint relay selection and resource optimization techniques, and 7) techniques that perform joint uplink and downlink relay selection. Each category is described and examples of approaches within that category are provided. The techniques are compared in terms of their benefits, challenges, and ability to optimize parameters such as power, throughput, and delay.
Iaetsd adaptive modulation in mimo ofdm system for4 gIaetsd Iaetsd
This paper proposes applying hybrid adaptation techniques in MIMO OFDM systems to improve spectral efficiency and reduce transmit power. It first analyzes the bit error rate of M-QAM modulation in OFDM systems with different numbers of subcarriers. Channel estimation is performed using MMSE, which estimates the channel with less error than LS. Feedback from channel estimation is then used with hybrid adaptation techniques. Simulation results show MMSE has lower MSE and symbol errors than LS estimation.
Performance evaluation of various cooperative spectrum sensing algorithms for...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
The document discusses improving quality of service in cellular base stations using femtocells. It proposes using femtocells, which are small low-power cellular base stations installed in homes or businesses, to improve coverage, capacity, and throughput. Femtocells could help reduce packet loss and congestion by closing gaps between network cells. The document reviews existing approaches like hedonic regression models and packet delivery ratio, and analyzes signal-to-noise ratios, interference, and system capacity for macro and small cells. Femtocells may enhance conventional networks by extending coverage areas and improving mobile data capacity.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
Wireless sensor networks are an innovative and rapidly advanced network occupying the broad spectrum of wireless networks. It works on the principle of “use with less expense, effort and with more comfort.” In these networks, routing provides efficient and effective data transmission between different sources to access points using the clustering technique. This work addresses the low-energy adaptive clustering hierarchy (LEACH) protocol’s main backdrop of choosing head nodes based on a random value. In this, the soft computing methods are used, namely the fuzzy approach, to overcome this barrier in LEACH. Our approach’s primary goal is to extend the network lifetime with efficient energy consumption and by choosing the appropriate head node in each cluster based on the fuzzy parameters. The proposed clustering algorithm focused on two fuzzy inference structures, namely Mamdani and Sugeno fuzzy logic models in two scenarios, respectively. We compared our approach with four existing works, the conventional LEACH, LEACH using the fuzzy method, multicriteria cluster head delegation, and fuzzy-based energy efficient clustering approach (FEECA) in wireless sensor network. The proposed scenario based fuzzy LEACH protocol approaches are better than the four existing methods regarding stability, network survivability, and energy consumption.
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
Multi-hop communication systems gained popularity in wireless communications; they can be used to
extend the coverage of the network and reduce the transmitted power. The transmission of data from the
source node to the destination node in multi-hop communications undergoes through intermediate relay
nodes. In this paper, we study the performance of multi-hop communication systems, in terms of average bit
error rate (BER) with Binary frequency shift keying assuming the κ-µ fading channel model. Due to the
difficulty in finding the probability density function (PDF) of the end-to-end signal to noise ratio (SNR) and
hence for the performance metrics, we use Gaussian Mixture (GM) approximation technique to
approximate the PDF of the end to end SNR assuming the κ-µ fading models as weighted sums of Gaussian
distributions. Numerical results are provided for the BER of binary frequency shift keying (BFSK) of
amplify and forward (AF) multi-hop communication systems assuming different values for the fading
parameters (, ) and for different number of hops. Numerical results are validated by comparing them
with simulation results.
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Kumar Goud
Abstract: - Multiple Inputs and Multiple Output (MIMO) and Orthogonal Frequency Division Multiplexing (OFDM) system have the potential to attain high capability on the propagation setting. The aim of this paper is that the adaptive resource allocation in MIMO-OFDM system uses the water filling formula. Water filling answer is enforced for allocating the ability so as to extend the data rate. The overall system capability is maximised subject to the constraints on total power, signal to noise quantitative relation, and proportionality. Channel is assumed as a flat attenuation channel and therefore the comparison is created for various 2×2, 2×3, 3×2 and 4×4 MIMO-OFDM systems and water filling formula with allotted power. Supported the capability contribution from the relaying terminal, a brand new parameter referred to as cooperation constant is introduced as an operate of the relaying sub channel. This parameter is employed to switch the target parameter of the subcarrier allocation procedure. Fairness-oriented [Fading Channel] and throughput-oriented [Near finish Channel] algorithms square measure elite from the literature to check the planned technique. Each algorithms square measure changed to use the mean of cooperation constant within the objective parameter of the subcarrier allocation procedure and shown to own a much better total turnout with none sacrifice.
Keywords - MIMO-OFDM; Water filling Algorithm; Subcarrier Resource Allocation
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line ModelIJCNCJournal
The continuous increase in the user demands fornew-generation communication systems, is making the wireless channel more complex and challenging for estimation, developing a simulation model for the channel,and evaluating the performance of different MIMO systems. In this work, a simulation model for multipath fading channels in wireless communication is performed. The model includes a selection of typical Tapped-Delay-Line channel models that can be implemented to reproduce the effects of representative channel distortion and interference. Based on the simulation results, the proposed method exhibits accurate channel estimation performance for frequency-selective fading channels. The proposed work employed LS, MMSE, and ML methods for channel estimation, using 16 and 32 pilots and fixed pilot locations in each frame. Results are obtained for 4x4, 8x8, 16x16, 16x8, and 16x4 MIMO systems and tapped delay line systems.
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line ModelIJCNCJournal
The continuous increase in the user demands fornew-generation communication systems, is making the wireless channel more complex and challenging for estimation, developing a simulation model for the channel,and evaluating the performance of different MIMO systems. In this work, a simulation model for multipath fading channels in wireless communication is performed. The model includes a selection of typical Tapped-Delay-Line channel models that can be implemented to reproduce the effects of representative channel distortion and interference. Based on the simulation results, the proposed method exhibits accurate channel estimation performance for frequency-selective fading channels. The proposed work employed LS, MMSE, and ML methods for channel estimation, using 16 and 32 pilots and fixed pilot locations in each frame. Results are obtained for 4x4, 8x8, 16x16, 16x8, and 16x4 MIMO systems and tapped delay line systems.
Cooperative ad hoc networks for energy efficient improve connectivityeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
Power conservation in Mobile Ad hoc Network (MANET) is a major challenge even today for researchers.
To conserve it various power aware routing protocols have been proposed. These protocols do not take into
consideration the residual power left in nodes. To find the impact of the same a simulator was designed in
MATLAB-7.01. The routing protocol used in our simulation is Minimum Total Power Routing (MTPR) and
different performance metrics such as path optimality, throughput and hop count were recorded in
presence and absence of power scarce node. The result shows significant impact of power scarce node on
MANET performance.
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...iosrjce
The constraint to satisfy the need of increased bandwidth requirement for high speed applications
with higher performance has been a motivation to work on Optical Orthogonal Frequency division multiplexing
(OOFDM) technique with coherent detection. We implement the coherent optical OFDM (CO-OOFDM)
technique and investigate the effect of the number of sub-carriers on performance over single mode fiber (SMF)
links. To explore improvement in performance adaptive subcarriers has been selected by assigning subcarriers
to user according to the conditions of channel. An adaptive subcarrier allocation has been investigated and
performance comparison for proportional and equal allocation has been carried over.
This document describes a hybrid Particle Swarm Optimization - Bat Algorithm (HPSO-BA) with fuzzy logic routing technique to maximize lifetime in wireless sensor networks while constraining delay. The proposed method uses HPSO-BA to optimize energy efficiency in the sensor network's shortest path trees. A fuzzy logic approach is also used to combine multiple metrics for routing decisions. Simulation results show the technique achieves a good balance between increased network lifetime and reduced end-to-end delay.
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)CSCJournals
This paper addresses Dynamic Spectrum Sharing (DSS) between two wireless operators. The Universal Mobile Telecommunication System (UMTS) network is used as a case study. The proposed protocol is evaluated under the uniform and non-uniform traffic conditions. The underlying principles of the algorithm can be deployed in the UMTS extension Band (2500MHz-2690MHz) which is yet to be allocated or the re-farmed GSM spectrum (900MHz/1800MHz). The simulation results for the proposed protocol shows that significant spectrum sharing gains can be obtained. However such spectrum efficiency gain need to be carefully balanced with the complexity in terms of latency (delays) and additional overhead it brings to the network. The results show that significant spectrum sharing gain of 4.0 % and 2.0 % can be obtained under uniform and non-uniform traffic conditions
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
Signal classification of second order cyclostationarity signals using bt scld...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Signal Classification and Identification for Cognitive Radio: A ReviewIRJET Journal
This document provides a literature review of signal classification and identification techniques for cognitive radio. It summarizes 13 research papers on topics related to signal classification, modulation classification, spectrum sensing, and the use of machine learning algorithms for cognitive radio applications. The papers evaluated techniques like energy detection, cyclostationary feature detection, statistical signal processing methods, and supervised/unsupervised machine learning algorithms. They found that machine learning generally provides better performance than traditional signal processing techniques, and that techniques like cooperative spectrum sensing can improve detection accuracy in cognitive radio networks.
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...IJCNCJournal
Carrier aggregation and integration of heterogeneous networks allow the mobile user equipment to benefit from wider bandwidth and radio coverage of different access technologies. However, these technologies have increased handoff scenario probability through user equipment’s mobility, leading to high outage probability and low throughput. Handover is an important aspect of mobility management which allows users to migrate from one cell to another without losing connections. But no lone access technology meets the requirements of providing seamless communication without loss and delay. Therefore, high-quality service continuity and reliable user equipment access to network anywhere and at any time require the
design of an appropriate handover decision algorithm. In this paper, a multi-criteria based handover decision-making algorithm is proposed to evade loss of communication and provide better performance to the system. It adaptively makes handover decisions based on different decision criteria (load, availability of resources, and the handover scenario type) in addition to signal interference to noise ratio. The multicriteria handover decision making algorithm-based method chooses among the cells that satisfy the requirements for the handover. As compared to some existing handover decision algorithms, simulation result shows that this algorithm improves system performance in terms of handover failure by 93%, 72%,
and 58%; radio link failure reduction by 77%, 43%, and 22%; and handover ping–pong by 81%, 59%, and 36% over the conventional received signal strength, received wireless transmission line, and multiinfluence factor hand over decisions respectively.
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...IJCNCJournal
Carrier aggregation and integration of heterogeneous networks allow the mobile user equipment to benefit from wider bandwidth and radio coverage of different access technologies. However, these technologies have increased handoff scenario probability through user equipment’s mobility, leading to high outage probability and low throughput. Handover is an important aspect of mobility management which allows users to migrate from one cell to another without losing connections. But no lone access technology meets the requirements of providing seamless communication without loss and delay. Therefore, high-quality service continuity and reliable user equipment access to network anywhere and at any time require the
design of an appropriate handover decision algorithm. In this paper, a multi-criteria based handover decision-making algorithm is proposed to evade loss of communication and provide better performance to the system. It adaptively makes handover decisions based on different decision criteria (load, availability of resources, and the handover scenario type) in addition to signal interference to noise ratio. The multicriteria handover decision making algorithm-based method chooses among the cells that satisfy the requirements for the handover. As compared to some existing handover decision algorithms, simulation result shows that this algorithm improves system performance in terms of handover failure by 93%, 72%,
and 58%; radio link failure reduction by 77%, 43%, and 22%; and handover ping–pong by 81%, 59%, and 36% over the conventional received signal strength, received wireless transmission line, and multiinfluence factor hand over decisions respectively.
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksEditor IJCATR
This document analyzes methods for optimal path selection and power allocation in heterogeneous wireless networks where a user can transmit data through multiple radio access technologies (RATs) simultaneously. It formulates the bandwidth and power allocation problem as an optimization problem to maximize total system capacity. The Newton and modified Newton methods are proposed to find the optimal solution. Simulation results show the modified Newton method achieves higher total system capacity compared to the Newton method.
Similar to Throughput in cooperative wireless networks (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
1. Bulletin of Electrical Engineering and Informatics
Vol. 9, No. 2, April 2020, pp. 698~706
ISSN: 2302-9285, DOI: 10.11591/eei.v9i2.2025 698
Journal homepage: http://beei.org
Throughput in cooperative wireless networks
Diego Armando Giral Ramirez, Cesar Hernandez, Fredy Martinez
Technological Faculty, Universidad Distrital Francisco Jose de Caldas, Colombia
Article Info ABSTRACT
Article history:
Received Aug 14, 2019
Revised Oct 20, 2019
Accepted Dec 29, 2019
Cognitive radio networks emerge as a solution to fixed allocation
and spectrum scarcity issues through the dynamic access of the spectrum.
In cognitive networks, users must make intelligent decisions based
on spectrum variation and actions taken by other users. Under this dynamic,
cooperative systems can significantly improve quality of service parameters.
This article presents the comparative study of the multi-criteria
decision-making algorithms SAW and FFAHP exploring five levels
of cooperation (10%, 20%, 50%, 80% y 100%) between secondary users.
The results show the performance assessment obtained through simulations
and experimental measurements. The analysis is carried out based
on throughput, depending on theclass of service and the typeof traffic.
Keywords:
Cognitive radio
GSM
MCDM
Spectral decision-making,
throughput
Wireless networks
This is an open access article under the CC BY-SA license.
Corresponding Author:
Cesar Hernandez,
Technological Faculty,
Universidad Distrital Francisco Jose de Caldas, Colombia.
Email: cahernandezs@udistrital.edu.co
1. INTRODUCTION
The growth of wireless applications proposes new challenges in the future of communication
systems [1-3]. Fixed allocation policies, the exponential growth of the demand, the scarcity
of the radioelectric spectrum and its underuse are important issues in wireless networks and have prompted
strategies for the dynamic and optimal access of the spectrum as as a solution [4]. Cognitive Radio (CR)
is a relatively new field that proposes efficient and adaptive methodologies for the dynamic allocation
of the existing radio spectrum [4]. Cognitive radio detects its environment and adjusts its operation
parameters in a dynamic and autonomous manner seeking to modify the system. Techniques based in CR
allow to maximize performance, reduce interference and facilitate interoperability [5-7].
In contrast with traditional networks, there are two types of users: the user that pays for a licensed
frequency band known as the primary user (PU) and the non-licensed user known as the secondary user (SU),
that makes an opportunistic use of the available licensed spectrum [8-9]. The purpose of a cognitive radio
network (CRN) consists on granting access to the SU to the available frequency band, without generating
interference to the PU [8-10]. This is achieved through a management model called cognitive cycle that
is characterized by four main functions: spectrum detection, spectrum decision, spectral mobility
and spectrumsharing.
The focus of this research consists on carrying out the decision-making process of a descentralized
cognitive radio system by granting the nodes the capacity to learn from the environment and proposing
strategies that allow SU to exchange information cooperatively. While multiple techniques are available
for the analysis of CR, some cooperative algorithms that are striving in cognitive structure-based
applications. CR and cooperative strategies have delivered new models for the efficient use of radio
networks. For instance, the cooperative decision-making process allows users to communicate between them
2. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Throughput in cooperative wireless networks (Diego Giral)
699
to exchange interference measurements captured locally. The goal is to harness spatial diversity relying
on the unlicensed userthat shares detection information with neighbouring users [11-12].
The proposed solution is based in cooperative CRN through the exchange of information between
SU, that can increase transmission speeds and significantly improve the quality parameters of service,
latency, throughput, reliability, signalization, PU interference, energetic efficiency, bandwidth (BW),
signal-to-noise-plus-interference-ratio (SINR) and bit error rate (BER) [13-19]. The results of this article
show the performance assessment obtained through simulations with experimental measurements
of the comparative study of two multi-criteria decision-making algorithms: SAW and FFAHP. The analysis
uses a power matrix as database, which is segmented into five levels of cooperation (10%, 20%, 50%, 80%
and 100%) between secondary users. The frequency band corresponds to the GSM technology. The analysis
is determined based on throughput according to the service class (real time-RT and better effort-BE)
and the type of traffic (high traffic-HT and low traffic-LT).
2. RESEARCH METHOD
For the comparative analysis of the decision-making multicriteria strategies, a simulator was
developed that uses an information database comprised of 551 channels. For training and validation,
the Test-Validation technique is used with an 83%-17% ratio that corresponds to 10800 training data
and 1800 validation data. This is equivalent to one hour of training and 10 minutes of assessment.
The information corresponds to real data captured in a previous metering campaign within the GSM
frequency band.
Figure 1 presents the general structure of the implemented model. The simulator includes four
processing blocks: the first one is called “Collaborative” which segments the power matrix and distributes it
among SU, the second one is the “MCDM” block that includes the mathematical models for
decision-making, the third one is the “Search Algorithm” which is a search structure in charge of simulating
and quantifying throughput characteristics.Finally, the “Figure” block builds the respective charts.
Figure 1. General structure of the model
2.1. Algorithms for spectrum allocation
Both multi-criteria decision-making algorithms (MCDM) chosen for Feedback Fuzzy Analytical
Hierarchical Process (FFAHP) and Simple Additive Weighting (SAW).
2.1.1. FFAHP
Fuzzy logic is a particularly adequate tool to make decisions in scenarios where the inputs are
generally uncertain or imprecise. In essence, the Fuzzy Analytical Hierarchical Process (FAHP) uses
the same methodology of the AHP algorithm. However, fuzzy logic is helpful in dealing with the subjectivity
and uncertainty generated during the assessment process. In the FAHP algorithm, the weight vector after
normalization is given by (1).
The Feedback FAHP (FFAHP) proposes the feedback of information taken from previous
assessments based on the FAHP method. In methods based in AHP, judgment matrices are needed to carry
out comparative assessments that determine the level of relative importance of each combined pair of criteria,
sub-criteria and alternatives independently. For instance, real time (RT) and better effort (BE) applications
have different approaches. For RT, the sub-criteria with the highest priorities are those that reduce delay,
3. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 2, April 2020 : 698 – 706
700
such as the probability of availability (PA) and the average availability time (AAT). For BE, the sub-criteria
with the highest priorities are those that increase data rates such as bandwidth (BW) and SINR.
d d
T d
1 2 n
W d ,d , ,d , , ,
n n n n
1 2
d d d
i i i
i 1 i 1 i 1
(1)
If the algorithm is using a RT application, the score for each channel is computed using (2), while (3) is used
in BE applications. Table 1 shows a description for each acronym used in (3) and (4).
0,3593 0,2966 0,1970 0,1471
Score PD TED PSINR PWA
RT (2)
0,1607 0,1523 0,3949 0,2921
Score PD TED PSINR PWA
BE (3)
Table 1. Vectors for multi-criteria analysis
Acronym Average Description
PD Availability probability Average value for eachcolumnofthe availabilitymatrix
TED Average availability time Average of consecutive values of the availability matrix
PSINR Average SINR Average value fromeach columnof theSINR without includingzeros
PWA Average bandwidth Average of each column in thebandwidth matrix
2.1.2. SAW
This algorithm develops a decision matrix that includes both criteria and alternatives. For each
intersection of the matrix, the algorithm assigns a weight according to the criteria of the designer. This allows
to establish a score for each SO assessed as well as a ranking of alternatives. The SO with the highest score is
selected through (4) [20-22] where ri,j belongs to the matrix and the sum of weights is equal to 1.
1, ,
,
1
M
u r i N
i i i j
j
(4)
The steps required to develop this algorithm are: (1) identifty the objectives and alternatives;
(2) assess the alternatives; (3) determine the steps of each combination; (4) add new values according
to preferences; and (5) analyze sensitivity [23-25].
2.2. Simulation structure
In this section, a detailed description is given on each module described in Figure 1 based on
input-output variables and their corresponding pseudo-code.
2.2.1. Cooperative model
The “Collaborative” module is in charge of carrying out the segmentation of the power matrix
among SU, the parametrization is carried out through three input variables: the power matrix and the number
of available users. The latter is computed depending on the size of the power matrixand the number of users
included in the analysis. Figure 2 presents the structure of the input variables defined for this module.
It only has a single input variable, which corresponds to the segmented power matrix.
Figure 2. Inputs and outputs ofthe collaborative model
Collaborative
Power
User Full Power Segmentation
User simulation
4. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Throughput in cooperative wireless networks (Diego Giral)
701
For the implementation of the module, three functions from Matlab are used. The following
pseudo-code presents a summary of the matrix segmentation structure. The general structure consists
on randomly determining the location of users participating in the simulation. The size of the information
is equal for all users.
function [P_Segmentation] = Collaborative (Power,U_Full,Usimulation)
%% Collaborative module
M_user = reshape(1:U_Full);
M_Available = Power(M_user);
Star_User_column = 1:Number_segment_columns:columns;
End_User_column = Star_User_column + (Number_segment_columns-1);
Star_User_row = 1:Number_segment_row:row;
End_User_row = Star_User_row + (Number_segment_row-1);
for i = 1:Usimulation
[Row_US,Colum_US] = find(Matrix_user == i);
RsAvailable = Star_User_row(Row_US);
ReAvailable = End_User_row(Row_US);
CsAvailable = Star_User_column(Colum_US);
CeAvailable = End_User_column(Colum_US);
M_Available=Power(RsAvailable:ReAvailable,CsAvailable:CeAvailable);
M_zeros(RsAvailable:ReAvailable,CsAvailable:CeAvailable)=M_Available;
end
Power_Segmentation = M_zeros;
2.2.2. Multi-criteria functions
The SAW and FFAHP methods require the same input and output variables. The variation of each
strategy lies in the mathematical structure shown in the block diagram in Figure 3. The input parameters
correspond to a vector containing the average values associated to the availability of channels. The elements
of said vector are defined as PD, TED, PSINR and PWA. The description of each acronym is presented
in Table 1. The size of each vector is 1×n where n corresponds to the number of columns of the segmented
power matrix. The second input of the multi-criteria module is a vector defined as “Weight”. Each element
of this vector includes the weight and/orscore of each variable defined in the “Average” vector.
Based on the assigned weights and average values of PD, TED, PSINR and PWA, the multi-criteria
module determines score and ranking of each channel. These characteristics correspond to the output
variables of the multi-criteria module Figure 3. The purpose of this method is to create a vector that classifies
channels according to their spectral opportunities. The “Score” vector contains the classification
in descending order and the “Ranking” vector contains the information based on the real distribution
of the channels.
Figure 3. Inputs and outpus ofthe multi-criteria structure
For the implementation of the multi-criteria structures, two functions in Matlab are used.
One for the SAW strategy and one for the FFAHP strategy. In the following pseudo-codes, the summary
of the implemented algorithm is presented. The general structure consists on implementing the previously
described mathematical models.
Average= [PD TED PSINR PWA]
Weight = [AA MAT PSINR BA]
Ranking
Score
MCDM
5. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 2, April 2020 : 698 – 706
702
function [RankingF,ScoreF]= Ranking_SAW(W,PD,TED,PSINR,PWA)
%% Ranking SAW
[row,column]=size(Average);
for f=1:row
X_m=max(Average(f,:));
r(f,:)=Average(f,:)./X_m;
end
Ranking=W*r;
[~,c]=size(Ranking);
ScoreF=sort(Ranking,'descend');
function [RankingF,ScoreF]= Ranking_FFAHP(W,PD,TED,PSINR,PWA)
%% Ranking FFAHP
RankingF=W*Average;
ScoreF=sort(Ranking,'descend');
2.2.3. Search algorithm
In order to analyze throughput, a fourth algorithm is implemented to perform channel (frequency)
hopping within the availability matrix according to the scores assigned by the multi-criteria module.
If a channel is unavailable, it will then automatically search for the next channel and carry out the respective
hopping operation. Each hop is quantified in a results matrix that finally leads to the behavior of throughput.
In Figure 1, the input variable “Time” represents the time instant and stop condition of the search
algorithm, meaning that the algorithm hops from one row to another until the established time runs out.
Furthermore, the model has an input variable called “Criteria Time” which establishes the time taken
by the search algorithm to hop based on the previously computed position of the row-vector. If the stopping
“Time” is higher than the “Criteria Time” when the search algorithm reaches time t=criteria time,
then the postion vector will be updated by recalculating the average values. The assessment is carried out
through a training and validation matrix. The results correspond to the throughput figures for high and low
traffic, with service classes RT and BE.
3. RESULTS AND DISCUSSION
To analyze the multi-criteria decision-making process (MCDM) with FFAHP and SAW, throughput
is defined as an assessment metric in four different scenarios: GSM RT HT, GSM RT LT, GSM BE HT and
GSM BE LT. The results obtained for FFAHP are presented in Figure 4 and the results for SAW in Figure 5.
Ten simulations were performed for each experiment and then the average of each experiment was plotted.
In FFAHP scenarios, Figure 4 shows that the behavior throughout the 9 minutes of transmission is
similar in all four types of cooperation, both for RT and BE. This hinders the importance of this variable
within a spectral allocation model. The most significant variations are identified for models that use a 10%
cooperation level. For SAW, Figure 5 shows that the evidenced similarity is maintained for RT and BE.
In general, variations take place during the initial transmission times and the lowest throughput levels are
obtained for the lowest cooperation levels.
Table 2 shows the relative values of the comparative performance evaluation in percentage form in
the scenarios with different levels of cooperation. Although there is an improvement in performance for both
algorithms as the level of cooperation grows higher, it is concluded that said improvement does not exceed
10% in most cases. Therefore, it could be interesting to assess each algorithmcomparatively in all scenarios,
taking into account the highest and lowest levels of cooperation which are 10% and 100% respectively,
as shown in Table 3. FFAHP has a clear dominance in three out of the four GSM scenarios. In RT-HT,
SAW manages to relegate FFAHP-100 to third place, with a difference of only 11%. However, both
strategies take first place in average.
Table 2. Benchmarking by level of cooperation for AAT
AAT
GSM
BE LT
GSM RT
LT
GSM BE
HT
GSM RT
HT
FFAHP SU10 99,19 97,21 99,73 88,76
SAW SU10 95,43 93,36 93,93 95,26
FFAHP SU20 99,65 99,55 99,85 88,81
SAW SU20 95,97 97,03 93,96 95,28
FFAHP SU50 99,68 99,77 99,95 88,82
AAT
GSM BE
LT
GSM RT
LT
GSM BE
HT
GSM RT
HT
SAW SU50 96,71 97,88 93,99 95,29
FFAHP SU80 99,7 99,77 99,96 88,85
SAW SU80 97,13 97,88 94 95,3
FFAHP SU100 100 100 100 88,92
SAW SU100 97,13 98,15 94,41 100
6. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Throughput in cooperative wireless networks (Diego Giral)
703
(a)
(b)
(c)
(d)
Figure 4. Throughput for FFAHP (a) GSM RT HT, (b) GSM RT LT, (c) GSM BE HT, (d) GSM BE LT
7. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 2, April 2020 : 698 – 706
704
(a)
(b)
(c)
(d)
Figure 5. Throughput for SAW (a) GSM RT HT, (b) GSM RT LT, (c) GSM BE HT, (d) GSM BE LT
8. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Throughput in cooperative wireless networks (Diego Giral)
705
At this point, the question is whether FFAHP-100 (FFAHP with a 100% cooperation percentage)
or FFAHP-10 (FFAHP with a 10% cooperation percentage) is selected. By checking Table 3 once again,
it is observed that FFAHP-100 has a performance of 98.23% and FFAHP-10 reaches 96.22%,
marking a slight difference of 2% in performance yet a significant difference of 90% in cooperation,
which makes FFAHP-10 a better alternative.
Table 3. Benchmarking by scenario with 10% and 100% cooperation for AAT
AAT FFAHP SU10 SAW SU10 FFAHP SU100 SAW SU100
GSM BE LT 99,19 95,43 100 97,13
GSM RT LT 97,21 93,36 100 98,15
GSM BE HT 99,73 93,93 100 94,41
GSM RT HT 88,76 95,26 88,92 100
GSM LT 98,2 94,395 100 97,64
GSM HT 94,245 94,595 94,46 97,205
GSM BE 99,46 94,68 100 95,77
GSM RT 92,985 94,31 94,46 99,075
Score GSM 96,222 94,495 98,23 97,422
4. CONCLUSION
In cognitive radio networks, the decisions made by users are fairly limited which leads to an
inability to properly use available spectrum resources even with dynamic access. The decision -making
process in cognitive radio networks among multiple users is a challenge for next generation systems.
When making the decision to access a channel, each secondary user should not only consider the quality of
the channelbut also the decisions regarding channel access issued by otherusers.When more SU have access
to the same channel, their performance is reduced due to mutual interference. In multi-user systems,
cooperative strategies have delivered excellent results in decision-making, which allows an improvement of
variables such as quality of service, latency, throughput, reliability, signalization, PU interference,
energetic efficiency, bandwidth, SINR and error rate.
ACKNOWLEDGEMENTS
The authors wish to thank Universidad Distrital Francisco José de Caldas for funding and supporting
this research.
REFERENCES
[1] C. Hernández, L. F. Pedraza, and E. Rodriguez-Colina, "Fuzzy Feedback Algorithm for the Spectral Handoff in
Cognitive Radio Networks," Revista Facultad de Ingenieria, vol. 81, pp. 47-62, December 2016.
[2] B. Wang and K. J. R. Liu, "Advances in cognitive radio networks: A survey," in IEEE Journal of Selected Topics in
Signal Processing, vol. 5, no. 1, pp. 5-23, Feb. 2011.
[3] C. Hernández, L. F. Pedraza, I. Páez, and E. Rodriguez-Colina, "Análisis de la Movilidad Espectral en Redes de
Radio Cognitiva," Inf. tecnológica, vol. 26, no. 6, pp. 169-186, 2015.
[4] M. R. Ramzan, N. Nawaz, A. Ahmed, M. Naeem, M. Iqbal, and A. Anpalagan, "Multi-objective optimization for
spectrum sharing in cognitive radio networks: A review," Pervasive Mob. Comput., vol. 41,
pp. 106-131, 2017.
[5] M. A. Hazar, N. Odabasioglu, T. Ensari, Y. Kavurucu, and O. F. Sayan, "Performance analysis and improvement of
machine learning algorithms for automatic modulation recognition over Rayleigh fading channels," Neural
Computing and Applications, vol. 29, no. 9, pp. 351-360, 2018.
[6] F. C. Committee, "In the matter of facilitating opportunities for flexible, efficient, and reliable spectrum use
employing cognitive radio technologies, authorization and use of softwaredefined radios," nprm03-322, 2003.
[7] C. Hernández, I. Páez, and D. Giral, "Modelo AHP-VIKOR para handoff espectral en redes de radio cognitiva,"
Tecnura, vol. 19, no. 45, pp. 29-39, 2015.
[8] I. F. Akyildiz, W. Lee, M. C. Vuran and S. Mohanty, "A survey on spectrum management in cognitive radio
networks," in IEEE Communications Magazine, vol. 46, no. 4, pp. 40-48, April 2008.
[9] I. F. Akyildiz, L. Won-Yeol, M. C. Vuran, and S. Mohanty, "NeXt generation/dynamic spectrum access/cognitive
radio wireless networks:A survey," Comput. Networks, vol. 50, no. 13, pp. 2127-2159, 2006.
[10] Y. Cheng, E. H. Wu and G. Chen, "A Decentralized MAC Protocol for Unfairness Problems in Coexistent
Heterogeneous Cognitive Radio Networks Scenarios With Collision-Based Primary Users," in IEEE Systems
Journal, vol. 10, no. 1, pp. 346-357, March 2016.
[11] C. Salgado, S. Mora, and D. Giral, "Collaborative algorithm for the spectrum allocation in distributed cognitive
networks," International Journal Engineering Technology, vol. 8, no. 5, pp. 2288-2299, 2016.
9. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 2, April 2020 : 698 – 706
706
[12] P. Thakur, A. Kumar, S. Pandit, G. Singh, and S. N. Satashia, "Spectrum mobility in cognitive radio network using
spectrumprediction and monitoring techniques," Phys. Commun., vol. 24, pp. 1-8, 2017.
[13] G. I. Tsiropoulos, O. A. Dobre, M. H. Ahmed and K. E. Baddour, "Radio Resource Allocation Techniques for
Efficient Spectrum Access in Cognitive Radio Networks," in IEEE Communications Surveys & Tutorials, vol. 18,
no. 1, pp. 824-847, Firstquarter 2016.
[14] D. A. López, E. R. Trujillo, and O. E. Gualdron, "Elementos Fundamentales que Componen la Radio Cognitiva y
Asignación de Bandas Espectrales," Inf. tecnológica, vol. 26, no. 1, pp. 23-40, 2015.
[15] S. S. Oyewobi and G. P. Hancke, "A Survey of Cognitive Radio Handoff Schemes, Challenges and Issues for
Industrial Wireless Sensor Networks (CR-IWSN)," Journal of Network Computer Applications, vol. 97,
pp. 140-157, 2017.
[16] E. Ahmed, A. Gani, S. Abolfazli, L. J. Yao and S. U. Khan, "Channel Assignment Algorithms in Cognitive Radio
Networks: Taxonomy, Open Issues, and Challenges," in IEEE Communications Surveys & Tutorials, vol. 18, no. 1,
pp. 795-823, Firstquarter 2016.
[17] A. Lertsinsrubtavee and N. Malouch, "Hybrid Spectrum Sharing through Adaptive Spectrum Handoff and
Selection," in IEEE Transactions on Mobile Computing, vol. 15, no. 11, pp. 2781-2793, 1 Nov. 2016.
[18] K. Kumar, A. Prakash, and R. Tripathi, "Spectrum handoff in cognitive radio networks: A classification and
comprehensive survey," Journal of Network Computer Applications, vol. 61, pp. 161-188, 2016.
[19] IEEE COMSOC, "IEEE Standard Definitions and Concepts for Dynamic Spectrum Access: Terminology Relating
to Emerging Wireless Networks, SystemFunctionality, and Spectrum Management," 2008.
[20] T. Kaya and C. Kahraman, "Multicriteria renewable energy planning using an integrated fuzzy VIKOR & AHP
methodology: Thecase of Istanbul," Energy, vol. 35, no. 6, pp. 2517-2527, 2010.
[21] C. Ramírez Pérez and V. M. Ramos Ramos, "Handover vertical: un problema de toma de decisión múltiple,"
in Congreso Internacional sobre Innovación y Desarrollo Tecnológico, 2010.
[22] C. Ramirez-Perez and V. Ramos-R, "On the Effectiveness of Multi-criteria Decision Mechanisms for Vertical
Handoff," 2013 IEEE 27th International Conference on Advanced Information Networking and Applications
(AINA), pp. 1157-1164, Barcelona, 2013.
[23] S. Liu, S. Pan, Z. Mi, Q. Meng and M. Xu, "A Simple Additive Weighting Vertical Handoff Algorithm Based on
SINR and AHP for Heterogeneous Wireless Networks," 2010 International Conference on Intelligent Computation
Technology and Automation, pp. 347-350, Changsha, 2010.
[24] E. Stevens-Navarro, R. Gallardo-Medina, U. Pineda-Rico, and J. Acosta-Elias, "Application of MADM method
VIKOR for vertical handoff in heterogeneous wireless networks," in IEICE Transactions on Communications,
vol. 95, no. 2, pp. 599-602, 2012.
[25] C. Bernal and C. Hernández, "Modelo de decisión espectral para redes de radio cognitiva," Primera Ed.
Bogotá, 2019.