The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we examine message prioritization in terms of both rate and reliability in the two-way relay channel using decode-forward relaying. Each source sends both a low priority message and a high priority message. We design a scheme that routes the high priority messages through the relay and direct link but the low priority message is only decoded by the destination. For fixed message priorities,...
Bluetooth Low Energy (BLE) has recently positioned itself as one of the key enabling technologies in the Internet of Things (IoT). In order to provide scalability, one promising way to collect data from BLE sensors is to utilize the existing population of smartphones in their range as relays to the cloud. In this case, providing reliable data transfer becomes complicated due to challenges such as...
The fault current at a particular node in microgrid system varies depending upon its grid connected and islanded mode of operations. In this scenario microgrid the function of microgrid central protection unit becomes challenging to maintain its simplicity and reliability during protection coordination. To make protection system more reliable and to minimize complexity and dependency of central adaptive...
Distributed Generation (DG) is the generation of electricity from multiple renewable energy sources and is located closer to the user, or load. These days DGs is developing rapidly because of the advantages it could bring into the system such as enhancing the transmission efficiency, securing distribution reliability as well as reduction of climate change. However, the penetration of DGs to the existing...
Energy efficient and reliable spectrum sensing become essential in cooperative cognitive radio networks. However, cooperation in spectrum sensing (SS) is often vulnerable to several security threats; one such operation is primary user emulation attack (PUEA). To address the issues, an optimization framework is developed in this work to minimize the energy consumption in cooperative spectrum sensing...
Considered as one of the major catastrophes, fire caused by unattended outlets that may spread quickly to neighboring building structures can inflict substantial losses. Converging wireless and mobile technology, a new device is designed to be used for monitoring and controlling the custom-built power board that can prevent accidents from happening, mitigating their consequences and increasing public...
Reliability test systems are used as a benchmark tool to test and validate probabilistic methods developed for power systems reliability evaluation. The IEEE Reliability Test System (RTS) and the Roy Billinton Test System (RBTS) are the two most widely used test systems for studying new ideas of power system reliability analysis. With the increasing penetration of Information and Communication Technologies...
In cellular networks, the introduction of device-to device (D2D) technology could promote cell coverage and expand user experience. In this paper, we consider the scenario of relay assisted D2D communications, and developed an adaptive architecture for D2D communications to be used in emergency conditions. Such events are difficult to predict. Therefore, their situations are accompanied by uncertainty...
In this work, full frequency reuse based transmission scheme is proposed for the ground-air communication systems. In full frequency reuse based systems, the receivers are interference-limited, and in this work, interference forwarding with a half-duplex (HD) dynamic decode-and-forward (DDF) relay is proposed to mitigate the interference. The HD DDF relay forwards the interference towards the interference-limited...
In 2015, NetFlix made the headlines with nearly 37% of Internet traffic being caused by their streaming applications1. The trend towards similar applications is further accelerated by increasing number of mobile devices used to consume high resolution video and interact with low latency. Hence, new challenges arise that can no longer be solved by solely altering the network's edge. Software-Defined...
In this work, we propose a new technique of spatially-coupled low-density parity-check coding within a threshold-based lossy forwarding protocol for a multiple access relaying system. Here, block Rayleigh fading is assumed for all transmission links and error-free decoding at the relay is not required. Two schemes are presented in which the relay computes log-likelihood ratios (LLRs) of the network-coded...
In this paper we introduce an improvement of the symbol request sharing (SRS) cooperative scheme, namely the adaptive SRS (A-SRS). Both schemes are designed for systems assuming a source and several receivers with one target receiver among them which is denoted as destination. In addition, the source or the receivers are not restricted to be static. These schemes follow a request-answer strategy,...
This paper investigates a power control scheme for cooperative cognitive communication system which employs an untrusted relay. More explicitly, a friendly jammer transmits a jamming signal enabling secure communication between the source and the destination, in the presence of an untrusted relay. In return, the source compensates the potential jammer with an access to its bandwidth for a fraction...
Over the years, different types of relay selection mechanism in wireless networks have been proposed for Cooperative Medium Access Control (MAC) protocols considering the metrics like — residual energy, delay, signal to noise ratio (SNR) etc. In recent days, distance metric is added to the list for optimal relay selection. However, protocols those use distance metric are found to be suffered from...
Network coding (NC) is a promising approach to efficiently enhance the robustness and recovery capacity in the Underwater acoustic sensor network (UWASN). However, the undesired transmission redundancy and additional resource limit the further development for NC with applications to the UWASN. Based on the analysis of intermediate nodes, a new approach called encoding anticipation mechanism for network...
The acoustic environment suffers from a number of impairments which effect transmitted data reliability and integrity leads toward low-quality routing. Integral part of cooperative routing is reliable data delivery with trade-off energy consumption is high, because of multiple transmissions. In order to overcome this problem and getting advantage of cooperation routing, we proposed a scheme Sink Mobility...
One of the top reliability concerns in power systems classified by NERC is hidden failures in protection schemes. Such failures are defects that go undetected under normal operating conditions but manifest themselves during faults or transients, which may lead to the false operation of relaying schemes. Specifically, hidden failures typically lead to incorrect input to relays and adversely affect...
In this paper; a comparative study approach is proposed between Feed Forward Neural Network (ANN) and accommodative Adaptive Neuro-Fuzzy Inference System (ANFIS) rule model to find the fault of 3-ph transmission line using MATLAB Toolbox. Post fault current is the key requirement of the technique and its features are extracted using DWT ‘DB4’ as mother wavelet. These features are then used to train...
Vehicular ad hoc network (VANET) is suffering from the frequent link breakage and low packet delivery rate, which challenges routing protocols. To address this issue, we propose a Geographic Opportunistic Routing protocol based on Link state and Forwarding quality inside nodes (LF-GOR). We first put forward a hybrid approach of filtering and prioritizing to determine a candidate nodes set of the sending...
In this paper, we consider a relayed-broadcasting mechanism in IEEE 802.11 wireless local area networks (WLANs), to broadcast data traffic beyond the coverage of a source node. For this purpose, we adopt a probabilistic flooding scheme with which each intermediate node rebroadcasts received frames in a probabilistic manner to restrict unnecessary broadcasting of duplicate frames, as well as to decrease...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.