The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wi-Fi enabled hand-held devices have quickly occupied the consumer market as a result of the remarkable customer acceptance of IEEE 802.11 standard. In this regard, the demand of high throughput introduces high throughput standards such as IEEE 802.11ac. It supports Dynamic Bandwidth Channel Access (DBCA), where a wireless station selects channel bandwidth dynamically based on the availability of...
Recently, many applications for co-operative Intelligent Transportation System (C-ITS) using wireless vehicle communication technology such as DSRC have been developed to improve traffic problems and provide user convenience. Above all, broadcast message sets such as CAM and DENM are very useful for vehicle safety. However, V2X systems must design system parameters in highly congested traffic conditions,...
In this paper, we propose a cross-layer design framework for transmitting Markov modulated Poisson process (MMPP) traffic over cognitive cooperative networks, which considers the energy efficient transmissions for different delay-aware packets. The adaptive modulation and coding (AMC) is used in the cooperative transmission system. The queueing process is considered in the buffer aided relay and source...
This paper investigates the link selection policy for secure communications over a buffer-aided two-hop communication link. It is assumed that a source wishes to send information to a destination with the aid of a trusted half-duplex relay node compromised by a passive eavesdropper, and that there is no direct link between the source and the destination. The buffer-aided relay forwards the information...
The robots having 3G/LTE capability can cooperate with others by using link-aggregation when one needs to send unexpected huge data in high bandwidth to the remote center office. To do so, the robot distributes its data to other robots with IEEE802.11 WLAN. They can move close to the robot to prevent from the situation where the WLAN communication becomes a bottleneck because they are too far to get...
IEEE 802.11 WLANs use carrier sense multiple access with collision avoidance (CSMA/CA) to initiate the Request to Send / Clear to Send (RTS/CTS) handshaking mechanism that solves the hidden node problem. However RTS/CTS also causes the exposed node problem where a node is unnecessarily prevented from accessing the wireless channel even when such access will not disrupt another nodes ongoing transmission...
Presented is a method to produce a 2D reference test zone for over-the-air measurements in a random line-of-sight environment for vehicular applications. The ideal threshold receiver model is used to design the chamber array at 3 GHz for LTE/LTE-A systems. The analysis focuses on the fluctuations of the reference power measurements at a user-defined probability of detection level of bit-streams. Numerical...
In this paper, we propose a simple header detection technique to identify multiple device connections for finite length wireless Internet-of-things (IoT) networks. The Hadamard codes are selected to guarantee low computational complexity, while finite length, defined as finite number of time-slots, is considered to fulfill the requirement of low network latency required by the fifth generation (5G)...
Wireless communications play a significant role in the spread of the Internet Of Things (loT). While all machines try to connect to the IoT and exchange data, wireless communications offer freedom of movement and demand of minimum infrastructure. The main obstacles that wireless communications face are the limited source of power and the short range of coverage. This paper highlights all the available...
Multi Criteria Decision Making (MCDM) is useful for choosing a possible objective. The objective is to investigate how far TOPSIS method of MCDM can be utilized for delay sensitive network selection problem. In this paper, TOPSIS method is used for taking decision in delay sensitive network selection for achieving reliability of network selection with Wireless Body Area Network (WBAN) parameters;...
This paper proposes an experimental evaluation of the IEEE 802.11ac standard. The evaluation testbed is comprised of two National Instruments Universal Software Radio Peripheral (NI USRP) 2954R Software Defined Radios (SDRs) controlled by the NI-PXIe-8840 Quad-Core embedded computer running the 802.11 Application Framework and Lab VIEW Communications 2.0. Two evaluation scenarios are analyzed: (1)...
In optical wireless communication systems, the underwater visible light communication (UVLC) systems is becoming more and more popular. However, due to intrinsic properties of water body, the propagating optical channel can suffer from severe degrading effects, namely absorption, scattering, and turbulence. Here, we aim to improve the UVLC system performance. For this, we propose to utilize an adaptive...
Road intersections represent a leading cause of traffic congestion and accidents. In fact, more than 44% of all reported crashes in the U.S. occur within intersection areas, which, in turn, lead to 8,500 fatalities and approximately 1 million injuries every year. The expected advent of self-driving vehicles raises the question of how automated and connected vehicles can be used to improve throughput...
In this paper, we investigate the problem of cross-layer design of the link scheduling, frequency assignment and flow control in hybrid terrestrial-satellite wireless backhauling networks. Considering network limitations and requirements, the target is to maximize the traffic that can be delivered by the network in a given period of time by deciding the active backhauling links that can transmit simultaneously...
In this paper, we have discussed the application of Zigbee technology. We have shown that a single remote controlled device can control different devices with different application. The experiment performed by us shows the simulation of zigbee within the range of upto 75 meters. The remote controller uses zigbee to control devices like air-conditioner, lights, automatic curtains, garage-shutters,...
Exploiting full-duplex (FD) technology on base stations (BSs) is a promising solution to enhancing the system performance. Motivated by this, we revisit a full-duplex base station (FD-BS) aided OFDMA system, which consists of one BS, several uplink/downlink users and multiple subcarriers. A joint 3-dimensional (3D) mapping scheme among subcarriers, down-link users (DUEs), uplink users (UUEs) is considered...
We study frameless ALOHA with multiple base station (BS) cooperation, where the coverage area of each BS partially overlaps, and the BSs cooperate via a backhaul network to share successfully retrieved packets. The exact packet loss rate for networks with the arbitrary number of BSs is theoretically analyzed, which reveals how the throughput improvement is achieved. Computer simulations confirm that...
Offloading users from an overloaded macro base station (BS) to a lightly loaded small cell BS is critical to alleviate the congestion of the macro BSs. However to overcome the signal-to-interference-plus-noise ratio (SINR) degradation of the offloaded users, offloading should be done in conjunction with an efficient interference management technique. Strict fractional frequency reuse (Strict-FFR)...
In this paper, the secrecy performance of full-duplex jamming SWIPT system is conducted where multiple eavesdroppers intercept the confidential information individually. The closed-form expressions of the connection outage probability (COP), the secrecy outage probability (SOP), the reliable-secure probability (RSP) and the secrecy throughput are obtained, which depict the secrecy performance of the...
In this paper the performance analysis of a routing algorithm for MANETs called Service Zone Gateway Prediction (SZGP) is presented. This is a non-cooperative and hybrid type of routing with a hierarchical multilayered structure, incorporating pre-computed multipath hop-by-hop distributed connectivity. The goal is balance of the load among the nodes and reliable and energy efficient communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.