Abstract: Device-to-device (D2D) connectivity is one of the main enablers for future fifth generation (5G) radio access networks. In this paper, we introduce a new model for user cooperation in 5G radio access networks termed frequency-selective soft forwarding (SF). SF is based on soft-processing by a target user equipment (TUE) of selectively forwarded soft information data by a set of coope…
In order to support anywhere and anytime services of Beyond 4G networks, new deployment solutions will be required that can cost-effectively address the capacity demand of the future and also offer consistently high bit rates and decent quality of service throughout the network coverage area. In this article we look into an advanced outdoor distributed antenna system (DAS) concept, dynamic DA…
Active safety systems such as anticollision radar play a major role in reducing traffic accidents. The principal task of the radar is to detect the presence of targets and estimate their positions. To make this task, the system called coded anticollision radar use a code at transmission and correlation at reception. The actual used codes are the BPRS sequences but they are not sufficient to sha…
In conventional multiple-input multiple- systems, each antenna is connected to a radio-frequency (RF) chain. Due to the tiny wavelength of millimeter waves (mmWave), tens of antennas can be packed into a small area in mmWave transceivers. However, implementing an RF chain for each antenna is impractical due to the high cost and power of mixed-signal devices. In order to reduce the cost and ge…
The draft document of the new IEEE 802.15.4e specification assumes receiver initiated transmission (RIT) to reduce energy consumption of wireless sensors by turning off the radio periodically, even if they operate in mesh topology. The original contribution from this paper is developing and evaluating the RIT strategies intended for street lighting systems using wireless sensor networks to cont…
Pre-registration as an important feature in FIMPv6, ensures providing the continuous mobility services for the end-users roaming across heterogeneous wireless networks, and is achieved by obtaining the timely and precise link layer (L2) trigger in the handover preparation. Firing the L2 trigger in the timely manner for deterministic handovers hence is crucial for guaranteeing the handover perfo…
High performance of MIMO-OFDM wireless systems is very much desirable. In this paper, we study the performance analysis of scheduling schemes for multiuser MIMO-OFDM systems employing Orthogonal Space-Frequency Block Coding in g–l fading scenario over frequency selective fading channels. We analyze the advantages of user scheduling in MIMO-OFDM systems employing OSFBC and adaptive modulation…
We treat the problem of movement prediction as a classification task. We assume the existence of a (gradually populated and/or trained) knowledge base and try to compare the movement pattern of a certain object with stored information in order to predict its future location. We introduce a novel distance metric function based on weighted spatial and velocity context used for location prediction…
With the exponential growth in mobile data traffic taking place currently and projected into the future, mobile operators need cost effective ways to manage the load of their networks. Traditionally, this has been achieved by offloading mobile traffic onto Wi-Fi networks due to their low cost and increasingly ubiquitous deployment. Recently, LTE operating in the unlicensed spectrum has drawn s…
Abstract: Energy is a scarce and most vital resource in a wireless sensor network (WSN). Since space-time block coding requires less transmission energy than SISO technique for the same bit error rate (BER), therefore, it is one of the most practical diversity technique for WSN studies. In this work, we have investigated the energy utilization of a simple multiple-input single-output system usi…
Body area networks (BAN) are being developed to serve the mankind, for detection of diseases and tracking of patients. And ultra wideband (UWB) has become the most preferred candidate for the physical layer of BAN. However, UWB BAN will suffer from the interferences from existing wireless networks. Though a number of mitigation techniques have been developed for UWB they will not be feasible f…
The estimation of tag read and no-read zones is the most important preliminary planning step in radio-frequency identification (RFID) system installations. Today, in the ultra-high frequency band (UHF: 860–960 MHz), this estimation is based on either a free-space or a simplified multipath channel model for the signal propagation in the wireless link between the interrogator and the tag. Using…
In this paper, we present an efficient data channel assignment (DCA) scheme for a mixed cell (i.e., a 3G cell with embedded WLANs). Our effort is essential to increase the data request (i.e., a call) handling capacity in 3G systems, with a ‘low request dropping probability’. In UMTS-first DCA scheme prefers 3G channel in dual coverage and reduces vertical handoffs from 3G to WLAN. But it de…
Modeling and analysis of communication link duration in vehicular ad hoc networks (VANETs) is crucial as it directly affects many performance metrics such as packet delivery ratio, throughput and end-to-end delay. In this paper, we investigate the properties of communication link duration in one-dimensional VANETs for different fading channel conditions. We employ a stochastic microscopic mobil…
Abstract: This paper proposes a mobility management protocol for 6LoWPAN wireless sensor networks. In this protocol, the 6LoWPAN architecture is proposed, and both the hierarchical IPv6 address structure and the address configuration algorithm for 6LoWPAN WSN are presented. Based on the proposed architecture, the intra-network and inter-network mobility handover algorithms are proposed. In the…
We address the multicast problem in a wireless multihop network in the presence of errors. Finding the multicast schedule that minimizes the expected number of transmissions, while accounting for both the wireless broadcast advantage (WBA) and the wireless unreliable transmission (WUT) characteristics, has not been solved optimally before. We formally define the problem and propose an initial a…
Due to the growing importance of deploying femtocell technology in the current mobile network operators, data traffic processing and handover (HO) management in such networks are challenging issues. Consequently, due to the mobility of femto users between indoor and outdoor environments, the HO traffic interplay between macrocell and femtocells should be addressed, by determining accurate HO ra…
Abstract: In this paper, we put forward the methods of footprint shift and separation for the virtual topology model of LEO satellite networks, which can reduce the effects of the Polar Regions and cross-seam inter-satellite-links (ISLs) on the virtual topology and improve the utilization of ISLs. Furthermore, a low-load survivable routing protocol called Virtual Snapshot Routing Protocol is p…
In this paper the integration of an RFID system into a wireless sensor node based on an Arduino board is discussed. The main purpose of the proposed solution is to use the memory of a passive RFID transponder to store the data retrieved by the sensors composing the node. This solution can be employed for remote monitoring operations, when no connection is available and then no remote data colle…
The lifetime of wireless sensor network (WSN)is reduced due to the impact caused by channel fading, interference and unbalanced energy consumption. The node’s energy is wasted due to uneven energy consumption for various processes. Communicating the data from source to sink node will consume more power compared to data sensing and processing etc. The channel fading is mitigated through spatia…
In the recent years, the technological improvements on wireless sensor computational capability and versatility have caused a massive use of battery-supplied Wireless Sensor Network (WSN) in many different monitoring applications. The most relevant factors of reliability of such systems are related to the energetic autonomy and the accuracy of the sampled data delivered to the Fusion Center. T…
Gateway discovery is a fundamental process in interconnecting mobile ad hoc network with the Internet. Traditional gateway discovery algorithms adopt the method of periodically broadcast advertisements with a time interval. However, this method does not fulfill the actual requirements from the source nodes and produces some unnecessary overhead. To solve this problem, this paper adopts a novel …
In order to prolong the lifetime of wireless video sensor networks (WVSNs), many methods for visual target tracking are proposed to reduce the energy cost of batterypowered video sensor nodes. Focus on reducing the amounts of image data for computation and communication, this paper presents an energy-efficient method for distributed target tracking inWVSNs. The major Contributions of the propo…
Probability density function (pdf) of the received signal is necessary for the distributed detection fusion when the unreliable channels between the local sensors and the fusion center are considered. Hitherto study has never been made on the statistical distribution of the demodulated OFDM signal over multipath fading channel. Modeling the OFDM system over the multi-path channel, we derived th…
An important issue affecting cellular networks is to make services available to regions of bad or no reception. Femtocells are considered to be the solution to meet the future needs for better indoor coverage, high data rates and capacity in the cellular networks. Since femtocell access points (FAPs) are usually user deployed, thus blind placement of FAPs is inevitable leading to problems of po…
In this paper, we investigate the resource allocation issues in Orthogonal frequency division multiplexing access-based multicast systems that only allows average channel state information of users to be available at the resource manager. In this system, it is impossible to guarantee successful transmission of every data due to instant deep fading. Hence, in order to achieve efficient and reli…
Wireless sensor–actor networks (WSANs) are applicable in versatile domains ranging from very common to those which demand reliable actions in the event area. The unique characteristics of WSANs and the resourceconstrained nature of the constituent sensor nodes give rise to design energy and delay efficient routing protocols. Many researchers have made considerable efforts to meet these challe…
In the paper, a kind of channel noise produced by nodes accessing channel was considered, and this noise was compared with Middleton Class-A noise. It was assumed that the time, space, frequency of channel accessed by nodes were randomized, hence the channel selection can be described as a random matrix. And the random matrix were approximately calculated and analyzed by Krylov subspace method …
In this paper, we present an efficient resource allocation with user discrimination framework for 5G Wireless Systems to allocate multiple carriers resources among users with elastic and inelastic traffic. Each application running on the user equipment (UE) is assigned an application utility function. In the proposed model, different classes of user groups are considered and users are partition…
The goal of fourth generation (4G) mobile communications system is to seamlessly integrate a wide variety of communication services such as high speed data, video and multimedia traffic as well as voice signals. One of the promising approaches in 4G is the Adaptive Orthogonal Frequency Division Multiplexing (AOFDM) technique. In Multiple Input Multiple Output (MIMO)- OFDM, adaptive transmissio…
n Multi-hop Wireless Networks (MWNs), the end-to-end performance degrades exponentially with hop counts and the degree of traffic aggregation at each hop. Fair allocation of bandwidthamong nodes is one of the challenging problems in MWNs. The IEEE 802.11 distributed coordination function standard stipulates long-term equalization of throughput among stations by giving the same number of transm…
In this paper, a comparative study of the simulated symbol error rate (SER) with the theoretical SER of uncoded communication systems is made for selected modulation schemes with and without fading. Slow fading Weibull and Rayleigh channels are considered in this paper. The modulation schemes considered are (1) Binary Phase Shift Keying, (2) Quadrature Phase Shift Keying, (3) Orthogonal Freque…
This letter considers routing in delay tolerant networks whereby nodes have semi-predictable mobility patterns within a time period. We propose a mobility-based routing protocol (MBRP) where nodes construct a space–time graph dynamically. As the space–time graph may be incomplete, MBRP presents a heuristic that evaluates encountered nodes based on their recorded mobility patterns in order t…
This paper presents a modulator and low power ASK demodulator that uses a new technique. This technique uses the dynamic threshold MOSFET to reduce the threshold voltage of diodes connected MOS transistors as a barrier in the design of the envelope detector. This circuit has been simulated in a 90 nm CMOS technology to satisfy EPC Class 1 Generation 2 standard protocol. The proposed circuit can…
The double codebook structures are proposed and applied in LTE-advanced, which can track both longterm and short-term channel state information. In traditional incoherent estimation, precoding matrix indicators (PMI) estimation is performed on each individual subcarrier and some form of averaging procedure then follows to combine the results from individual narrow-band processing. As a result, …
Purpose – Research, spanning half a century, points to the critical role of school administration and to the successful implementation of US government policies and programs. In part these findings reflect the times and a US educational governance system characterized by local control, a constitutionallyconstrained federal government, resource-poor state governments, and an overall system …
Librarianship is concerned with the activities to be performed in libraries in order to achieve the mission of providing right information to the right user at the right time. Only competent persons who had got some training related to the libraries can do the job efficiently and effectively. This need of training laid foundations of library science profession. Present paper highlights the n…
This study aims at evaluating the services that libraries offer to the students of library and information management, measuring the extent to which these services are used from the students’ point of view as well as evaluating the adequacy of the practical training for them. In the course of this study, two hypotheses were tested. The first one focused on the compatibility between the se…
The contributors to this volume make a crucial and forceful point. There are numerous theories and methodologies that can be used to yield research findings about the potential of information and communication technologies (ICTs) to make a positive difference in people’s lives. Whether the findings in any particular research project actually contribute in this way depends on multiple factors,…
Telecommunications is one of the fastest growing business sectors of modern information technologies. A couple of decades ago, to have a basic understanding of telecommunications, it was enough to know how the telephone network operated. Today, the field of telecommunications encompasses a vast variety of modern technologies and services. Some services, such as the fixed telephone service …
Abstract. M-services (Mobile services) and commerce are growing rapidly with the explosive growth of mobile devices, technologies and networks. Hence, many enterprises use them to grow revenue, reduce costs, maintain their competitive edge and achieve high performance. This advancement in mobile technologies has also influenced many government organizations to go mobile with their services…
Abstract. The increased mobility of users and rapid enhancements to “hand held” technology suggest leveraging mobile technology to enhance timely transaction handling and data collection, as well as access robust tools for management decision making in supporting Supply Chain Management (SCM), Enterprise Resource Planning (ERP) and other complimentary systems. Though technology options…
Abstract. In this paper a set of successful Enterprise Application Integration projects are analyzed and common characteristics are identified. These characteristics are then distilled into a set of key success factors. The empirical foundation for this study is the active participation in a number of successful EAI projects, as a consequence thereof we classify the research method as actio…
In 2010, the New England Region–National Network of Libraries of Medicine at University of Massachusetts Medical School received funding to improve information access for public health departments in 6 New England states and Colorado. Public health departments were provided with desktop digital access to licensed e-resources available through special pricing. In January through mid-April 2012…
ABSTRACT This paper is a record of a unique intervention for enhancing the Undergraduate learning experience at Rhodes University. It will focus on the establishment of the project, the experiences encountered and lessons learned thus far. In April 2013, a vibrant team of 13 librarians embarked on a Personal Librarian Pilot Project at the Rhodes University Library. The Personal Librarian Pr…
Abstract From 2004 to 2012 Universitas Gadjah Mada (UGM) Library has collaborated with institutions and companies to design library spaces for students of millennial Generation. Five corners or library sections have been developed as spacious and comfortable areas to accommodate reading areas and other services as well as library users’activities without spending much budget from the librar…
This paper discusses a joint project of the American Library Association and the American Sociological Association. The goal of this collaboration is to guarantee that students of sociology, particularly sociology majors, develop strong information literacy skills during their undergraduate experience. The article talks about national standards for information literacy and how they relate to th…
Needham provides an overview of how people have used information technology so far and how they can prepare themselves to use it more effectively in the future. He discusses how libraries have changed under this technology and how these institutions have introduced new processes to the public, especially older people