Realization and performance evaluation of parallel interference cancellation (PIC) based code division multiple access (CDMA) transmission over Rayleigh fading channel
Broadband and Wireless are the most common adoption in the communication market during the past ten years. Users want to be able to access to multimedia applications, data and voice while still using wireless mobility. To do so a high data rate is required. Moreover, multicasting is a tool used in networking which allows a selected group of users to receive the same information, and it is particularly useful for multimedia traffic. Obviously the research on the possible techniques to obtain such connection is a challenging topic in the field of mobile communication.The technological advances in wireless communications have enabled the realization of various systems which enable us to optimally use various multimedia applications. It is envisioned that many of the future wireless systems will incorporate considerable signal processing intelligence in order to provide advanced services such as multimedia transmission and detection. In general, wireless channels are hostile media to communicate, due to substantial physical impediments, primary radio frequency interference and time varying nature of the channel. The need of providing universal wireless access at high data- rate (which is the aim of many emerging wireless applications) presents a major technological challenge, and meeting this challenge necessities the development of advanced signal processing techniques for multiple- access communications in non- stationary interference rich environments. In this paper we present advanced signal processing methodologies for Multiple Access Interference (MAI) suppression in multiuser communication environment, while considering the transmission over Rayleigh fading channel. We also considered the effect of Doppler shift. A new model for realization of Rayleigh fading channel has been proposed. The statistical tests performed on the proposed channel were found satisfactory.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Survey of Conserving Energy for Wireless Sensor Network Mobile Nodes
In Wireless sensor networks the major concern is how to conserve the nodes' energy so that network lifetime can be extended significantly. Employing one static sink can rapidly exhaust the energy of sink neighbors. Furthermore, using a non-optimal single path together with a maximum transmission power level may quickly deplete the energy of individual nodes on the route. This all results in unbalanced energy consumption through the sensor field, and hence a negative effect on the network lifetime. In this paper, we present a comprehensive taxonomy of the various mechanisms applied for increasing the network lifetime. These techniques, whether in the routing or cross-layer area, fall within the following types: multi-sink, mobile sink, multi-path, power control and bio-inspired algorithms, depending on the protocol operation. In this taxonomy, special attention has been devoted to the multi-sink, power control and bio-inspired algorithms, which have not yet received much consideration in the literature. Moreover, each class covers a variety of the state-of-the-art protocols, which should provide ideas for potential future works. Finally, we compare these mechanisms and discuss open research issues.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Performance improvement of QoS in MANETs
This work proposes a methodology for QoS improvement in MANET based on Medium Access Control (MAC) protocol that takes the above requirements into consideration. This protocol is based on IEEE 802.11 standard, and thus can be easily integrated into existing systems without much difficulty. Here 802.11 and 802.11e with different TCP mechanisms are used to analyze the QoS parameters for MANETs. The proposed system is designed to evaluate the performance of QoS and interaction between Transport layer and the MAC layer protocol operating in a mobile ad hoc network. The system will makes use of IEEE 802.11e MAC mechanism, to improve quality of service in MAC layer, which will improve the quality of service in Transport layer and to suggest a suitable mechanism for improving the quality of service in MANETs.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Novel methods for reliable multicast routing in wireless mesh networks
A reliable multicast routing enables a process to multicast a message to a group of clients in a way that ensures all the host destination group members receive the same message. Multicast routing on Wireless Mesh Networks brings great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. Hence, due to its insufficient security requirements and vulnerability to attacks, a novel secure multicast routing protocol S-ODMRP, takes full advantage of trusted computing technology. The novel methods proposed overcomes the above degradation and decreases the communication cost by broadcasting the local traffic and by providing self healing mechanism to each nodes in the network so that it cures the link failure caused by the failed routers and reconstructs the multicast key path, in which the path selection is based on the link basis. And the trusted key is distributed for the secure multicast routing in the Wireless Mesh Networks. In which the trust value for each node is based on some set of rules such as the jointly behaviors, energy behaviors, and the activity model. Hence the NS-2 simulation includes various parameters such as Packet Delivery Ratio (PDR), Bandwidth overhead, cost per received packet, number of attackers and achieves the higher security and throughput.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Environmental data monitoring for short range and long range wireless communication based on GIS
To solve the problems in environmental monitoring arising from remote data acquisition, real-time transmission and analysis, this paper researched the principle of wireless communications SMS / GPRS and the technology of seamless integration with GIS. The system architecture was designed and key technical solutions were implemented. Based on the SMS / GPRS technology, the wireless real-time transmission of the remote monitoring data was achieved, and GIS visualization technology was carried out to visualize the monitoring data. Geographic affected areas were analyzed by GIS spatial analysis. The system is applicable to the environmental protection departments to realize applications such as monitor data acquisition, communication transmission, GIS management and analysis and decision-making.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Power efficient system on chip communications
Power consumption of system level on chip communications is becoming more significant in the overall system on chip power as technology scales down. High bandwidth is desired to enhance parallelism for better performance, and the power efficiency on this bandwidth is critical to the overall SoC power consumption. Current bus architectures such as AMBA, Core connect, and Avalon are convenient for designers but not efficient on power. This paper proposes a physical synthesis scheme for on chip buses and bus matrices to minimize the power consumption, without changing the interface or arbitration protocols. By using a bus gating technique, data transactions can take shortest paths on chip, reducing the power consumption of bus wires to minimal. Routing resource and bandwidth capacity are also optimized by the construction of a shortest-path Steiner graph, wire sharing among multiple data transactions, and wire reduction heuristics on the Steiner graph. In this paper, we optimize on-chip bus communications on the tradeoffs between minimal power, maximal bandwidth, and minimal total wire length. Based on AMBA protocols, we modify the bus structure using a “bus gating” technique, and apply optimizations which are biased toward minimal power, but also favor bandwidth and routing resource.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Survey of cloud computing techniques and models
Cloud computing is one of the emerging technologies that will lead to the next generation of Internet. It provides optimized and efficient computing through enhanced collaboration, agility, scalability, and availability. In this paper, the evolution of the Cloud is discussed, the cloud computing model is explained, a set of cloud computing infrastructure metrics is listed, the cloud service model architectures are described, exemplary implementations of cloud service models are analyzed, and intriguing facts about cloud computing status and future are shared.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Review: Characterizing an Analysis of Important Parameters for Infrastructure less Based Networks-MANETs
Today in the world of computer networking, wireless networks are becoming one of the most popular, valuable, decisive & critical medium for communication. Among the wireless networks, MANET’s i.e., Mobile Ad-hoc Networks are of their own importance. For the purpose of group communication, there are many applications of MANET’s in the areas like as an automated battlefields, crowd control, disaster recovery, conference, search and rescue operations etc. An Ad-hoc Network is basically a wireless network comprising a set of mobile nodes in absence of any centralized access point or fixed infrastructure.In this paper, the necessary parameters which are required to characterize the MANET’s have been presented. A kind of review is done upon these important parameters. The various parameters responsible for the routing strategies in MANETs are the parameters like as performance analysis, reliability, scalability, power saving, efficiency as well as security.By depicting these essential parameters for MANETs, we are able to make proper as well as efficient utilization of MANETs in various fields of communication such as conferencing, pollution monitoring, emergency services like battlefield, disaster recovery, vehicular networks, etc.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Replica allocation in mobile adhoc network for improving data accessibility using SCF-Tree
In a mobile ad hoc network, the mobility and resource constraints of mobile nodes may lead to network partitioning or performance degradation. Several data replication techniques have been proposed to minimize performance degradation. Most of them assume that all mobile nodes collaborate fully in terms of sharing their memory space. In reality, however, some nodes may selfishly decide only to cooperate partially, or not at all, with other nodes. These selfish nodes could then reduce the overall data accessibility in the network. In this paper, the impact of selfish nodes in a mobile ad hoc network from the perspective of replica allocation is examined. A selfish node detection algorithm was developed that considers partial selfishness and novel replica allocation techniques to properly cope with selfish replica allocation. The conducted simulations demonstrate the proposed approach outperforms traditional cooperative replica allocation techniques in terms of data accessibility, communication cost and average query delay.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Promoting Health-Care Using Sensor Nodes in Telemonitoring System
To provide an efficient facility to reserve the human resource appropriately, many aids has been proposed and thus one the measure used recently is sensor nodes with the efficient technology of android system with most available resource that is mobile phones which facilitates each person with security of their healthcare efficiently. As most common feature provided by smart phones is about alerting any person about any situation, this benefit is been utilized in medical healthcare system to provide one of the most important facility to preserve people’s wealth of health.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]