Advancements and Innovations in Wireless Communications and Network Technologies
Latest Publications


TOTAL DOCUMENTS

19
(FIVE YEARS 0)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781466621541, 9781466621558

Author(s):  
Mahdy Saedy ◽  
Vahideh Mojtahed

This paper introduces an efficient machine-to-machine (M2M) communication model based on 4G cellular systems. M2M terminals are capable of establishing Ad Hoc clusters wherever they are close enough. It is also possible to extend the cellular coverage for M2M terminals through multi-hop Ad Hoc connections. The M2M terminal structure is proposed accordingly to meet the mass production and security requirements. The security becomes more critical in Ad Hoc mode as new nodes attach to the cluster. A simplified protocol stack is considered here, while key components are introduced to provide secure communications between M2M and the network and also amongst M2M terminals.


Author(s):  
Izabella Lokshina

This paper examines turbo codes that are currently introduced in many international standards, including the UMTS standard for third generation personal communications and the ETSI DVB-T standard for Terrestrial Digital Video Broadcasting. The convergence properties of the iterative decoding process associated with a given turbo-coding scheme are estimated using the analysis technique based on so-called extrinsic information transfer (EXIT) chart. This approach provides a possibility to anticipate the bit error rate (BER) of a turbo code system using only the EXIT chart. It is shown that EXIT charts are powerful tools to analyze and optimize the convergence behavior of iterative systems utilizing the turbo principle. The idea is to consider the associated SISO stages as information processors that map input a priori LLR’s onto output extrinsic LLR’s, the information content being obviously assumed to increase from input to output, and introduce them to the design of turbo systems without the reliance on extensive simulation. Compared with the other methods for generating EXIT functions, the suggested approach provides insight into the iterative behavior of linear turbo systems with substantial reduction in numerical complexity.


Author(s):  
G. Uma Maheswari

Quality-of-Service (QoS) routing protocol is developed for mobile Ad Hoc Networks. MANET is a self configuring network of mobile devices connected by wireless links. Each device in the MANET is free to move independently in any direction; therefore, it changes links to other devices frequently. The proposed QoS-based routing in the Optimized Link State Routing (OLSR) protocol relates bandwidth and delay using a fuzzy logic algorithm. The path computations are examined and the reason behind the selection of bandwidth and delay metrics is discussed. The performance of the protocol is investigated by simulation. The results in FQOLSR indicate an improvement in mobile wireless networks compared with the existing QOLSR system.


Author(s):  
Yasanur Kayikci

Many strategies have been developed to manage supply chain operations effectively. Vendor Managed Inventory (VMI) system is one of the prevalent strategic tools of the supply side logistics based on the electronic data exchange and business process automation among the suppliers and customers to enhance the competitive advantage. VMI is widely used in different industries including automotive sector. The VMI concept is a continuous replenishment program where suppliers are given access to demand and inventory level of customers and they are fully responsible for managing and replenishing the customer’s stock. VMI’s extension on customer satisfaction cannot be perceived sufficiently by decision-makers who are responsible to develop and invest in the customer-supplier relationship. This paper presents a path model using the method of Partial Least Squares (PLS) regression to give insight to decision-makers to understand effect of the VMI adoption on customer satisfaction. This paper investigates both determinants of relative factors of successful VMI adoption and the relationship in the supply chain with an empirical automotive industry case. The results show that the collaboration and coordination between customer and supplier and infrastructure of the information-sharing are the important dimensions to add value to the supply chain and to enhance customer satisfaction.


Author(s):  
H. Abdul Shabeer ◽  
R. S. D. Wahidabanu

This paper presents the results of mobile application which helps in preventing mobile phone accidents to the great extent. An electronic circuit (Transmitter and Receiver block) also designed to detect the driver’s mobile phone automatically once he or she starts the vehicle and the circuit will switch OFF and then ON the mobile phone without human intervention with the help of 5 pin relay in order to start the application automatically. The authors further extend the research by comparing the obtained results after installing this application with a recent study of the US National Safety Council, conducted on 2010. The authors also show how far this application helps in reducing economic losses in India.


Author(s):  
Izabella Lokshina

This paper is devoted to modeling and simulation of traffic with integrated services at media gateway nodes in the next generation networks, based on Markov reward models (MRM). The bandwidth sharing policy with the partial overlapped transmission link is considered. Calls arriving to the link that belong to VBR and ABR traffic classes, are presented as independent Poisson processes and Markov processes with constant intensity and/or random input stream, and exponential service delay time that is defined according to MRM. Traffic compression is calculated using clustering and learning vector quantification (e.g., self-organizing neural map). Numerical examples and simulation results are provided for communication networks of various sizes. Compared with the other methods for traffic compression calculations, the suggested approach shows substantial reduction in numerical complexity.


Author(s):  
Mike Sabelkin ◽  
François Gagnon

The proposed communication system architecture is called TOMAS, which stands for data Transmission oriented on the Object, communication Media, Application, and state of communication Systems. TOMAS could be considered a Cross-Layer Interface (CLI) proposal, since it refers to multiple layers of the Open Systems Interconnection Basic Reference Model (OSI). Given particular scenarios of image transmission over a wireless LOS channel, the wireless TOMAS system demonstrates superior performance compared to a JPEG2000+OFDM system in restored image quality parameters over a wide range of wireless channel parameters. A wireless TOMAS system provides progressive lossless image transmission under influence of moderate fading without any kind of channel coding and estimation. The TOMAS system employs a patent pending fast analysis/synthesis algorithm, which does not use any multiplications, and it uses three times less real additions than the one of JPEG2000+OFDM.


Author(s):  
Jamal Haque ◽  
M. Erturk ◽  
Huseyin Arslan ◽  
Wilfrido Moreno

The paper explores the system and architecture requirements for cognitive driven reconfigurable hardware for an aeronautical platform, such as commercial aircraft or high altitude platforms. With advances in components and processing hardware, mobile platforms are ideal candidates to have configurable hardware that can morph itself, given the location and available wireless service. This paper proposes a system for an intelligent self-configurable software and hardware solution for an aeronautical system.


Author(s):  
Gregory H. Carlton ◽  
Hill Zhou

Computing and communication technologies have merged to produce an environment where many applications and their associated data reside in remote locations, often unknown to the users. The adoption of cloud computing promises many benefits to users and service providers, as it shifts users’ concerns away from the physical location of system components and toward the accessibility of the system’s services. While this adoption of cloud computing may be beneficial to users and service providers, it increases areas of concern for computer forensic examiners that need to obtain data from cloud computing environments for evidence in legal matters. The authors present an overview of cloud computing, discuss the challenges it raises from a digital forensics perspective, describe suitable tools for forensic analysis of cloud computing environments, and consider the future of cloud computing.


Author(s):  
Amir Rajaee ◽  
Mahdy Saedy ◽  
Brian Kelley

This paper presents the Cognitive Radio framework for wireless Ad Hoc networks. The proposed Cognitive Radio framework is a complete model for Cognitive Radio that describes the sensing and sharing procedures in wireless networks by introducing Queued Markov Chain method in spectrum sensing and Competitive Indexing Algorithm in spectrum sharing part. Queued Markov Chain method is capable of considering waiting time and is well generalized for an unlimited number of secondary users. It includes the sharing aspect of Cognitive Radio. Power-law distribution of node degree in scale-free networks is important for considering the traffic distribution and resource management thus we consider the effect of the topology on sensing and sharing performances. The authors demonstrate that CIF outperforms Uniform Indexing (UI) algorithm in Scale-Free networks while in Random networks UI performs as well as CIF.


Sign in / Sign up

Export Citation Format

Share Document