Loading...
Search for: wireless-telecommunication-systems
0.007 seconds
Total 184 records

    Achievable throughput of wireless networks with local traffic

    , Article IEEE Wireless Communications and Networking Conference, WCNC ; 10 November , 2014 , Pages 3076-3081 ; ISSN: 15253511 ; ISBN: 9781479930838 Shariatpanahi, S. P ; Khalaj, B. H ; Shah-Mansouri, H ; Sharif University of Technology
    Abstract
    Many applications in wireless networks impose locally distributed traffic on the network. We consider the effect of traffic localization on throughput of large wireless networks in the scaling sense. We show that by careful exploitation of traffic localization, one can enhance the throughput of various schemes in wireless networks. Also, the important case of Small World traffic distribution in wireless networks is addressed. In this type of traffic, in addition to the local traffic, a non-negligible amount of global traffic should be handled by the network. It is shown that a non-negligible amount of network-wide traffic can be tolerated by network without any performance degradation in the... 

    A framework to support run-time assured dynamic reconfiguration for pervasive computing environments

    , Article 2006 1st International Symposium on Wireless Pervasive Computing, Phuket, 16 January 2006 through 18 January 2006 ; Volume 2006 , 2006 , Pages 1-6 ; 0780394100 (ISBN); 9780780394100 (ISBN) Hemmati, H ; Niamanesh, M ; Jalili, R ; Sharif University of Technology
    2006
    Abstract
    With the increasing use of pervasive computing environments (PCEs), developing dynamic reconfigurable software in such environments becomes an important issue. The ability to change software components in running systems has advantages such as building adaptive, long-life, and self-reconfigurable software as well as increasing invisibility in PCEs. As dynamic reconfiguration is performed in error-prone wireless mobile systems frequently, it can threaten system safety. Therefore, a mechanism to support assured dynamic reconfiguration at run-time for PCEs is required. In this paper, we propose an Assured Dynamic Reconfiguration Framework (ADRF) with emphasis on assurance analysis. The... 

    Distributed recovery units for demodulation in wireless sensor networks

    , Article First IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2005, Marina del Rey, CA, 30 June 2005 through 1 July 2005 ; Volume 3560 , 2005 , Pages 417-419 ; 03029743 (ISSN) Borhani, M ; Sedghi, V ; Sharif University of Technology
    Springer Verlag  2005
    Abstract
    In this paper, the distributed recovery units for FM and PPM demodulation in wireless sensor networks is proposed and is showed that, the method introduces very little amount of distortion to recovered signal. With simulations, we have examined several different parameters. Besides, two different filtering schemes are simulated. Effect of iteration coefficient (X) on stability and convergence rate is investigated for different sampling and filtering methods. Next, we have studied the noise effect in demodulation with this method. Simulations results are included to verify convergence. © Springer-Verlag Berlin Heidelberg 2005  

    A new coded cooperation scheme for wireless communications and its performance analysis

    , Article International Journal of Wireless Information Networks ; Volume 15, Issue 1 , 2008 , Pages 43-52 ; 10689605 (ISSN) Jamshidi, A ; Nasiri Kenari, M ; Sharif University of Technology
    2008
    Abstract
    We propose a new coded cooperation scheme for wireless communications to obtain transmit diversity in the scenarios that agents such as mobile handsets, sensor network nodes and etc., due to size, power or other constraints, cannot utilize multiple antennas. New scheme supports more than two cooperative users with a relatively low cooperation level. We evaluate the performance of the proposed scheme in a frequency nonselective slow fading channel. For two cooperative users, we provide the exact analytical analysis. However, for more than two users, as the analytical analysis is very complicated, our performance evaluation is based on computer simulations. Our numerical results show that each... 

    A novel joint routing and power management algorithm for energy-constraint Ad-hoc Sensor Network

    , Article 24th IEEE International Performance, Computing, and Communications Conference, IPCCC 2005, Phoenix, AZ, 7 April 2005 through 9 April 2005 ; 2005 , Pages 395-400 Farrokhfal, Y. G ; Shah Mansouri, V ; Pakravan, M. R ; Dahlberg T ; Oliver R ; Sen A ; Xue G ; Sharif University of Technology
    2005
    Abstract
    In this paper a combination of routing and power management within the context of wireless Ad-hoc Sensor Networks is considered. Using lower layer information (e.g. collision that is considered in MAC layer) is another novel concern which is used in routing decisions. More specifically in this paper we introduce a cross-layer design in which each node dynamically chooses the number of its neighbors and adjusts its power just enough to reach its farthest determined neighbor. In this algorithm the power of transmission and collision are used as metrics for routing and the number of neighbors in which the total energy consumption in data transmission will be the minimum is selected. © 2005 IEEE... 

    Modified distributed mediation device for low power consumption in large scale sensor networks

    , Article 2nd International Conference on Intelligent Sensing and Information Processing, ICISIP'05, Chennai, 4 January 2005 through 7 January 2005 ; Volume 2005 , 2005 , Pages 7-12 ; 0780388402 (ISBN); 9780780388406 (ISBN) Shahmansouri, V ; Ghannad Rezaie, M ; Pakravan, H. R ; Sharif University of Technology
    2005
    Abstract
    This paper proposes a new medium-access control (MAC) protocol designed for wireless sensor networks. A wireless sensor network is an array of large number of sensors interconnected by a multi-hop ad-hoc network. The fundamental objective for sensor network is low-power consumption while latency is usually less important. This characteristic of sensor network motivates different MAC laver design from the conventional wireless network to reduce power consumption. In this paper novel algorithm based on distributed mediation device (DMD) protocol has been introduced that utilized distributed node scheduling strategy to dramatically increase energy saving principally in intermediate devices... 

    Rate regions of secret key sharing in a new source model

    , Article IET Communications ; Volume 5, Issue 4 , March , 2011 , Pages 443-455 ; 17518628 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, while at the other side via a public channel where three users can observe i.i.d. outputs of correlated sources. Each of users 1 and 2 intends to share a secret key with user 3 where user 1 acts as a wiretapper for user 2 and vice versa. In this model, two situations are considered: communication from users 1 and 2 to user 3 (the forward key strategy) and from user 3 to users 1 and 2 (the backward key strategy). In both situations, the goal is sharing a secret key between user 1 and user 3 while leaking no effective information... 

    A survey of system platforms for mobile payment

    , Article Proceedings - 2010 International Conference on Management of e-Commerce and e-Government, ICMeCG 2010, 23 October 2010 through 24 October 2010 ; 2010 , Pages 376-381 ; 9780769542454 (ISBN) Asadi Tehrani, M ; Amidian, A. A ; Muhammadi, J ; Rabiee, H. R ; Sharif University of Technology
    Abstract
    With the evolution and significant growth in wireless technology and the development of mobile commerce, businesses can achieve superior performance through the implementation of platforms for mobile payment. However, there are several platforms for mobile payment to choose from which makes the selection of an appropriate platform for specific applications a challenging task. In response to this challenge, the most common mobile payment platforms recorded in the literature have been reviewed. This paper presents the result of this review describing the advantages and disadvantages of each system and offers ranking of the technologies considered. MCDM method is used for assessing and... 

    Energy harvesting systems with continuous energy and data arrivals: The optimal offline and heuristic online algorithms

    , Article IEEE Journal on Selected Areas in Communications ; Volume 34, Issue 12 , 2016 , Pages 3739-3753 ; 07338716 (ISSN) Rezaee, M ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Energy harvesting has been developed as an effective technology for communication systems in order to extend their lifetime. In this paper, we consider a single-user energy harvesting wireless communication system, in which arrival data and harvested energy curves are modeled as continuous functions. Our first goal is to find an offline algorithm, which maximizes the amount of data, which is transmitted to the receiver node by a given deadline. If more than one scheme exists that transmits the maximum data, we choose the one with minimum utilized energy at the transmitter node. We find this optimal algorithm, by showing its properties. Next, we propose an online algorithm for this system and... 

    Matching theory: Applications in wireless communications

    , Article IEEE Signal Processing Magazine ; Volume 33, Issue 6 , 2016 , Pages 103-122 ; 10535888 (ISSN) Bayat, S ; Li, Y ; Song, L ; Han, Z ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Matching theory is a powerful tool to study the formation of dynamic and mutually beneficial relations among different types of rational and selfish agents. It has been widely used to develop high performance, low complexity, and decentralized protocols. In this article, a comprehensive survey of matching theory, its variants, and their significant properties appropriate for the demands of wireless communications and network engineers is provided. Recent research progress in applying matching theory to wireless communications to address major technical opportunities and challenges is presented. A novel classification of matching models from the practical perspective is provided, and the... 

    Impact of jitter mechanisms on metric-based wireless routing protocols

    , Article 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 March 2016 through 25 March 2016 ; 2016 , Pages 574-578 ; 9781467393379 (ISBN) Rezaei, S ; Hemmatyar, A. M. A ; Cognizant; DRDO; et al.; IEEE; ISRO; SSN ; Sharif University of Technology
    Presses Polytechniques Et Universitaires Romandes 
    Abstract
    In many wireless communication protocols, small and random delay, called jitter, is imposed before packet transmission so as to reduce packet collisions. Jitter is recommended for many routing protocols such as AODV and LOADng. Jitter can be exploited to change the order of routes about which destination is informed and, as a result, make better routes, regarding their metric, more likely to choose by the destination. However, to the best of our knowledge, there is only one mechanism, called adaptive jitter mechanism, proposed for metric-based routing protocols. In this paper, we aim to show feasibility of using different random variables for jittering and define some shaping functions to... 

    An optimal transmission policy for energy harvesting systems with continuous curves

    , Article 12th International Symposium on Wireless Communication Systems, 25 August 2015 through 28 August 2015 ; Volume 2016-April , 2015 , Pages 411-415 ; 21540217 (ISSN) ; 9781467365406 (ISBN) Rezaee, M ; Kaboli, R ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    VDE Verlag GmbH 
    Abstract
    Energy harvesting has been developed as an effective technology for communication systems in order to extend the lifetime of these systems. In this work, we consider a single-user energy harvesting wireless communication system, in which both of the arrival data and the harvested energy curves are modeled as continuous functions. Our goal is to find an offline algorithm, which maximizes the amount of data which is transmitted to the receiver node by a given deadline. If more than one scheme exist that transmit the maximum data, we choose the one with minimum utilized energy at the transmitter node  

    Recovery of sensors in wireless sensor networks

    , Article NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC, 25 August 2009 through 27 August 2009, Seoul ; 2009 , Pages 393-396 ; 9780769537696 (ISBN) Barati, A ; Kholghi, M. A. K ; Movaghar, A ; Sharif University of Technology
    Abstract
    the failure in cluster at a high level can bring up great damages to the system in wireless sensor networks where clustering techniques are used. Certain methods have been reported in the literature in recovering the sensors from a failure cluster. One of the most important methods is to recover the sensors in run-time and without clustering. But it is so much ideal to suppose that all the sensors will be recovered. In this paper, we proposed a method that can operate on the remained sensors that are not recovered. © 2009 IEEE  

    Cache-aided fog radio access networks with partial connectivity

    , Article IEEE Wireless Communications and Networking Conference, WCNC ; Volume 2018-April , 8 June , 2018 , Pages 1-6 ; 15253511 (ISSN) ; 9781538617342 (ISBN) Roushdy, A ; Motahari,S. A ; Nafie, M ; Gunduz, D ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Centralized coded caching and delivery is studied for a partially-connected fog radio access network (F-RAN), whereby a set of H edge nodes (ENs) (without caches), connected to a cloud server via orthogonal fronthaul links, serve K users over the wireless edge. The cloud server is assumed to hold a library of N files, each of size F bits; and each user, equipped with a cache of size MF bits, is connected to a distinct set of r ENs; or equivalently, the wireless edge from the ENs to the users is modeled as a partial interference channel. The objective is to minimize the normalized delivery time (NDT), which refers to the worst case delivery latency, when each user requests a single file from... 

    Delay-optimal static relaying policy in a slotted aloha wireless network

    , Article 2018 Iran Workshop on Communication and Information Theory, IWCIT 2018, 25 April 2018 through 26 April 2018 ; 2018 , Pages 1-6 ; 9781538641491 (ISBN) Vaezi, K ; Ashtiani, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    We consider a slotted Aloha-based wireless communication network comprising a source and an active relay, both transmitting to a common destination. The relay node is able to relay the unsuccessfully transmitted packets of the source node, if it can detect them. We find the analytical closed form optimal static relaying policy in order to minimize the average transmission delay (ATD) of source packets, while ATD of its own packets is constrained. A static relaying policy is determined by acceptance and relaying probabilities of the relay node. According to acceptance probability, the relay node decides whether to accept an unsuccessfully transmitted packet from source or not, while the... 

    Errorless codes for over-loaded CDMA with active user detection

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Pad, P ; Soltanolkotabi, M ; Hadikhanlou, S ; Enayati, A ; Marvasti, F ; Sharif University of Technology
    2009
    Abstract
    In this paper we introduce a new class of codes for over-loaded synchronous wireless CDMA systems which increases the number of users for a fixed number of chips without introducing any errors. In addition these codes support active user detection. We derive an upper bound on the number of users with a fixed spreading factor. Also we propose an ML decoder for a subclass of these codes that is computationally implementable. Although for our simulations we consider a scenario that is worse than what occurs in practice, simulation results indicate that this coding/decoding scheme is robust against additive noise. As an example, for 64 chips and 88 users we propose a coding/decoding scheme that... 

    A cross layered scheme for broadcasting at intersections in vehicular ad hoc networks

    , Article Proceedings - 2009 International Conference on Future Networks, ICFN 2009, 7 March 2009 through 9 March 2009, Bangkok ; 2009 , Pages 13-17 ; 9780769535678 (ISBN) Nasri, A ; Fathy, M ; Hajisheykhi, R ; Sharif University of Technology
    2009
    Abstract
    In this paper, we illustrate the design of a cross layered MAC and routing solution for supporting the fast propagation of broadcast messages at intersections in a Vehicular Ad Hoc Network (VANET). One of the fundamental services in VANET is broadcasting, that is a challenging task due to different road topologies and network conditions. One of its challenges is broadcasting at intersections, because vehicles in different roads constituting an intersections can affect on broadcast process of other roads, message may not be propagated in some directions. In this paper we propose a cross layered method that by classifying vehicles based on their location and the road they move in, solves this... 

    Optimal allocation of available transfer capability in operating horizon

    , Article IEEE Transactions on Power Systems ; Volume 24, Issue 2 , 2009 , Pages 967-975 ; 08858950 (ISSN) Rajabi Ghahnavieh, A ; Fotuhi Firuzabad, M ; Shahidehpour, M ; Feuillet, R ; Sharif University of Technology
    2009
    Abstract
    When there are transmission service requests for a specific sink/source pair in a transmission system, the ISO must allocate the available transfer capacity (ATC) of that pair to the requests. Since the requests could have different types, tariffs and time frames, the allocation must be accomplished in a sound and fair manner that incorporates various aspects of the requests. This paper proposes a comprehensive approach to allocation of ATC to transmission service requests. The proposed method considers types, tariffs, and priority of requests in a mixed-integer nonlinear optimization which incorporates the allocation rules. The solution to the optimization problem gives the amount of... 

    Survivability analysis of wireless sensor network with transient faults

    , Article 2008 International Conference on Computational Intelligence for Modelling Control and Automation, CIMCA 2008, Vienna, 10 December 2008 through 12 December 2008 ; 2008 , Pages 975-980 ; 9780769535142 (ISBN) Masoum, A. R ; Jahangir, A. H ; Taghikhaki, Z ; Sharif University of Technology
    2008
    Abstract
    To the best knowledge of us, survivability for WSN has never been studied considering failure affects on network. We perceive the network survivability as a composite measure consisting of both network failure duration and failure impact on the network. In this paper we will study network survivability in unstably state: in this state, network is affected by the failures that occur temporarily and instantly also may occur several times. In other words, the main characteristics of these failures are their frequency and being temporary. In this paper we will propose a survivability model for network in unstable state that is based on network availability. This availability model, presents... 

    Fair resource allocation in Ad hoc networks in the presence of delay

    , Article INDICON 2008 IEEE Conference and Exhibition on Control, Communications and Automation, Kanpur, 11 December 2008 through 13 December 2008 ; Volume 1 , 2008 , Pages 159-164 ; 9781424427475 (ISBN) Naseri, Z ; Haeri, M ; Sharif University of Technology
    IEEE Computer Society  2008
    Abstract
    In this paper, the problem of resource allocation at an Ad hoc network with nodes not using any infrastructure to cooperate with each other is considered. By using a simple interference model in wireless links, the convergence and stability of a fair resource allocation scheme in the absence of delay is investigated. Also, the local stability of the scheme in the presence of upper-bounded delay is verified. Simulations results illustrate the convergence and fairness of this scheme considering different initial states for different sources. The performance of the scheme in the presence of different disturbances for each flow in transient and steady state along with its local stability in the...