Loading...
Search for: wireless-telecommunication-systems
0.015 seconds
Total 184 records

    Caching gain in wireless networks with fading: A multi-user diversity perspective

    , Article IEEE Wireless Communications and Networking Conference, WCNC ; 2014 , p. 930-935 Shariatpanahi, S. P ; Shah Mansouri, H ; Khalaj, B. H ; Sharif University of Technology
    Abstract
    We consider the effect of caching in wireless networks where fading is the dominant channel effect. First, we propose a one-hop transmission strategy for cache-enabled wireless networks, which is based on exploiting multi-user diversity gain. Then, we derive a closed-form result for throughput scaling of the proposed scheme in large networks, which reveals the inherent trade-off between cache memory size and network throughput. Our results show that substantial throughput improvements are achievable in networks with sources equipped with large cache size. We also verify our analytical result through simulations  

    Achievable throughput of wireless networks with local traffic

    , Article IEEE Wireless Communications and Networking Conference, WCNC ; 10 November , 2014 , Pages 3076-3081 ; ISSN: 15253511 ; ISBN: 9781479930838 Shariatpanahi, S. P ; Khalaj, B. H ; Shah-Mansouri, H ; Sharif University of Technology
    Abstract
    Many applications in wireless networks impose locally distributed traffic on the network. We consider the effect of traffic localization on throughput of large wireless networks in the scaling sense. We show that by careful exploitation of traffic localization, one can enhance the throughput of various schemes in wireless networks. Also, the important case of Small World traffic distribution in wireless networks is addressed. In this type of traffic, in addition to the local traffic, a non-negligible amount of global traffic should be handled by the network. It is shown that a non-negligible amount of network-wide traffic can be tolerated by network without any performance degradation in the... 

    An energy-efficient multi-sensor scheduling mechanism with QoS support for WBANs

    , Article IEEE Wireless Communications and Networking Conference, WCNC ; 2014 , pp. 1703-1708 ; ISSN: 15253511 Omidvar, H ; Ashtiani, F ; Javidi, T ; Nasiri-Kenari, M ; Vahdat, B. V ; Sharif University of Technology
    Abstract
    In wireless body area networks (WBANs) it is necessary to devise an energy-efficient MAC scheduling mechanism which is capable of meeting strict QoS requirements. In this paper, special characteristics of WBAN channels, namely, the slow fading, the periodicity of fading, and the correlation among the channels have been exploited to formulate the sensor scheduling problem as a partially observable Markov decision problem (POMDP). Specific algorithms based on value iteration and pruning have been proposed in order to reduce the computational burden associated with the corresponding POMDP. The proposed scheduling mechanism is compared against a TDMA scheduling for a three-sensor network, and an... 

    Effects of geometrical uncertainties on ray tracing results for site-specific indoor propagation modeling

    , Article Proceedings of the 2013 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications, IEEE APWC 2013 ; 2013 , Pages 836-839 ; 9781467356893 (ISBN) Mohtashami, V ; Shishegar, A. A ; Sharif University of Technology
    Abstract
    The plan of the environment used in a ray tracing simulation is not usually in exact accordance with the actual environment plan. Errors on the order of several centimeters may be present in describing the lateral wall positions. Such errors are comparable to the wavelength in indoor wireless applications and hence, can severely alter the phases of multipath components and lead to inaccurate electromagnetic field at the receiver. In this paper, the impact of this type of geometrical errors on the ray tracing results is investigated. Lateral wall positions are considered as random variables to account for possible geometrical errors. The statistical moments of some channel parameters are... 

    A new approach to fast decode quasi-orthogonal space-time block codes

    , Article IEEE Transactions on Wireless Communications ; Volume 14, Issue 1 , 2015 , Pages 165-176 ; 15361276 (ISSN) Ahmadi, A ; Talebi, S ; Shahabinejad, M ; Sharif University of Technology
    Abstract
    Motivated by the statistical correspondence between phases of the transmitted and received vectors, we present a fast decoding method for quasi-orthogonal space-time block codes (QOSTBCs) in this paper. The proposed decoder selects proper candidates from precomputed and sorted sets by focusing on the phase of a specific entry of the combined and decoupled vector. The ML metric of the most probable candidates is first evaluated, and then, the remaining candidates are assessed based on the similarity between the phases. The new algorithm can work with any type of constellation such as QAM and PSK and supports generalized block-diagonal QOSTBCs. Theoretical results backed by simulation tests... 

    A survey of system platforms for mobile payment

    , Article Proceedings - 2010 International Conference on Management of e-Commerce and e-Government, ICMeCG 2010, 23 October 2010 through 24 October 2010 ; 2010 , Pages 376-381 ; 9780769542454 (ISBN) Asadi Tehrani, M ; Amidian, A. A ; Muhammadi, J ; Rabiee, H. R ; Sharif University of Technology
    Abstract
    With the evolution and significant growth in wireless technology and the development of mobile commerce, businesses can achieve superior performance through the implementation of platforms for mobile payment. However, there are several platforms for mobile payment to choose from which makes the selection of an appropriate platform for specific applications a challenging task. In response to this challenge, the most common mobile payment platforms recorded in the literature have been reviewed. This paper presents the result of this review describing the advantages and disadvantages of each system and offers ranking of the technologies considered. MCDM method is used for assessing and... 

    Precision enhancement in ETSI-Hata propagation model tuning using experimental data in a dense urban area

    , Article International Journal of Communication Systems ; Volume 23, Issue 1 , 2010 , Pages 101-108 ; 10745351 (ISSN) Atamanesh, M ; Farzaneh, F ; Sharif University of Technology
    Abstract
    In this paper an enhanced ETSI-Hata propagation model tuning is presented. The three-dimensional (3D) digital terrain map (DTM) was included in the simulation process. For the enhancement of the model tuning process and precision verification of ETSI-Hata model, the real 3D map of the buildings of the simulated area was incorporated over the DTM. Multiple knife edge diffraction method and the antenna effective height method were used to calculate the diffraction loss. This method was applied for a real urban scenario. For every sector in the coverage area, a tuned model was exploited. Using a genetic algorithm, frequency planning for the entire urban area was performed, which resulted in an... 

    Nano-plasmonic thin-film solar cell receiver in visible light communication

    , Article 10th International Symposium on Communication Systems, Networks and Digital Signal Processing, 20 July 2016 through 23 July 2016 ; 2016 ; 9781509025268 (ISBN) Ghahremanirad, E ; Olyaee, S ; Chizari, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    We propose a nano-plasmonic thin-film solar cell (TFSC) as a receiver for the visible light communication (VLC). The presented design is a novel and optimized structure that can be used instead of photodetectors and power supplies in the VLC. The plasmonic TFSC that described in this work is capable of increasing the light absorption in comparison with the conventional thick Si solar cell without plasmonic nanostructures. However, plasmonic nanoparticles can improve the absorption of Si solar cell in a visible range of solar spectra. In this paper, different situations for inserting nanoparticles in an active layer are considered and the absorption is calculated as a function of particle... 

    Toward 5G: FiWi Enhanced LTE-A HetNets with Reliable Low-Latency Fiber Backhaul Sharing and WiFi Offloading

    , Article IEEE/ACM Transactions on Networking ; Volume PP, Issue 99 , 2016 ; 10636692 (ISSN) Beyranvand, H ; Levesque, M ; Maier, M ; Salehi, J. A ; Verikoukis, C ; Tipper, D ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    To cope with the unprecedented growth of mobile data traffic, we investigate the performance gains obtained from unifying coverage-centric 4G mobile networks and capacity-centric fiber-wireless (FiWi) broadband access networks based on data-centric Ethernet technologies with resulting fiber backhaul sharing and WiFi offloading capabilities. Despite recent progress on backhaul-aware 4G studies with capacity-limited backhaul links, the performance-limiting impact of backhaul latency and reliability has not been examined in sufficient detail previously. In this paper, we evaluate the maximum aggregate throughput, offloading efficiency, and in particular, the delay performance of FiWi enhanced... 

    Impact of jitter mechanisms on metric-based wireless routing protocols

    , Article 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, 23 March 2016 through 25 March 2016 ; 2016 , Pages 574-578 ; 9781467393379 (ISBN) Rezaei, S ; Hemmatyar, A. M. A ; Cognizant; DRDO; et al.; IEEE; ISRO; SSN ; Sharif University of Technology
    Presses Polytechniques Et Universitaires Romandes 
    Abstract
    In many wireless communication protocols, small and random delay, called jitter, is imposed before packet transmission so as to reduce packet collisions. Jitter is recommended for many routing protocols such as AODV and LOADng. Jitter can be exploited to change the order of routes about which destination is informed and, as a result, make better routes, regarding their metric, more likely to choose by the destination. However, to the best of our knowledge, there is only one mechanism, called adaptive jitter mechanism, proposed for metric-based routing protocols. In this paper, we aim to show feasibility of using different random variables for jittering and define some shaping functions to... 

    Cross-layer QSI-Aware radio resource management for HetNets with flexible backhaul

    , Article 2016 IEEE Wireless Communications and Networking Conference, 3 April 2016 through 7 April 2016 ; Volume 2016-September , 2016 ; 15253511 (ISSN) ; 9781467398145 (ISBN) Omidvar, N ; Zhang, F ; Liu, A ; Lau, V ; Tsang, D ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In this paper, we consider the problem of cross-layer radio resource management in heterogeneous networks (HetNets) with flexible backhaul, which aims at minimizing the total transmit power of base stations (BSs) while guaranteeing the average end-To-end data rate requirement of each data flow. We formulate the problem as a two-Timescale stochastic optimisation, where the long-Timescale control variables are flow control, routing control and interference coordination, while the short-Timescale control variable is instantaneous beamforming within each cell. Using a stochastic cutting plane (SCP) method, we propose a cross-layer queue-state information (QSI) aware radio resource management... 

    Ion pump based bio-synthetic modulator model for diffusive molecular communications

    , Article 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2016, 3 July 2016 through 6 July 2016 ; Volume 2016-August , 2016 ; 9781509017492 (ISBN) Arjmandi, H. R ; Jamali, V ; Ahmadzadeh, A ; Burkovski, A ; Schober, R ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In diffusive molecular communication (DMC), the transmitter has to be able to control the release of signaling molecules for modulation of the information bits. In natural cells, pumping ions is an important control mechanism for releasing molecules which is carried out by ion pumps embedded in the membrane. The activity of the ion pumps is controlled by a driving parameter. In particular, light driven pumps are controlled by light intensity and enable a high degree of spatial and temporal control for modulation functionality. In this paper, a modulator based on ion pumps is proposed for DMC which controls the release rate of the molecules from the transmitter by modulating a light intensity... 

    An optimal transmission policy for energy harvesting systems with continuous curves

    , Article 12th International Symposium on Wireless Communication Systems, 25 August 2015 through 28 August 2015 ; Volume 2016-April , 2015 , Pages 411-415 ; 21540217 (ISSN) ; 9781467365406 (ISBN) Rezaee, M ; Kaboli, R ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    VDE Verlag GmbH 
    Abstract
    Energy harvesting has been developed as an effective technology for communication systems in order to extend the lifetime of these systems. In this work, we consider a single-user energy harvesting wireless communication system, in which both of the arrival data and the harvested energy curves are modeled as continuous functions. Our goal is to find an offline algorithm, which maximizes the amount of data which is transmitted to the receiver node by a given deadline. If more than one scheme exist that transmit the maximum data, we choose the one with minimum utilized energy at the transmitter node  

    A study of the effect of diffraction and rough surface scatter modeling on ray tracing results in an urban environment at 60 GHz

    , Article 1st Conference on Millimeter-Wave and Terahertz Technologies, 29 December 2009 through 31 December 2009 ; 2009 , Pages 27-31 ; 9781424468089 (ISBN) Eslami Rasekh, M ; Shishegar, A. A ; Farzaneh, F ; Sharif University of Technology
    Abstract
    Channel characterization is an important step in the design of wireless communication systems. While channel sounding procedures are a useful method in determining channel behavior, they also require expensive and time consuming procedures and equipment. Ray tracing has been an important substitute for measurement in deterministic channel modeling and characterization of the wireless channel. Much has been done to improve the precision and efficiency of this method for lower frequency bands (generally below 5 GHz) over the years. Recently, with the worldwide announcement of a broad unlicensed band in the millimeter wave spectrum around 60 GHz, a great amount of attention has been paid to... 

    Worst case dimensioning and modeling of reliable real-time multihop wireless sensor network

    , Article Performance Evaluation ; Volume 66, Issue 12 , 2009 , Pages 685-700 ; 01665316 (ISSN) Mizanian, K ; Yousefi, H ; Jahangir, A. H ; Sharif University of Technology
    Abstract
    Wireless Sensor Network (WSN) should be capable of fulfilling its mission, in a timely manner and without loss of important information. In this paper, we propose a new analytical model for calculating RRT (Reliable Real-Time) degree in multihop WSNs, where RRT degree describes the percentage of real-time data that the network can reliably deliver on time from any source to its destination. Also, packet loss probability is modeled as a function of the probability of link failure when the buffer is full and the probability of node failure when node's energy is depleted. Most of the network properties are considered as random variables and a queuing theory based model is derived. In this... 

    A novel approach for avoiding wormhole attacks in VANET

    , Article 1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009, 3 November 2009 through 5 November 2009, Kathmundu ; 2009 ; 9781424445707 (ISBN) Safi, S. M ; Movaghar, A ; Mohammadizadeh, M ; Sharif University of Technology
    Abstract
    Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network... 

    A thermal-aware shortest hop routing algorithm for in vivo biomedical sensor networks

    , Article ITNG 2009 - 6th International Conference on Information Technology: New Generations, 27 April 2009 through 29 April 2009, Las Vegas, NV ; 2009 , Pages 1612-1613 ; 9780769535968 (ISBN) Tabandeh, M ; Jahed, M ; Ahourai, F ; Moradi, S ; Sharif University of Technology
    Abstract
    Implanted biomedical sensor networks provide a major application of sensor networks in the near future. Their high temperature due to wireless communication, might damage the surrounding tissues. This paper presents an efficient thermal-aware routing. Our proposed protocol states that when some nodes in the shortest path have a high temperature, ignores this path. The simulation results indicate the superiority of the proposed method compared to other thermal-aware routing protocols in terms of reducing temperature without a significant increase in packet delivery delay and power consumption of nodes. © 2009 IEEE  

    Mobility aware distributed topology control in mobile ad-hoc networks using mobility pattern matching

    , Article WiMob 2009 - 5th IEEE International Conference on Wireless and Mobile Computing Networking and Communication, 12 October 2009 through 14 October 2009, Marrakech ; 2009 , Pages 453-458 ; 9780769538419 (ISBN) Khaledi, MH ; Mousavi, S. M ; Rabiee, H. R ; Movaghar, A ; Khaledi, MJ ; Ardakanian, O ; Sharif University of Technology
    Abstract
    Topology control algorithms in mobile ad-hoc networks aim to reduce the power consumption while keeping the topology connected. These algorithms can preserve network resources and increase network capacity. However, few efforts have focused on the issue of topology control in presence of node mobility. One of the notable mobility aware topology control protocols is the "Mobility Aware Distributed Topology Control Protocol". The main drawback of this protocol is on its mobility prediction method. This prediction method assumes linear movements and is unable to cope with sudden changes in the mobile node movements. In this paper, we propose a pattern matching based mobility prediction method... 

    An energy efficient target tracking scheme for distributed wireless sensor networks

    , Article Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, ISWCS'09, 7 September through 10 September ; 2009 , Pages 136-140 ; 9781424435845 (ISBN) Jamali Rad, H ; Abolhassani, B ; Abdizadeh, M ; Sharif University of Technology
    Abstract
    We study the problem of power optimization for object tracking using distributed Wireless Sensor Networks (WSNs). The accuracy of the object tracking is dependent on the tracking time interval. Smaller tracking time interval increases the accuracy of tracking a moving object. However, this increases the power consumption significantly. This paper proposes a modified adaptive sleep time management scheme called Modified Predict and Mesh (MPaM) to adapt tracking time interval such that it minimizes power consumption while keeping an acceptable tracking accuracy. Also a quantitative analysis to compare the performances of the conventional PaM and proposed Modified PaM (MPaM) schemes is... 

    Recovery of sensors in wireless sensor networks

    , Article NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC, 25 August 2009 through 27 August 2009, Seoul ; 2009 , Pages 393-396 ; 9780769537696 (ISBN) Barati, A ; Kholghi, M. A. K ; Movaghar, A ; Sharif University of Technology
    Abstract
    the failure in cluster at a high level can bring up great damages to the system in wireless sensor networks where clustering techniques are used. Certain methods have been reported in the literature in recovering the sensors from a failure cluster. One of the most important methods is to recover the sensors in run-time and without clustering. But it is so much ideal to suppose that all the sensors will be recovered. In this paper, we proposed a method that can operate on the remained sensors that are not recovered. © 2009 IEEE