Loading...
Search for: wireless-telecommunication-systems
0.013 seconds
Total 184 records

    On medium chemical reaction in diffusion-based molecular communication: a two-way relaying example

    , Article IEEE Transactions on Communications ; 2018 ; 00906778 (ISSN) Farahnak Ghazani, M ; Aminian, G ; Mirmohseni, M ; Gohari, A ; Nasiri Kenari, M ; Sharif University of Technology
    Abstract
    Chemical reactions are a prominent feature of molecular communication (MC) systems, with no direct parallels in wireless communications. While chemical reactions may be used inside the transmitter nodes, receiver nodes or the communication medium, we focus on its utility in the medium in this paper. Such chemical reactions can be used to perform computation over the medium as molecules diffuse and react with each other (physical-layer computation). We propose the use of chemical reactions for the following purposes: (i) to reduce signal-dependent observation noise of receivers by reducing the signal density, (ii) to realize molecular physical-layer network coding (molecular PNC) by... 

    Routing, data gathering, and neighbor discovery in delay-tolerant wireless sensor networks

    , Article 23rd IEEE International Parallel and Distributed Processing Symposium, IPDPS 2009, Rome, 23 May 2009 through 29 May 2009 ; 2009 ; 9781424437504 (ISBN) Nayebi, A ; Sarbazi Azad, H ; Karlsson, G ; IEEE Computer Society Technical Committee on Parallel Processing ; Sharif University of Technology
    2009
    Abstract
    This paper investigates a class of mobile wireless sensor networks that are not connected most of the times. The characteristics of these networks is inherited from both delay tolerate networks (DTN) and wireless sensor networks. First, delay-tolerant wireless sensor networks (DTWSN) are introduced. Then, three main problems in the design space of these networks are discussed: Routing, data gathering, and neighbor discovery. An approach is proposed for deployment of DTWSNs based on the traditional opportunistic broadcast in delay tolerant networks with on-off periods. The delay and the throughput of the routing scheme were investigated in the DTN literature. However, the energy consumption... 

    Improvement of fault detection in wireless sensor networks

    , Article 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, Sanya, 8 August 2009 through 9 August 2009 ; Volume 4 , 2009 , Pages 644-646 ; 9781424442461 (ISBN) Khazaei, E ; Barati, A ; Movaghar, A ; Yangzhou University; Guangdong University of Business Studies; Wuhan Institute of Technology; IEEE SMC TC on Education Technology and Training; IEEE Technology Management Council ; Sharif University of Technology
    2009
    Abstract
    This paper presents a centralized fault detection algorithm for wireless sensor networks. Faulty sensor nodes are identified based on comparisons between neighboring nodes and own central node and dissemination of the decision made at each node. RNS system is used to tolerate transient faults in sensing and communication. In this system, arithmetic operations act on residues - reminder of dividing original number in several definite modules - in parallel. Consequently computations on these residues which are smaller than the original number are performed, so speed up arithmetic and decreased power consumption is achieved. ©2009 IEEE  

    PPMN: a resilient public peer-to-peer mesh network of IEEE802.16 users

    , Article 2009 International Conference on Signal Processing Systems, ICSPS 2009, Singapore, 15 May 2009 through 17 May 2009 ; 2009 , Pages 488-492 ; 9780769536545 (ISBN) Kavianfar, A ; Habibi, J ; Sharif University of Technology
    2009
    Abstract
    In these days, IEEE802.16 protocol is being developed and in the next years, 802.16 modems will be used in every house to connect to the Internet through base-stations in both urban and rural areas. Since user bandwidth for connection to the Internet is limited, a large fraction of each modem's bandwidth is not used. In this paper, we propose an architecture to construct a public peer-to-peer mesh network using the non-utilized bandwidth of independent 802.16 users. The architecture is composed of a routing algorithm, a forwarding incentive mechanism, and a security-resiliency scheme. Design challenges are discussed in each case. © 2009 IEEE  

    A new power allocation scheme for amplify and forward incremental relaying

    , Article 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2009, Perugia, 21 June 2009 through 24 June 2009 ; 2009 , Pages 494-498 ; 9781424436965 (ISBN) Tabataba, F. S ; Sadeghi, P ; Pakravan, M. R ; Sharif University of Technology
    2009
    Abstract
    In this paper, we present a novel power allocation scheme for amplify and forward incremental relaying (IR) systems with the aim to minimize the overall outage probability at the destination. In our problem formulation, we take into account the outage-dependent activation of the relay when writing the power constraint. We provide a simple closed-form solution to the IR power allocation problem that is based on high signal-to-noise (SNR) approximation of the outage probability assuming maximum ratio combining (MRC) at the destination. We investigate the effectiveness of the proposed solution by comparing the achieved outage probabilities with those obtained through global numerical search. We... 

    Optimal DG placement in distribution systems using cost/worth analysis

    , Article World Academy of Science, Engineering and Technology ; Volume 37 , 2009 , Pages 746-753 ; 2010376X (ISSN) Ahmadigorji, M ; Abbaspour, A ; Rajabi Ghahnavieh, A ; Fotuhi Firuzabad, M ; Sharif University of Technology
    2009
    Abstract
    DG application has received increasing attention during recent years. The impact of DG on various aspects of distribution system operation, such as reliability and energy loss, depend highly on DG location in distribution feeder. Optimal DG placement is an important subject which has not been fully discussed yet. This paper presents an optimization method to determine optimal DG placement, based on a cost/worth analysis approach. This method considers technical and economical factors such as energy loss, load point reliability indices and DG costs, and particularly, portability of DG. The proposed method is applied to a test system and the impacts of different parameters such as load growth... 

    Errorless codes for over-loaded CDMA with active user detection

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Pad, P ; Soltanolkotabi, M ; Hadikhanlou, S ; Enayati, A ; Marvasti, F ; Sharif University of Technology
    2009
    Abstract
    In this paper we introduce a new class of codes for over-loaded synchronous wireless CDMA systems which increases the number of users for a fixed number of chips without introducing any errors. In addition these codes support active user detection. We derive an upper bound on the number of users with a fixed spreading factor. Also we propose an ML decoder for a subclass of these codes that is computationally implementable. Although for our simulations we consider a scenario that is worse than what occurs in practice, simulation results indicate that this coding/decoding scheme is robust against additive noise. As an example, for 64 chips and 88 users we propose a coding/decoding scheme that... 

    An upper bound on the performance of non-repetitive flooding over CSMA in wireless ad-hoc networks

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Shah Mansouri, H ; Pakravan, M. R ; Sharif University of Technology
    2009
    Abstract
    Although flooding and its variants are widely deployed for broadcasting by different applications, there are limited results on a complete and comprehensive analytical framework describing their behavior in general cases. We have previously published results which provide an upper bound for the performance of flooding when flooded packets have the highest serving priority. In this paper, using a different and simpler approach, we develop an analytical framework for analysis of flooding in general cases where flooding packets do not receive any special priority treatment in the network. The analysis is performed for a static multi-hop ad hoc wireless network using CSMA as its MAC layer. The... 

    The CBK-Neigh protocol for symmetric topology control in ad hoc networks

    , Article Proceedings - 2009 3rd International Conference on Sensor Technologies and Applications, SENSORCOMM 2009, 18 June 2009 through 23 June 2009, Athens, Glyfada ; 2009 , Pages 588-595 ; 9780769536699 (ISBN) Jalalinia, F ; Ghasemi, S ; Sharif University of Technology
    2009
    Abstract
    In this paper, an approach for topology control has been proposed which make use of distance estimation and angle of arrival (AoA) estimation techniques. Every node in the network tries to keep the number of its neighbors to 4 or 3. These neighbors have been selected from the nearest neighbors of each node and are located in different four quarters of axis. The angular difference between these neighbors is between a minimum and maximum value. This protocol guarantees connectivity on the communication graph with high probability and enforces symmetry on the resulting communication graph, thereby easing the operation of higher level protocols. The performance of the protocol when nodes are... 

    A cross layered scheme for broadcasting at intersections in vehicular ad hoc networks

    , Article Proceedings - 2009 International Conference on Future Networks, ICFN 2009, 7 March 2009 through 9 March 2009, Bangkok ; 2009 , Pages 13-17 ; 9780769535678 (ISBN) Nasri, A ; Fathy, M ; Hajisheykhi, R ; Sharif University of Technology
    2009
    Abstract
    In this paper, we illustrate the design of a cross layered MAC and routing solution for supporting the fast propagation of broadcast messages at intersections in a Vehicular Ad Hoc Network (VANET). One of the fundamental services in VANET is broadcasting, that is a challenging task due to different road topologies and network conditions. One of its challenges is broadcasting at intersections, because vehicles in different roads constituting an intersections can affect on broadcast process of other roads, message may not be propagated in some directions. In this paper we propose a cross layered method that by classifying vehicles based on their location and the road they move in, solves this... 

    A new fractional call admission control scheme in integrated cellular network

    , Article Proceedings of 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, 7 June 2009 through 9 June 2009, Windsor, ON ; 2009 , Pages 332-337 ; 9781424433551 (ISBN) Mortazavi Far, L ; Beigy, H ; Sharif University of Technology
    2009
    Abstract
    This paper presents a new model of call admission control which consists of a few key elements for protecting the network in different conditions of workload in a manner that, calls blocking /dropping are kept under desired level. This model consists of two traffic classes of voice and data. In order to give a priority to handoff call over new call, some parameters in this model are adjusted in a manner that handoff dropping is reduced to the least probability in the target cell and the adjacent cells. Some channels are reserved for voice and data calls in each cell to guarantee the quality of service requirements in the network. Limited fractional guard channel is used to have an optimized... 

    Lightweight secure IP address auto-configuration based on VASM

    , Article Proceedings - International Conference on Advanced Information Networking and Applications, AINA, 26 May 2009 through 29 May 2009, Bradford ; 2009 , Pages 176-180 ; 1550445X (ISSN); 9780769536392 (ISBN) Tajamolian, M ; Taghiloo, M ; Tajamolian, M ; Sharif University of Technology
    2009
    Abstract
    Mobile ad hoc networks allow to create very dynamic communication systems, which are independent from any fixed infrastructure. One of the most important issues regarding the management of an ad hoc network is the configuration of the system according to the way users move. Since a centralized control structure does not exist, we need to determine how the IP addresses must be assigned to the nodes in the network. In this paper we add a security mechanism to VASM protocol based on zero knowledge approach. A hash function has very low running time. So this so this scheme is very light-weight. The VASM protocol uses coordinate value of point in main address sheet for generating addresses. The... 

    Analytical evaluation of average delay and maximum stable throughput along a typical two-way street for vehicular ad hoc networks in sparse situations

    , Article Computer Communications ; Volume 32, Issue 16 , 2009 , Pages 1768-1780 ; 01403664 (ISSN) Javanmard, A ; Ashtiani, F ; Sharif University of Technology
    2009
    Abstract
    Intermittent connectivity is an intrinsic feature of vehicular ad hoc networks (VANETs) in sparse situations. This type of network is in fact an example of delay and disruption tolerant networks (DTNs). In this paper, we focus on a typical two-way street and analytically evaluate the maximum stable throughput and the average delay for packet forwarding along the street. To this end, we map the mobility patterns of the vehicles with different speeds onto suitable parameters of a BCMP queueing network and derive the location density of vehicles. Then, we employ another queueing network in order to model opportunistic multi-hop packet forwarding along the street with respect to the... 

    Energy-efficient speed routing protocol for wireless sensor networks

    , Article 2009 5th Advanced International Conference on Telecommunications, AICT 2009, Venice, Mestre, 24 May 2009 through 28 May 2009 ; 2009 , Pages 267-271 ; 9780769536118 (ISBN) Kordafshari, M. S ; Pourkabirian, A ; Faez, K ; Rahimabadi, A. M ; IARIA ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose an approach for routing in SPEED protocol considering residual energy in routing decisions. Due to the limited energy of a sensor node, energyefficient routing is a very important issue in sensor networks. This approach finds energy-efficient paths for delayconstrained data in real-time traffic. The SPEED protocol does not consider any energy metric in its routing. In our approach, routing is based on a weight function, which is a combination of the three factors: Delay, Energy & Speed. Here, the node with the greatest value in the weight function is to be selected as the next hop forwarding. We increase the network lifetime by considering energy metric in routing... 

    An analytical performance evaluation for WSNs using loop-free bellman ford protocol

    , Article 2009 International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, 26 May 2009 through 29 May 2009 ; 2009 , Pages 568-571 ; 1550445X (ISSN); 9780769536385 (ISBN) Baharloo, M ; Hajisheykhi, R ; Arjomand, M ; Jahangir, A. H ; IEEE Computer Society ; Sharif University of Technology
    2009
    Abstract
    Although several analytical models have been proposed for wireless sensor networks (WSNs) with different capabilities, very few of them consider the effect of general service distribution as well as design constraints on network performance. This paper presents a new analytical model to compute message latency in a WSN with loop-free Bellman Ford routing strategy. The model considers limited buffer size for each node using M/G/1/k queuing system. Also, contention probability and resource utilization are suitably modeled. The results obtained from simulation experiments confirm that the model exhibits a high degree of accuracy for various network configurations. © 2009 IEEE  

    A new routing algorithm for sparse vehicular AD HOC networks with moving destinations

    , Article 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009, Budapest, 5 April 2009 through 8 April 2009 ; 2009 ; 15253511 (ISSN); 9781424429486 (ISBN) Ghaffari, M ; Ashtian, F ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose the Object Pursuing based Efficient Routing Algorithm (OPERA) suitable for vehicular ad hoc networks (VANETs), esp. in sparse situations. The proposed algorithm is applicable for both moving and fixed destinations. It is based on considering static nodes at each intersection. In this algorithm, we optimize the decision making at intersections, with respect to the connectivity and feasibilty of the roads. To this end, we consider the average delay of each road as the connectivity metric, and the vehicle availability in the transmission range of the intersection as the feasibility metric. By exploiting the related metrics, we select the next road to forward the packet... 

    Cost-aware reactive monitoring in resource-constrained wireless sensor networks

    , Article 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009, Budapest, 5 April 2009 through 8 April 2009 ; 2009 ; 15253511 (ISSN); 9781424429486 (ISBN) Talebi, M ; Khonsari, A ; Jabarvand, R ; Sharif University of Technology
    2009
    Abstract
    Motivated by applications of sensor networks, there has been growing interest in monitoring large scale distributed systems. In these applications, we usually wish to monitor a global system condition defined as a function of local network elements parameters. In this paper, we study Reactive Monitoring in sensor networks, which has the benefit of operating in a decentralized manner. Our primary concern in adopting such a monitoring paradigm is reducing the communication cost which is the dominant factor of energy drain in wireless sensor networks. In this study, we address the reactive aggregate monitoring problem by casting the underlying threshold assignment as an optimization problem.... 

    A bayesian game approach for preventing DoS attacks in wireless sensor networks

    , Article Proceedings - 2009 WRI International Conference on Communications and Mobile Computing, CMC 2009, 6 January 2009 through 8 January 2009, Kunming, Yunnan ; Volume 3 , 2009 , Pages 507-511 ; 9780769535012 (ISBN) Mohi, M ; Movaghar, A ; Zadeh, P. M ; Sharif University of Technology
    2009
    Abstract
    Wireless sensor networks (WSNs) are a new technology, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act... 

    Optimal allocation of available transfer capability in operating horizon

    , Article IEEE Transactions on Power Systems ; Volume 24, Issue 2 , 2009 , Pages 967-975 ; 08858950 (ISSN) Rajabi Ghahnavieh, A ; Fotuhi Firuzabad, M ; Shahidehpour, M ; Feuillet, R ; Sharif University of Technology
    2009
    Abstract
    When there are transmission service requests for a specific sink/source pair in a transmission system, the ISO must allocate the available transfer capacity (ATC) of that pair to the requests. Since the requests could have different types, tariffs and time frames, the allocation must be accomplished in a sound and fair manner that incorporates various aspects of the requests. This paper proposes a comprehensive approach to allocation of ATC to transmission service requests. The proposed method considers types, tariffs, and priority of requests in a mixed-integer nonlinear optimization which incorporates the allocation rules. The solution to the optimization problem gives the amount of... 

    Modeling nonsaturated contention-based IEEE 802.11 multihop ad hoc networks

    , Article IEEE Transactions on Vehicular Technology ; Volume 58, Issue 7 , 2009 , Pages 3518-3532 ; 00189545 (ISSN) Ghaboosi, K ; Latva-Aho, M ; Xiao, Y ; Khalaj, B. H ; Sharif University of Technology
    2009
    Abstract
    The IEEE 802.11 contention-based distributed coordination function has been used in ad hoc networks, and so far, a comprehensive mathematical analysis of such multihop systems has not been reported in the literature due to complicating factors such as hidden terminals and the unreachability problem. In this paper, we propose a new analytical model based on the parallel space-time Markov chain for IEEE 802.11 medium access control (MAC) in multihop ad hoc networks. The proposed scheme is able to model the hidden-terminal and unreachability phenomena. Extensive evaluation is conducted to demonstrate the accuracy of the proposed framework. © 2009 IEEE