Loading...
Search for: wireless-telecommunication-systems
0.019 seconds
Total 184 records

    Some comments on wireless sensor networks for natural hazards

    , Article ACWR 2011 - Proceedings of the International Conference on Wireless Technologies for Humanitarian Relief, 18 December 2011 through 21 December 2011 ; December , 2011 , Pages 315-322 Grado Caffaro, M. A ; Grado Caffaro, M ; Ebrahimi, M. S ; Sharif University of Technology
    2011
    Abstract
    Presently, the urgency of creating efficient system to tackle natural hazards such as tsunamis, earthquakes, landslides and floods to cite just a few, have originated that Wireless Sensor Networks (WSNs) play an increasingly important role in the natural hazards scenario as an efficient early warning system, sometimes in synergy with satellites-GMES (Global Monitoring Earth Systems) and also with mobile robotics. Their integration into the web scenario, giving rise to the sensor-web technology, provides even more power to the intrinsic strengths of WSNs. The WSNs application in post-disaster scenarios is also an emerging challenging issue. In this paper the fundamental technology concepts of... 

    A price-based optimal routing algorithm in Wireless Sensor Networks

    , Article 7th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2011, 23 September 2011 through 25 September 2011 ; September , 2011 , Page(s): 1 - 6 ; ISSN : 2161-9646 ; 9781424462520 (ISBN) Emamjomeh, M ; Arisian, B ; Sharif University of Technology
    2011
    Abstract
    Routing methods and algorithms in "Wireless Sensor Networks" attract researchers' attention a lot recently. In order to find the optimal path in WSNs depending on their type and application, various algorithms are proposed. In this paper, an optimal path finding algorithm based on "Game Theory" is discussed and improved. This algorithm finds a path witch is optimizing network lifetime, load distribution, and path reliability simultaneously  

    Cross-layer rateless coding over wireless relay networks

    , Article IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, 4 July 2011 through 8 July 2011 ; July , 2011 , Pages 1545-1549 ; 9781424495399 (ISBN) Shirvani Moghaddam, M ; Khalaj, B. H ; Pasandshanjani, E ; Sharif University of Technology
    2011
    Abstract
    The focus of the paper is on cross-layer transmission based on rateless coding for relay networks. In the proposed method, rateless coding is used at the packet level and a separate physical layer coding is used at the physical layer. As rateless codes are originally designed and optimized for erasure channels, using these codes at the physical layer can lead to significant performance degradation. The proposed scheme has the advantage of a cross-layer design which uses a rateless code at the packet level modeled by an erasure channel. Based on the analysis and simulation results provided in this paper, the cross-layer scheme results in earlier successful decoding at the destination  

    QoS-aware joint policies in cognitive radio networks

    , Article IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, 4 July 2011 through 8 July 2011 ; July , 2011 , Pages 2220-2225 ; 9781424495399 (ISBN) Salehkaleybar, S ; Majd, S. A ; Pakravan, M. R ; Sharif University of Technology
    2011
    Abstract
    One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi secondary users (SUs) network. Quality of Service (QoS) requirements for SUs have significant implications on this protocol design. In this paper, we propose a new method to find joint policies for SUs which not only tries to guarantee QoS requirements but also maximize network throughput. We use Decentralized Partially Observable Markov Decision Process (Dec-POMDP) to formulate interactions between SUs. Meanwhile, a tractable approach for Dec-POMDP is utilized to extract sub-optimum joint policies for large horizons. Among these policies, the QoS-aware joint... 

    A new cost function for game theoretic SIR-based power control algorithms

    , Article IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference, 4 July 2011 through 8 July 2011 ; July , 2011 , Pages 1147-1151 ; 9781424495399 (ISBN) Pasandshanjani, E ; Khalaj, B. H ; Moghaddam, M. S ; Sharif University of Technology
    2011
    Abstract
    In this paper, we introduce a new cost function for SIR-Based uplink power control algorithms that takes into account transmission power level as well as target Signal-to-Interference Ratio (SIR) deviation. Existence of Nash equilibrium point, its uniqueness and the algorithm convergence are proved in the framework of so-called standard power control schemes. As shown through simulations, the proposed method results in significant transmit power reduction while achieving almost the same average SIR level. In addition, it is shown that the new scheme results in improved overall network fairness in comparison with another algorithm  

    Almost-optimum signature matrices in binary-input synchronous overloaded CDMA

    , Article 2011 18th International Conference on Telecommunications, ICT 2011, 8 May 2011 through 11 May 2011, Ayia Napa ; 2011 , Pages 195-200 ; 9781457700248 (ISBN) Khoozani, M. H ; Rashidinejad, A ; Froushani, M. H. L ; Pad, P ; Marvasti, F ; Sharif University of Technology
    2011
    Abstract
    The everlasting bandwidth limitations in wireless communication networks has directed the researchers' thrust toward analyzing the prospect of overloaded Code Division Multiple Access (CDMA). In this paper, we have proposed a Genetic Algorithm in search of optimum signature matrices for binary-input synchronous CDMA. The main measure of optimality considered in this paper, is the per-user channel capacity of the overall multiple access system. Our resulting matrices differ from the renowned Welch Bound Equality (WBE) codes, regarding the fact that our attention is specifically aimed at binary, rather than Gaussian, input distributions. Since design based on channel capacity is... 

    PAPR reduction of OFDM signals using harmony search algorithm

    , Article 2011 18th International Conference on Telecommunications, ICT 2011, 8 May 2011 through 11 May 2011, Ayia Napa ; 2011 , Pages 90-94 ; 9781457700248 (ISBN) Kermani, E. M ; Salehinejad, H ; Talebi, S ; Sharif University of Technology
    2011
    Abstract
    Orthogonal frequency division multiplexing (OFDM) is one of the widely used multiplexing techniques in wireless communications and especially cognitive radio networks. One of the key challenges of this technique is its high peak to average power ratio (PAPR) of the transmitted signal. This paper, introduces a new approach to PAPR reduction of OFDM signals using harmony search algorithm (HSA) based on the partial transmit sequence (PTS) method. The simulation results demonstrate that the proposed algorithm has better PAPR reduction performance as an accurate and low complexity approach for OFDM systems  

    Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1 June 2011 through 3 June 2011 ; Volume 6633 LNCS , June , 2011 , Pages 254-263 ; 03029743 (ISSN) ; 9783642210396 (ISBN) Habibi, M. H ; Alagheband, M. R ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    Yeh et al. have recently proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard. They claim their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper we show that the proposed protocol does not have cited security features properly. A powerful and practical attack is presented on this protocol whereby the whole security of the protocol is broken. Furthermore, Yeh et al.'s protocol does not assure the untraceabilitiy and backwarduntraceabilitiy attributes. We also will propose our revision to safeguard the Yeh et al.'s protocol against cited attacks  

    A new TH-CDMA scheme for dispersive infrared channel and its performance evaluation

    , Article Journal of Optical Communications ; Volume 32, Issue 1 , 2011 , Pages 21-36 ; 01734911 (ISSN) Hamdi, M ; Nasiri Kenari, M ; Sharif University of Technology
    2011
    Abstract
    Infrared indoor wireless communications using nondirected links are subject to severe multipath distortion which causes intersymbol interference (ISI). To lessen multipath distortion effect and thereby to improve the system performance, in this paper, we consider a new time-hopping based multiple access scheme for this channel, in which one pulse is transmitted in each bit interval. The position of the pulse is determined based on the output of a low rate error correcting code along with the user's dedicated PN code. We evaluate the multiple access performance of the system for correlation receiver considering background noise, dark current, and thermal noise. We compare the performance of... 

    Rate regions of secret key sharing in a new source model

    , Article IET Communications ; Volume 5, Issue 4 , March , 2011 , Pages 443-455 ; 17518628 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, while at the other side via a public channel where three users can observe i.i.d. outputs of correlated sources. Each of users 1 and 2 intends to share a secret key with user 3 where user 1 acts as a wiretapper for user 2 and vice versa. In this model, two situations are considered: communication from users 1 and 2 to user 3 (the forward key strategy) and from user 3 to users 1 and 2 (the backward key strategy). In both situations, the goal is sharing a secret key between user 1 and user 3 while leaking no effective information... 

    Outage probability and power allocation of amplify and forward relaying with channel estimation errors

    , Article IEEE Transactions on Wireless Communications ; Volume 10, Issue 1 , November , 2011 , Pages 124-134 ; 15361276 (ISSN) Tabataba, F. S ; Sadeghi, P ; Pakravan, M. R ; Sharif University of Technology
    2011
    Abstract
    This paper studies the statistical properties of the signal-to-noise ratio (SNR) of the dual-hop relaying link in a cooperative wireless communication system in the presence of channel estimation errors for fixed-gain (FG) and variable-gain (VG) relays. The SNR expression is derived and three different analytical approaches with different simplifying assumptions are proposed to obtain the probability distribution function of the SNR and the outage probability in each mode. All but one approach result in closed-form expressions for the outage probability. The simplest approach in each mode has been used to find an optimum power allocation scheme for pilot and data symbols transmission at the... 

    A new approach to fast decode quasi-orthogonal space-time block codes

    , Article IEEE Transactions on Wireless Communications ; Volume 14, Issue 1 , 2015 , Pages 165-176 ; 15361276 (ISSN) Ahmadi, A ; Talebi, S ; Shahabinejad, M ; Sharif University of Technology
    Abstract
    Motivated by the statistical correspondence between phases of the transmitted and received vectors, we present a fast decoding method for quasi-orthogonal space-time block codes (QOSTBCs) in this paper. The proposed decoder selects proper candidates from precomputed and sorted sets by focusing on the phase of a specific entry of the combined and decoupled vector. The ML metric of the most probable candidates is first evaluated, and then, the remaining candidates are assessed based on the similarity between the phases. The new algorithm can work with any type of constellation such as QAM and PSK and supports generalized block-diagonal QOSTBCs. Theoretical results backed by simulation tests... 

    A simplified method for computation of scattered fields by the lamp-posts along a boulevard used for wireless communications in 2-GHZ band

    , Article 2010 10th Mediterranean Microwave Symposium, MMS 2010, 25 August 2010 through 27 August 2010 ; August , 2010 , Pages 346-350 ; 9781424472437 (ISBN) Sadeghi, H ; Farzaneh, F ; Sharif University of Technology
    2010
    Abstract
    In this paper a simplified object specific ray tracing method is proposed to solve the important propagation problem of scattering by the lamp-posts. In fact, radiation from the transmitter antenna is modeled with a two ray incidence model and unknown currents on lamp-posts are computed using the Multi-Level Fast Multi-pole Method (MLFMM) which is an extension of the MoM (Method of Moments). In addition, scattering by lamp-posts is computed using the superposition of current elements electric fields based on the discrete complex image method (DCIM) in presence of a real ground with complex relative permittivity. The scattered near fields are considered instead of far fields. Based on this... 

    Sub-pixel image registration based on physical forces

    , Article 2010 International Conference on Wireless Communications and Signal Processing, WCSP 2010, 21 October 2010 through 23 October 2010, Suzhou ; 2010 ; 9781424475551 (ISBN) Ghayoor, A ; Ghorbani, S ; Beheshti Shirazi, A. A ; Sharif University of Technology
    2010
    Abstract
    A new method for image registration has been previously proposed by the authors, which the registration is based on physical forces. The registration parameters are translation and rotation. This method assumes images like charged materials that attract each other. In this case, one of the images moves in the same direction as the applied force while the other one is still. The movement of the image continues until the resultant force becomes zero. This approach estimates the registration parameters simultaneously and leading to a better optimized set of registration parameters. The registration error for this method is 1 to 3 pixels. In this paper we aim to develop this method for the... 

    A survey of system platforms for mobile payment

    , Article Proceedings - 2010 International Conference on Management of e-Commerce and e-Government, ICMeCG 2010, 23 October 2010 through 24 October 2010 ; 2010 , Pages 376-381 ; 9780769542454 (ISBN) Asadi Tehrani, M ; Amidian, A. A ; Muhammadi, J ; Rabiee, H. R ; Sharif University of Technology
    Abstract
    With the evolution and significant growth in wireless technology and the development of mobile commerce, businesses can achieve superior performance through the implementation of platforms for mobile payment. However, there are several platforms for mobile payment to choose from which makes the selection of an appropriate platform for specific applications a challenging task. In response to this challenge, the most common mobile payment platforms recorded in the literature have been reviewed. This paper presents the result of this review describing the advantages and disadvantages of each system and offers ranking of the technologies considered. MCDM method is used for assessing and... 

    Compensating the nonlinearity of laser diode in optical wireless transmission using OFDM

    , Article International Conference on Data Networks, Communications, Computers - Proceedings, 3 November 2010 through 5 November 2010, Faro ; 2010 , Pages 92-96 ; 9789604742455 (ISBN) Karkhaneh, H ; Javadzadeh, S. M. H ; Hussaini, A. S ; Ghorbani, A ; Rodriguez, J ; Sharif University of Technology
    2010
    Abstract
    The nonlinear characteristic of an laser diode, LD, impacts on the performance of optical wireless systems using OFDM(orthogonal frequency division multiplexing). First, the influence of the nonlinear characteristic on bit-error performance is analyzed using a high power LD (LML-808.7B-XX). Next, the paper proposes a pre-distorter to compensate the nonlinearities. Finally, the coherent optical OFDM (CO-OFDM) system is considered and the performance without linearization and after linearization is analyzed via simulations in an AWGN (additive white Gaussian noise) environment. It is shown that LD nonlinearity can significantly degrade the performance. However, it is demonstrated that this... 

    A Game Theory approach for optimal routing: In Wireless Sensor Networks

    , Article 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2010, 23 September 2010 through 25 September 2010 ; September , 2010 ; 9781424437092 (ISBN) Arisian, B ; Eshghi, K ; Sharif University of Technology
    2010
    Abstract
    In this paper, a "Game Theory" approach for finding an optimal path in a "Wireless Sensor Network" is discussed. WSN is one of the most interesting research fields in the communication networks, and is the center of attention in recent years. In our model, a pricing and payment technique is presented to obtain an optimal path in a WSN by considering reliability, energy and traffic load. The proposed algorithm is able to find a path which improves network lifetime, load distribution and path reliability  

    An effective data aggregation mechanism for wireless sensor networks

    , Article 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2010, 23 September 2010 through 25 September 2010 ; September , 2010 ; 9781424437092 (ISBN) Ghaffariyan, P ; Sharif University of Technology
    2010
    Abstract
    Wireless sensor networks are tiny devices with limited computation and energy capacities. For such devices, data transmission is a very energy-consuming operation. It thus becomes essential to increase the lifetime of a WSN by minimizing the number of bits sent by each device. One well known approach is to aggregate sensor data. Data aggregation is used to eliminate redundancy and minimize the number of transmissions in order to save energy. Most energy efficient aggregation protocols have focused on cluster-based structure approaches. In this paper, we investigate the efficiency of data aggregation by focusing on two aspects of the problem: first how to improve cluster-based routing... 

    The direction of arrival estimation in DS-CDMA systems employing the code-matched filters and parallel ESPRIT algorithms

    , Article Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25 June 2010 through 27 June 2010, Beijing ; 2010 , Pages 274-279 ; 9781424458516 (ISBN) Samsami Khodadad, F ; Hoseini Karani, S. B ; Safaei, A ; Hadi Karami Ata, M ; Taheri, A ; Sharif University of Technology
    2010
    Abstract
    It was shown that the number of array elements must exceed the number of sources for subspace-based direction-of-arrival (DOA) estimation. But this is not practical for a direct-sequence code-division multiple access (DS-CDMA) wireless system, since the number of mobile users is very large. To remove the aforementioned restriction, a DOA estimator, employing the code-matched filters and parallel ESPRIT algorithms, is proposed. This algorithm does not use to search all angles such as MUSIC method. Besides, it is not necessary to use AIC and MDL criterion to estimate the number of sources in the proposed algorithm. Simulation results illustrates the appropriate performance of the new method  

    An analog optimal waveform design for UWB communications

    , Article Proceedings of the 2nd Asia Symposium on Quality Electronic Design, ASQED 2010, 3 August 2010 through 4 August 2010 ; August , 2010 , Pages 289-293 ; 9781424478088 (ISBN) Ghanaatian Jahromi, A ; Abrishamifar, A ; Medi, A ; Akbarzadeh, A ; Sharif University of Technology
    2010
    Abstract
    A new optimal waveform for Ultra-wideband (UWB) radios is proposed in this paper. This new waveform extracted through mathematical analysis for achieving high spectral utilization under the restrictions imposed by the U.S. Federal Communications Commission (FCC) spectral masks. Exploiting Inverse Fourier Transform (IFT) of FCC mask, the required analog signals are extracted through robust calculation and the optimum realizable analog signal for FCC mask is constructed while the simulations confirmed the analytical approach. Normalized effective signal power (NESP) of the proposed method is 95.27% which shows better efficiency compared to the other methods in the literature