Loading...
Search for: wireless-telecommunication-systems
0.029 seconds
Total 184 records

    A game-theoretic approach for power allocation in bidirectional cooperative communication

    , Article IEEE Wireless Communications and Networking Conference, WCNC, 18 April 2010 through 21 April 2010 ; April , 2010 ; 15253511 (ISSN) ; 9781424463985 (ISBN) Janzamin, M ; Pakravan, M ; Sedghi, H ; Sharif University of Technology
    2010
    Abstract
    Cooperative communication exploits wireless broadcast advantage to confront the severe fading effect on wireless communications. Proper allocation of power can play an important role in the performance of cooperative communication. In this paper, we propose a distributed gametheoretical method for power allocation in bidirectional cooperative communication networks. In this work, we consider two nodes as data sources who want to cooperate in sending data to the destination. In addition to being data source, each source node has to relay the other's data. We answer the question: How much power each node contributes for relaying other node's data? We use Stackelberg game which is an... 

    Fuzzy mobility analyzer: A framework for evaluating mobility models in mobile ad-hoc networks

    , Article IEEE Wireless Communications and Networking Conference, WCNC, 18 April 2010 through 21 April 2010 ; April , 2010 ; 15253511 (ISSN) ; 9781424463985 (ISBN) Khaledi, M. J ; Rabiee, H. R ; Khaledi, M. H ; Sharif University of Technology
    2010
    Abstract
    Mobility is one of the most challenging issues in mobile ad-hoc networks and has a significant impact on performance of network protocols. Different kinds of mobility models have been proposed to represent the movement pattern of mobile nodes in mobile ad-hoc networks. These models attempt to capture various mobility characteristics existing in real movement of mobile nodes. In this paper, a new framework called Fuzzy Mobility Analyzer has been proposed to evaluate mobility models. At first, our framework categorizes mobility models based on their mobility characteristics into five classes; subsequently it uses mobility metrics to capture the mobility and graph connectivity characteristics... 

    Joint optimization of power allocation and relay deployment in wireless sensor networks

    , Article IEEE Wireless Communications and Networking Conference, WCNC, 18 April 2010 through 21 April 2010 ; April , 2010 ; 15253511 (ISSN) ; 9781424463985 (ISBN) Abdizadeh, M ; Rad, H. J ; Abolhassani, B ; Sharif University of Technology
    2010
    Abstract
    We study the problem of optimizing the symbol error probability (SEP) performance of cluster-based cooperative wireless sensor networks (WSNs). It is shown in the literature that an efficient relay selection protocol based on simple geographical information of the nodes to execute the cooperative diversity transmission, can significantly improve the SEP performance at the destination of such networks. Also, a similar analysis on the optimal power allocation for the source and the relay exists in the literature. However, we propose that to achieve the minimum SEP at the destination, a joint optimization of power allocation and relay selection should be accomplished. To this aim, we... 

    The novel contention window control scheme for IEEE 802.11 mac protocol

    , Article NSWCTC 2010 - The 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, 24 April 2010 through 25 April 2010, Wuhan ; Volume 2 , April , 2010 , Pages 134-137 ; 9780769540115 (ISBN) Balador, A ; Movaghar, A ; Sharif University of Technology
    2010
    Abstract
    The IEEE 802.11 medium access control (MAC) protocol defines a contention-based distribution channel access mechanism that shares the wireless medium for mobile stations. In this paper, we present a novel backoff mechanism, which divides contention window range to the different level based on the history of channel status. Instead of doubling and resetting the CW, we change the CW range by taking into account last three channel states. We test the new scheme against legacy IEEE 802.11 with NS-2 network simulator. The simulation results have shown 30.77% improvement in packet delivery ratio and 31.76% in delay and 30.81% in throughput compared to the IEEE 802.11 DCF  

    Secret key sharing in a new source model: Rate regions

    , Article 2010 Australian Communications Theory Workshop, AusCTW 2010, Canberra, ACT, 3 February 2010 through 5 February 2010 ; 2010 , Pages 117-122 ; 9781424454334 (ISBN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; ANU - The Australian National University; ACoRN - ARC Communications Research Network; NICTA; UniSA; CSIRO ; Sharif University of Technology
    2010
    Abstract
    A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, at the other side via public channels where three users can observe i.i.d outputs of correlated sources. Each of users 1 and 2 intends to share a secret key with user 3 where user 1 acts as a wiretapper for user 2 and vice versa. In this model, two situations are considered: communication from users 1 and 2 to user 3 (forward key strategy) and from user 3 to users 1 and 2 (backward key strategy). This model is motivated by wireless communications when considering user 3 as a base station and users 1 and 2 as network users. In... 

    Precision enhancement in ETSI-Hata propagation model tuning using experimental data in a dense urban area

    , Article International Journal of Communication Systems ; Volume 23, Issue 1 , 2010 , Pages 101-108 ; 10745351 (ISSN) Atamanesh, M ; Farzaneh, F ; Sharif University of Technology
    Abstract
    In this paper an enhanced ETSI-Hata propagation model tuning is presented. The three-dimensional (3D) digital terrain map (DTM) was included in the simulation process. For the enhancement of the model tuning process and precision verification of ETSI-Hata model, the real 3D map of the buildings of the simulated area was incorporated over the DTM. Multiple knife edge diffraction method and the antenna effective height method were used to calculate the diffraction loss. This method was applied for a real urban scenario. For every sector in the coverage area, a tuned model was exploited. Using a genetic algorithm, frequency planning for the entire urban area was performed, which resulted in an... 

    A study of the effect of diffraction and rough surface scatter modeling on ray tracing results in an urban environment at 60 GHz

    , Article 1st Conference on Millimeter-Wave and Terahertz Technologies, 29 December 2009 through 31 December 2009 ; 2009 , Pages 27-31 ; 9781424468089 (ISBN) Eslami Rasekh, M ; Shishegar, A. A ; Farzaneh, F ; Sharif University of Technology
    Abstract
    Channel characterization is an important step in the design of wireless communication systems. While channel sounding procedures are a useful method in determining channel behavior, they also require expensive and time consuming procedures and equipment. Ray tracing has been an important substitute for measurement in deterministic channel modeling and characterization of the wireless channel. Much has been done to improve the precision and efficiency of this method for lower frequency bands (generally below 5 GHz) over the years. Recently, with the worldwide announcement of a broad unlicensed band in the millimeter wave spectrum around 60 GHz, a great amount of attention has been paid to... 

    Worst case dimensioning and modeling of reliable real-time multihop wireless sensor network

    , Article Performance Evaluation ; Volume 66, Issue 12 , 2009 , Pages 685-700 ; 01665316 (ISSN) Mizanian, K ; Yousefi, H ; Jahangir, A. H ; Sharif University of Technology
    Abstract
    Wireless Sensor Network (WSN) should be capable of fulfilling its mission, in a timely manner and without loss of important information. In this paper, we propose a new analytical model for calculating RRT (Reliable Real-Time) degree in multihop WSNs, where RRT degree describes the percentage of real-time data that the network can reliably deliver on time from any source to its destination. Also, packet loss probability is modeled as a function of the probability of link failure when the buffer is full and the probability of node failure when node's energy is depleted. Most of the network properties are considered as random variables and a queuing theory based model is derived. In this... 

    A novel approach for avoiding wormhole attacks in VANET

    , Article 1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009, 3 November 2009 through 5 November 2009, Kathmundu ; 2009 ; 9781424445707 (ISBN) Safi, S. M ; Movaghar, A ; Mohammadizadeh, M ; Sharif University of Technology
    Abstract
    Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network... 

    A thermal-aware shortest hop routing algorithm for in vivo biomedical sensor networks

    , Article ITNG 2009 - 6th International Conference on Information Technology: New Generations, 27 April 2009 through 29 April 2009, Las Vegas, NV ; 2009 , Pages 1612-1613 ; 9780769535968 (ISBN) Tabandeh, M ; Jahed, M ; Ahourai, F ; Moradi, S ; Sharif University of Technology
    Abstract
    Implanted biomedical sensor networks provide a major application of sensor networks in the near future. Their high temperature due to wireless communication, might damage the surrounding tissues. This paper presents an efficient thermal-aware routing. Our proposed protocol states that when some nodes in the shortest path have a high temperature, ignores this path. The simulation results indicate the superiority of the proposed method compared to other thermal-aware routing protocols in terms of reducing temperature without a significant increase in packet delivery delay and power consumption of nodes. © 2009 IEEE  

    Mobility aware distributed topology control in mobile ad-hoc networks using mobility pattern matching

    , Article WiMob 2009 - 5th IEEE International Conference on Wireless and Mobile Computing Networking and Communication, 12 October 2009 through 14 October 2009, Marrakech ; 2009 , Pages 453-458 ; 9780769538419 (ISBN) Khaledi, MH ; Mousavi, S. M ; Rabiee, H. R ; Movaghar, A ; Khaledi, MJ ; Ardakanian, O ; Sharif University of Technology
    Abstract
    Topology control algorithms in mobile ad-hoc networks aim to reduce the power consumption while keeping the topology connected. These algorithms can preserve network resources and increase network capacity. However, few efforts have focused on the issue of topology control in presence of node mobility. One of the notable mobility aware topology control protocols is the "Mobility Aware Distributed Topology Control Protocol". The main drawback of this protocol is on its mobility prediction method. This prediction method assumes linear movements and is unable to cope with sudden changes in the mobile node movements. In this paper, we propose a pattern matching based mobility prediction method... 

    An energy efficient target tracking scheme for distributed wireless sensor networks

    , Article Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, ISWCS'09, 7 September through 10 September ; 2009 , Pages 136-140 ; 9781424435845 (ISBN) Jamali Rad, H ; Abolhassani, B ; Abdizadeh, M ; Sharif University of Technology
    Abstract
    We study the problem of power optimization for object tracking using distributed Wireless Sensor Networks (WSNs). The accuracy of the object tracking is dependent on the tracking time interval. Smaller tracking time interval increases the accuracy of tracking a moving object. However, this increases the power consumption significantly. This paper proposes a modified adaptive sleep time management scheme called Modified Predict and Mesh (MPaM) to adapt tracking time interval such that it minimizes power consumption while keeping an acceptable tracking accuracy. Also a quantitative analysis to compare the performances of the conventional PaM and proposed Modified PaM (MPaM) schemes is... 

    Recovery of sensors in wireless sensor networks

    , Article NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC, 25 August 2009 through 27 August 2009, Seoul ; 2009 , Pages 393-396 ; 9780769537696 (ISBN) Barati, A ; Kholghi, M. A. K ; Movaghar, A ; Sharif University of Technology
    Abstract
    the failure in cluster at a high level can bring up great damages to the system in wireless sensor networks where clustering techniques are used. Certain methods have been reported in the literature in recovering the sensors from a failure cluster. One of the most important methods is to recover the sensors in run-time and without clustering. But it is so much ideal to suppose that all the sensors will be recovered. In this paper, we proposed a method that can operate on the remained sensors that are not recovered. © 2009 IEEE  

    Adaptive limited fractional guard channel algorithms: A learning automata approach

    , Article International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems ; Volume 17, Issue 6 , 2009 , Pages 881-913 ; 02184885 (ISSN) Beigy, H ; Meybodi, M. R ; Sharif University of Technology
    Abstract
    In this paper, two learning automata based adaptive limited fractional guard channel algorithms for cellular mobile networks are proposed. These algorithms try to minimize the blocking probability of new calls subject to the constraint on the dropping probability of the handoff calls. To evaluate the proposed algorithms, computer simulations are conducted. The simulation results show that the performance of the proposed algorithms are close to the performance of the limited fractional guard channel algorithm for which prior knowledge about traffic parameters are needed. The simulation results also show that the proposed algorithms outperforms the recently introduced dynamic guard channel... 

    SEAODV: Secure efficient AODV routing protocol for MANETs networks

    , Article ACM International Conference Proceeding Series, 24 November 2009 through 26 November 2009, Seoul ; Volume 403 , 2009 , Pages 940-944 ; 9781605587103 (ISBN) Mohammadizadeh, M ; Movaghar, A ; Safi, S. M ; Sharif University of Technology
    Abstract
    Secure routing is one of the most important topics in the wireless MANETs networks. MANETs networks don't have a central infrastructure for the management of routing in the networks. Each node independently routes and sends packets, so many attacks such as forging, modifying, and denial of service (DoS), Occur in these networks. In this paper, we present the new protocol, SEAODV; Secure Efficient Ad-hoc on Demand Routing Protocol for MANETs networks. SEAODV is based on the AODV algorithm and in comparison with existing secure AODV protocols such as SAODV, ARAN and SEAR have improved security and performances. SEAODV uses HEAP authentication Scheme with symmetric cryptography and one-way hash... 

    Towards the optimal tracking interval management for target tracking wireless sensor networks

    , Article ATC 2009 - Proceedings of the 2009 International Conference on Advanced Technologies for Communications, 12 October 2009 through 14 October 2009 ; 2009 , Pages 161-166 ; 9781424451395 (ISBN) Jamali Rad, H ; Abolhassani, B ; Abdizadeh, M ; Sharif University of Technology
    Abstract
    We consider the minimization of power consumption in target tracking wireless sensor networks (WSNs) using dynamic modification of tracking interval. In this context, we first analyze the performance of such networks, using a quantitative mathematical analysis. Then we calculate an upper bound for the achievable improvement in total power consumption, when using an adaptive time interval modification algorithm for tracking moving objects with acceleration. Towards this optimum functionality, we propose a novel adaptive algorithm (AHC) to adapt the tracking interval such that it minimizes power consumption while keeping an acceptable accuracy. Simulation results show that using the proposed... 

    Hybrid approach to analyze the impact of vehicular traffic on performance of 802.11p protocol for safety communications in vehicular ad hoc networks: a quantitative analysis

    , Article Wireless Personal Communications ; Volume 97, Issue 3 , 2017 , Pages 4493-4528 ; 09296212 (ISSN) Ghafourian Ghahramani, S. A. A ; Afshin Hemmatyar, A. M ; Sharif University of Technology
    Abstract
    The rapid developments in wireless communications have introduced the vehicular ad hoc networks as an efficient tool to improve the safety of traffic through Dedicated Short Range Communications systems on highways. This paper addresses the broadcast mode of the 802.11p protocol and it quantitatively analyzes the impact of the highway vehicular traffic on its performance in terms of the packet delivery ratio and the packet transmission delay. To this aim, we propose to consider the number of the contending vehicles as a traffic-dependent stochastic counting process, which can be computed by analyzing the inter-vehicle spacing distribution in different traffic conditions. Based on the... 

    Realization of constant envelope OFDM using quantization and CPM technique

    , Article AEU - International Journal of Electronics and Communications ; Volume 80 , 2017 , Pages 172-178 ; 14348411 (ISSN) Rezaie, S ; Mohammadi, A ; Afrashteh, N ; Sanjaroonpouri, V ; Sharif University of Technology
    Abstract
    Orthogonal frequency division multiplexing (OFDM) is used in many wireless communication. The important drawback of this modulation is its high peak-to-average power ratio (PAPR). In this paper, a new modulation scheme of constant-envelope OFDM (CE-OFDM) is proposed. This scheme uses a combination of OFDM, quantizer and continuous phase modulation (CPM) to achieves 0 dB PAPR. The statistical signatures of signals, based on system parameters such as the length of discrete Fourier transform (DFT) and the number of quantization levels are presented. There are two sources of noise in proposed CE-OFDM scheme: quantization noise and channel noise. The theoretical analysis of these noises is... 

    Symmetric split-row LDPC decoders

    , Article Proceedings - IEEE International Symposium on Circuits and Systems, 28 May 2017 through 31 May 2017 ; 2017 ; 02714310 (ISSN) ; 9781467368520 (ISBN) Shahrad, M ; Shabany, M ; Sharif University of Technology
    Abstract
    LDPC codes are deployed in many modern wired and wireless communication systems. while fully-parallel LDPC decoders are very efficient, they typically suffer from routing complexity. the split-row method effectively reduces this complexity with a minor performance loss. This paper shows the importance of symmetry in Split-Row architectures and proves that the implementation of Split-Row decoders based on new proposed smart column-permuted versions of parity check matrices leads to a better error performance as well as a more efficient hardware. Moreover, in order to achieve optimized column-permuted parity check matrices, a heuristic approach is proposed. This method is then generalized to... 

    Reliability modeling of anomaly detection algorithms for wireless body area networks

    , Article 2017 25th Iranian Conference on Electrical Engineering, ICEE 2017, 2 May 2017 through 4 May 2017 ; 2017 , Pages 70-75 ; 9781509059638 (ISBN) Zare Dehabadi, M. S ; Jahed, M ; Sharif University of Technology
    Abstract
    Research on Wireless Body Area Networks (WBAN) has witnessed constant advances in small and low power integrated electronic circuits as well as wireless communication schemes for remote monitoring of patients. As such, high reliability anomaly detection has emerged as an important characteristic especially in detection of system faults and abnormal physiological measurements. This work studies the reliability of WBANs by utilizing a Markov-based chain model and considering hardware failure rate, patient health status, and accuracy of anomaly detection algorithms containing Detection Rate (DR), False Positive Rate (FPR), and accuracy of transient fault correction measures. The proposed...