Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 34, Issue 6November, 2011
Reflects downloads up to 17 Dec 2024Bibliometrics
Skip Table Of Content Section
article
Information quality model and optimization for 802.15.4-based wireless sensor networks

High information quality is a paramount requirement for wireless sensor network (WSN) monitoring applications. However, it is challenging to achieve a cost effective information quality solution due to unpredictable environment noise and events, ...

article
Lifetime extension for surveillance wireless sensor networks with intelligent redeployment

For wireless sensor networks (WSNs), uneven energy consumption is a major problem. A direct consequence of this is the energy hole problem, formation of sensing voids within the network field due to battery depleted sensors in the corresponding region. ...

article
Using an evolutionary algorithm to optimize the broadcasting methods in mobile ad hoc networks

A mobile ad hoc network (MANET) is a collection of mobile nodes communicating through wireless connections without any prior network infrastructure. In such a network the broadcasting methods are widely used for sending safety messages and routing ...

article
Design and analysis of a multi-candidate selection scheme for greedy routing in wireless sensor networks

Sleep and wake-up scheduling of sensor nodes is an efficient solution to prolong the network lifetime. However, existing scheduling algorithms may significantly decrease the number of active nodes so that the network may be intermittently connected. In ...

article
Optimal control of mobile monitoring agents in immune-inspired wireless monitoring networks

This paper studies optimal control of mobile monitoring agents in artificial-immune-system-based (AIS-based) monitoring networks. In AIS-based structural health monitoring (SHM) networks, the active structural health monitoring is performed by a group ...

article
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)

Wireless mobile ad hoc networks (MANETs) do not have centralized infrastructure and it is difficult to provide authentication services. In this paper, we apply Certificate Graph (CG) and identity-based security in designing an admission control scheme ...

article
Congestion prevention in broadband wireless access systems: An economic approach

While the demand for mobile broadband wireless services continues to increase, radio resources remain scarce. Even with the substantial increase in the supported bandwidth in the next generation broadband wireless access systems (BWASs), it is expected ...

article
Multi-sector multi-range control for self-organizing wireless networks

In this paper, we propose a distributed multi-sector multi-range (MSMR) control algorithm for supporting self-organizing wireless networks. The algorithm enables us to reduce the unnecessary coverage with fine-tuned range control and also to increase ...

article
A cross-layer resource allocation scheme for ICIC in LTE-Advanced

As a new technology, inter-eNB coordination has been included in LTE-Advanced study items. Moreover, the network architecture in LTE-Advanced system is modified to take into account coordinated transmission. In our study, we explore the problem of ...

article
A mathematical formulation for joint channel assignment and multicast routing in multi-channel multi-radio wireless mesh networks

Multicast routing is generally an efficient mechanism for delivering identical content to a group of receivers. Multicast is also deemed a key enabling service for a wealth of audio and video applications as well as data dissemination protocols over the ...

article
A communication infrastructure to ease the development of mobile collaborative applications

Mobile workers doing loosely coupled activities typically perform on demand collaboration in the physical workplace. Communication services available in such work scenarios are uncertain, therefore mobile collaborative applications supporting those ...

article
A novel Parzen probabilistic neural network based noncoherent detection algorithm for distributed ultra-wideband sensors

Ultra-wideband (UWB) has been widely recommended for significant commercial and military applications. However, the well-derived coherent structures for UWB signal detection are either computationally complex or hardware impractical in the presence of ...

article
Providing security vertical handoff in SARAH for heterogeneous networks

Vertical handoff is one of the most important issues in the heterogeneous networks. While Lee et al. introduced a selective advance reservations and resource-aware handoff direction (SARAH) mechanism in order to provide a fast and efficient handoff with ...

article
Review: A survey on routing techniques in underwater wireless sensor networks

Underwater Wireless Sensor Networks (UWSNs) are finding different applications for offshore exploration and ocean monitoring. In most of these applications, the network consists of significant number of sensor nodes deployed at different depths ...

article
Review: Cross-layer signalling and middleware: A survey for inelastic soft real-time applications in MANETs

This paper provides a review of the different cross-layer design and protocol tuning approaches that may be used to meet a growing need to support inelastic soft real-time streams in MANETs. These streams are characterised by critical timing and ...

article
Review: Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation

This article is a position paper on the current security issues in Vehicular Ad hoc Networks (VANETs). VANETs face many interesting research challenges in multiple areas, from privacy and anonymity to the detection and eviction of misbehaving nodes and ...

article
Review: Survey of network coding-aware routing protocols in wireless networks

In recent times, there have been many advances in the field of information theory and wireless ad hoc network technologies. Regarding information theory progression and its connection with wireless ad hoc networks, this study presents fundamental ...

article
An adaptive approach for information dissemination in Vehicular Ad hoc Networks

Vehicular Ad hoc Networks (VANETs) appeared as a subclass of MANETs for inter-vehicle communication. However, VANETs have a relatively more dynamic nature as compared to MANETs concerning the network topology. The design and implementation of an ...

article
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security

Biometric cryptosystems and cancelable biometrics are both practical and promising schemes to enhance the security and privacy of biometric systems. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability ...

article
Multi-core application performance optimization using a constrained tandem queueing model

Recently, performance optimization on multi-core platforms has received more and more research interest especially for networking applications. While a number of case studies have been made with success, there is however a lack of analytical treatment ...

article
A family of simple distributed minimum connected dominating set-based topology construction algorithms

This paper considers the problem of topology construction to save energy in wireless sensor networks. The proposed topology construction mechanisms build reduced topologies using the Connected Dominating Set approach in a distributed, efficient, and ...

article
An efficient metric-based (EM-B) location management scheme for wireless cellular networks

In the current era, the wireless cellular network is gaining much attention in the network mobility for qualitative service. Towards enhancing the QoS and narrowing the dilemma of network management (location management) an efficient metric-based ...

article
Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network

A Dynamic Host Configuration Protocol (DHCP) server is a well-known server deployed at a network to manage Internet Protocol (IP) addresses temporarily rentable to hosts in the network. Besides, a DHCP server provides hosts with important network ...

article
IDFC: A new approach to control bifurcation in TCP/RED

The main objective of this research is to analyze the bifurcation phenomenon in Internet congestion model for Transmission Control Protocol (TCP) with Random Early Detection (RED). This problem can be divided to many categories considering different ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.