Information quality model and optimization for 802.15.4-based wireless sensor networks
High information quality is a paramount requirement for wireless sensor network (WSN) monitoring applications. However, it is challenging to achieve a cost effective information quality solution due to unpredictable environment noise and events, ...
Lifetime extension for surveillance wireless sensor networks with intelligent redeployment
For wireless sensor networks (WSNs), uneven energy consumption is a major problem. A direct consequence of this is the energy hole problem, formation of sensing voids within the network field due to battery depleted sensors in the corresponding region. ...
Using an evolutionary algorithm to optimize the broadcasting methods in mobile ad hoc networks
A mobile ad hoc network (MANET) is a collection of mobile nodes communicating through wireless connections without any prior network infrastructure. In such a network the broadcasting methods are widely used for sending safety messages and routing ...
Design and analysis of a multi-candidate selection scheme for greedy routing in wireless sensor networks
Sleep and wake-up scheduling of sensor nodes is an efficient solution to prolong the network lifetime. However, existing scheduling algorithms may significantly decrease the number of active nodes so that the network may be intermittently connected. In ...
Optimal control of mobile monitoring agents in immune-inspired wireless monitoring networks
This paper studies optimal control of mobile monitoring agents in artificial-immune-system-based (AIS-based) monitoring networks. In AIS-based structural health monitoring (SHM) networks, the active structural health monitoring is performed by a group ...
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)
Wireless mobile ad hoc networks (MANETs) do not have centralized infrastructure and it is difficult to provide authentication services. In this paper, we apply Certificate Graph (CG) and identity-based security in designing an admission control scheme ...
Congestion prevention in broadband wireless access systems: An economic approach
While the demand for mobile broadband wireless services continues to increase, radio resources remain scarce. Even with the substantial increase in the supported bandwidth in the next generation broadband wireless access systems (BWASs), it is expected ...
Multi-sector multi-range control for self-organizing wireless networks
In this paper, we propose a distributed multi-sector multi-range (MSMR) control algorithm for supporting self-organizing wireless networks. The algorithm enables us to reduce the unnecessary coverage with fine-tuned range control and also to increase ...
A cross-layer resource allocation scheme for ICIC in LTE-Advanced
As a new technology, inter-eNB coordination has been included in LTE-Advanced study items. Moreover, the network architecture in LTE-Advanced system is modified to take into account coordinated transmission. In our study, we explore the problem of ...
A mathematical formulation for joint channel assignment and multicast routing in multi-channel multi-radio wireless mesh networks
Multicast routing is generally an efficient mechanism for delivering identical content to a group of receivers. Multicast is also deemed a key enabling service for a wealth of audio and video applications as well as data dissemination protocols over the ...
A communication infrastructure to ease the development of mobile collaborative applications
Mobile workers doing loosely coupled activities typically perform on demand collaboration in the physical workplace. Communication services available in such work scenarios are uncertain, therefore mobile collaborative applications supporting those ...
A novel Parzen probabilistic neural network based noncoherent detection algorithm for distributed ultra-wideband sensors
Ultra-wideband (UWB) has been widely recommended for significant commercial and military applications. However, the well-derived coherent structures for UWB signal detection are either computationally complex or hardware impractical in the presence of ...
Providing security vertical handoff in SARAH for heterogeneous networks
Vertical handoff is one of the most important issues in the heterogeneous networks. While Lee et al. introduced a selective advance reservations and resource-aware handoff direction (SARAH) mechanism in order to provide a fast and efficient handoff with ...
Review: A survey on routing techniques in underwater wireless sensor networks
Underwater Wireless Sensor Networks (UWSNs) are finding different applications for offshore exploration and ocean monitoring. In most of these applications, the network consists of significant number of sensor nodes deployed at different depths ...
Review: Cross-layer signalling and middleware: A survey for inelastic soft real-time applications in MANETs
This paper provides a review of the different cross-layer design and protocol tuning approaches that may be used to meet a growing need to support inelastic soft real-time streams in MANETs. These streams are characterised by critical timing and ...
Review: Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation
This article is a position paper on the current security issues in Vehicular Ad hoc Networks (VANETs). VANETs face many interesting research challenges in multiple areas, from privacy and anonymity to the detection and eviction of misbehaving nodes and ...
Review: Survey of network coding-aware routing protocols in wireless networks
In recent times, there have been many advances in the field of information theory and wireless ad hoc network technologies. Regarding information theory progression and its connection with wireless ad hoc networks, this study presents fundamental ...
An adaptive approach for information dissemination in Vehicular Ad hoc Networks
Vehicular Ad hoc Networks (VANETs) appeared as a subclass of MANETs for inter-vehicle communication. However, VANETs have a relatively more dynamic nature as compared to MANETs concerning the network topology. The design and implementation of an ...
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Biometric cryptosystems and cancelable biometrics are both practical and promising schemes to enhance the security and privacy of biometric systems. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability ...
Multi-core application performance optimization using a constrained tandem queueing model
Recently, performance optimization on multi-core platforms has received more and more research interest especially for networking applications. While a number of case studies have been made with success, there is however a lack of analytical treatment ...
A family of simple distributed minimum connected dominating set-based topology construction algorithms
This paper considers the problem of topology construction to save energy in wireless sensor networks. The proposed topology construction mechanisms build reduced topologies using the Connected Dominating Set approach in a distributed, efficient, and ...
An efficient metric-based (EM-B) location management scheme for wireless cellular networks
In the current era, the wireless cellular network is gaining much attention in the network mobility for qualitative service. Towards enhancing the QoS and narrowing the dilemma of network management (location management) an efficient metric-based ...
Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network
A Dynamic Host Configuration Protocol (DHCP) server is a well-known server deployed at a network to manage Internet Protocol (IP) addresses temporarily rentable to hosts in the network. Besides, a DHCP server provides hosts with important network ...
IDFC: A new approach to control bifurcation in TCP/RED
The main objective of this research is to analyze the bifurcation phenomenon in Internet congestion model for Transmission Control Protocol (TCP) with Random Early Detection (RED). This problem can be divided to many categories considering different ...