Channel Models for Body Surface Communications in Ultra Wideband-Based Wireless Body Area Networks
Body area networks are being developed to serve a wide range of purposes ranging from providing health care to patients on the move to tracking patients and motion sensing for gaming controls. There has been significant and sizeable amount of research ...
Privacy-Preserving Public Auditing for Non-manager Group Shared Data
By the widespread use of cloud storage service, users get a lot of conveniences such as low-price file remote storage and flexible file sharing. The research points in cloud computing include the verification of data integrity, the protection of data ...
Comment: Multifunction Current Differencing Cascaded Transconductance Amplifier (MCDTA) and Its Application to Current-Mode Multiphase Sinusoidal Oscillator
The intention of this letter is to draw the attention of journal as well as all the readers towards the duplication so that the reputation of the journal and ethics in the research could be maintained.
Interference Evaluation in Cellular Networks
Interference in cellular networks is one of the most common problems in the radio access network. In fact, it is the major issue in cellular networks that affects performances and quality of service. Indeed, interference can be caused by a call on the ...
Partially Loaded Superimposed Training Scheme for Large MIMO Uplink Systems
This paper proposes a new superimposed training (ST) scheme for uplink multi-user multi-cell system, where each base station, equipped with a large number of antennas (M), communicates to single antenna users. In uplink training phase, large number of ...
A Connectivity-Based Multi-Lane Routing Optimization Algorithm in Vehicular Communication
This paper proposed a connectivity-based multi-lane geographic routing protocol (CGRP) for vehicular ad hoc networks. The proposed CGRP is based on an effective selection of road intersections through which a package must pass from source to ...
Are RNGs Achilles' Heel of RFID Security and Privacy Protocols?
Security and privacy concerns have been growing with the increased utilisation of RFID technology in our daily lives. To mitigate these issues, numerous privacy-friendly authentication protocols have been published in the last decade. Random number ...
Novel Data Fusion Algorithm Based on Event-Driven and Dempster---Shafer Evidence Theory
When a new event occurs, the nodes in the neighborhood of the event sense and then send many packets to the sink node. Such circumstances need their networks to be simultaneously reliable and event-driven. Moreover, it should be remove redundant packets ...
Shortest Path Evaluation in Wireless Network Using Fuzzy Logic
Evaluation of the shortest path in a wireless network is to ensure the fast and guaranteed delivery of the data over the established wireless network. Most of the wireless protocols are using a shortest path evaluation technique which is based on the ...
Intelligent Query-Based Data Aggregation Model and Optimized Query Ordering for Efficient Wireless Sensor Network
Data aggregation algorithms play a primary role in WSN, as it collects and aggregates the data in an energy efficient manner so that the life expectancy of the network is extended. This paper intends to develop a query-based aggregation model for WSN ...
Novel Reversible Design of Advanced Encryption Standard Cryptographic Algorithm for Wireless Sensor Networks
The quantum of power consumption in wireless sensor nodes plays a vital role in power management since more number of functional elements are integrated in a smaller space and operated at very high frequencies. In addition, the variations in the power ...
Proposing a Method for Controlling Congestion in Wireless Sensor Networks Using Comparative Fuzzy Logic
Recent developments and advances on electronics and wireless telecommunications have enabled researchers to design and produce low-power and small sensors with reasonable prices which can be used for various applications. Wireless multimedia sensor ...
Cluster-Head Restricted Energy Efficient Protocol (CREEP) for Routing in Heterogeneous Wireless Sensor Networks
A magnanimous number of collaborative sensor nodes make up a Wireless Sensor Network (WSN). These sensor nodes are outfitted with low-cost and low-power sensors. The routing protocols are responsible for ensuring communications while considering the ...
A Novel Content Aware Channel Allocation Scheme for Video Applications over CRN
Cognitive radio (CR) has emerged as an effective solution to spectrum scarcity problem which efficiently utilizes the unused spectrum of licensed primary user (PU). Video applications, as a bandwidth intensive and delay-sensitive application, will ...
An Energy Efficient Receiver-Initiated MAC Protocol for Low-Power WSN
This paper proposes RITMC, an asynchronous multichannel receiver-initiated MAC for low-power WSN. Through a comparison with already existing solutions, the RITMC tries to mitigate the message containment and the effect of Idle Listening through an ...
Statistical Multipath Queue-Wise Preemption Routing for ZigBee-Based WSN
Nowadays, wireless sensor network (WSN) is an important component in IoT environment, which enables efficient data collection and transmission. Since WSN consists of a large number of sensor nodes, network congestion can easily occur which significantly ...
Energy Efficient Clustering Scheme (EECS) for Wireless Sensor Network with Mobile Sink
The participants in the Wireless Sensor Network (WSN) are highly resource constraint in nature. The clustering approach in the WSN supports a large-scale monitoring with ease to the user. The node near the sink depletes the energy, forming energy holes ...
A Vector-Based Routing Protocol in Underwater Wireless Sensor Networks
One major concern shared by many researchers about underwater wireless sensor networks (UWSNs), with respect to the limitations and particularities of underwater environment, is the problem of routing. These limitations include three-dimensional ...
A Dual Polarized Triple Band Stacked Elliptical Microstrip Patch Antenna for WLAN Applications
In this paper, a single coaxial feed dual polarized triple band stacked microstrip patch antenna for wireless applications is presented. The proposed stacked antenna has two resonating elements with lower layer consisting of a truncated corner square ...
Parallel Big Bang---Big Crunch Global Optimization Algorithm: Performance and its Applications to routing in WMNs
This paper presents the performance of Parallel Big Bang---Big Crunch (PB3C) global optimization algorithm on CEC-2014 test suite. The performance is compared with 16 other algorithms. It has been observed that PB3C gave best performance on 7 functions ...
Interdependency Analysis of Inter-Site-Distance on Configuration of Handover Control Parameter in LTE-A HetNets
Handover (HO) is the procedure performed to maintain the ongoing session of mobile User Equipment (UE). In Long Term Evolution-Advanced (LTE-A) network, the UE-assisted, network controlled hard HO procedure is suggested by 3GPP. The adoption of the ...
Channel Assinment Using Tabu Search in Wireless Mesh Networks
Wireless networks pave a way for faster and quicker transmission. The most important terminology in mesh networking is assigning proper channel for faster transmission. Interference is an important issue in channel assignment. The process of channel ...
Precoding for Non-orthogonal Multiple Access with User Equipment Pairing
Due to the tremendous throughput requirement, current spectrum allocation scheme of 4G long term evolution-advanced system can't satisfy the need for future communications applications. Hence, researches have proposed a non-orthogonal multiple access (...
Design of Simulation System for LTE-U Using 5 GHz Band in MATLAB
Unused spectrum is being a limited commodity for the telecom industry. However, up to 500 MHz of unlicensed spectrum in 5 GHz band is in use for several applications and services, particularly in WiFi around the world. Unlicensed spectrum has foreseen ...
A Novel Face Liveness Detection Algorithm with Multiple Liveness Indicators
Face recognition is a most widely used and rapidly growing biometric technology. Lot of research has been done in this field, due to its significant applications in various sectors and their influence in our daily life such as securing financial ...
Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers
With the growth and benefits of network usage, securing the networks by using anomaly intrusion detection systems (IDS) against unknown intrusions has become an important issue. The first step of protecting any network is the detection of attacks. In ...
Improved Connection Establishment of Dynamic Traffic with Queue in WDM Optical Networks
Proper route selection between source and destination $$(s-d)$$(s-d) connection leads to efficient resource utilization which leads to the availability of resources for future call arrivals. Various choices are available for Routing and Wavelength ...
Design of a Secure Encryption Model (SEM) for Cloud Data Storage Using Hadamard Transforms
Data storage has been one of the most prevalent services that has been offered by cloud computing. One of the challenges associated with data storage has been the security of the users data. There have been many models proposed that have tried to secure ...
Sum Ergodic Capacity Analysis Using Asymptotic Design of Massive MU-MIMO Systems
This communication attempts to characterize the performance metrics of downlink Massive MU-MIMO systems impaired by cochannel interference and additive noise over a Rayleigh fading environment. We obtain close-form solutions for the probability density ...
Multiband Flexible Antenna for Wearable Personal Communications
- Miguel Ángel Bolaños-Torres,
- Richard Torrealba-Meléndez,
- Jesús Manuel Muñoz-Pacheco,
- Luz Del Goméz-Pavón,
- Edna Iliana Tamariz-Flores
In this paper the design and experimental characterization of a coplanar waveguide-feed planar inverted F antenna for wearable personal communications are presented. The proposed antenna is designed to operate at GSM 1800 MHz and ISM 2450 MHz bands. ...