136 research outputs found
Network lifetime extension, power conservation and interference suppression for next generation mobile wireless networks
Two major focus research areas related to the design of the next generation multihop wireless networks are network lifetime extension and interference suppression. In this dissertation, these two issues are addressed.
In the area of interference suppression, a new family of projection multiuser detectors, based on a generalized, two-stage design is proposed. Projection multiuser detectors provide efficient protection against undesired interference of unknown power, while preserving simple design, with closed-form solution for error probabilities. It is shown that these detectors are linearly optimal, if the interference power is unknown.
In the area of network lifetime extension, a new approach to minimum energy routing for multihop wireless networks in Rayleigh fading channels is proposed. It is based on the concept of power combining, whereby two users transmit same signal to the destination user, emulating transmit diversity with two transmit antennas. Analytical framework for the evaluation of the benefits of power combining, in terms of the total transmit power reduction, is defined. Simulation results, which match closely the analytical results, indicate that significant improvements, in terms of transmit power reduction and network lifetime extension, are achievable. The messaging load, generated by the new scheme, is moderate, and can be further optimized
Non-linear echo cancellation - a Bayesian approach
Echo cancellation literature is reviewed, then a Bayesian model is introduced and it is shown how how it can be used to model and fit nonlinear channels. An algorithm for cancellation of echo over a nonlinear channel is developed and tested. It is shown that this nonlinear algorithm converges for both linear and nonlinear channels and is superior to linear echo cancellation for canceling an echo through a nonlinear echo-path channel
Policies for Transmit Power Control in the Conditions of Jamming in Clustered Wireless System
This article presents a consistent solution of Transmit Power Control in centralized (clustered) wireless network with and without jamming. Depending on the policy assumed, solutions are applied to minimize the power used in a system or to satisfy expected Quality of Service. Because of specific nature of the system there is no optimal solution which can be applied in practice. Correctness and effectiveness of four proposed Power Control algorithms was presented in the form of computer simulation results in which the system capacity, mean power used and the number of successful links were described
Policies for Transmit Power Control in the Conditions of Jamming in Clustered Wireless System
This article presents a consistent solution of Transmit Power Control in centralized (clustered) wireless network with and without jamming. Depending on the policy assumed, solutions are applied to minimize the power used in a system or to satisfy expected Quality of Service. Because of specific nature of the system there is no optimal solution which can be applied in practice. Correctness and effectiveness of four proposed Power Control algorithms was presented in the form of computer simulation results in which the system capacity, mean power used and the number of successful links were described
Application of genetic algorithm to wireless communications
Wireless communication is one of the most active areas of technology development of our time. Like all engineering endeavours, the subject of the wireless communication also brings with it a whole host of complex design issues, concerning network design, signal detection, interference cancellation, and resource allocation, to name a few. Many of these problems have little knowledge of the solution space or have very large search space, which are known as non-deterministic polynomial (NP) -hard or - complete and therefore intractable to solution using analytical approaches. Consequently, varied heuristic methods attempts have been made to solve them ranging from simple deterministic algorithms to complicated random-search methods. Genetic alcyorithm (GA) is an adaptive heuristic search algorithm premised on the evolutionary ideas of evolution and natural selection, which has been successfully applied to a variety of complicated problems arising from physics, engineering, biology, economy or sociology. Due to its outstanding search strength and high designable components, GA has attracted great interests even in the wireless domain. This dissertation is devoted to the application of GA to solve various difficult problems spotlighted from the wireless systems. These problems have been mathematically formulated in the constrained optimisation context, and the main work has been focused on developing the problem-specific GA approaches, which incorporate many modifications to the traditional GA in order to obtain enhanced performance. Comparative results lead to the conclusion that the proposed GA approaches are generally able to obtain the optimal or near-optimal solutions to the considered optimisation problems provided that the appropriate representation, suitable fitness function, and problem-specific operators are utilised. As a whole, the present work is largely original and should be of great interest to the design of practical GA approaches to solve realistic problems in the wireless communications systems.EThOS - Electronic Theses Online ServiceBritish Council (ORS) : Newcastle UniversityGBUnited Kingdo
Special issue on real‐time behavioral monitoring in IoT applications using big data analytics
Real-time social multimedia level threat monitoring is becoming harder, due to higher and rapidly increasing data induction. Data induction through electric smart devices is greater compared to information processing capacity. Nowadays, data becomes humongous even coming from the single source. Therefore, when data emanates from all heterogeneous sources distributed over the globe makes data magnitude harder to process up to a needed scale. Big data and Deep learning have become standard in providing well-known solutions built-up using algorithms and techniques in resolving data matching issues. Now, with the involvement of sensors and automation in generating data obscures everything, predicting results to overcome a current era of ever enhancing demands and getting real-time visualization brings the need of feature like human behavior mode extraction to overcome any future threats. Big data analytics can bring the opportunity of predicting any misfortune even before they happen. Map reduce feature of big data supports massive data oriented process execution using distributed processing. Real-time human feature identification and detection can occur through sensors and internet sources. A behavioral prediction can further classify the information collected for introducing enhanced security extents. Real-time sensor devices are producing 24/7-hour data for further processing recording each event. IoT-based sensors can support in behavioral analysis model of a human. Real-time human behavioral monitoring based on image processing and IoT using big data analytics
Recommended from our members
Cognitive MAC protocols for mobile Ad-Hoc networks
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.The term of Cognitive Radio (CR) used to indicate that spectrum radio could be accessed dynamically and opportunistically by unlicensed users. In CR Networks, Interference between nodes, hidden terminal problem, and spectrum sensing errors are big issues to be widely discussed in the research field nowadays. To improve the performance of such kind of networks, this thesis proposes Cognitive Medium Access Control (MAC) protocols for Mobile Ad-Hoc Networks (MANETs). From the concept of CR, this thesis has been able to develop a cognitive MAC framework in which a cognitive process consisting of cognitive elements is considered, which can make efficient decisions to optimise the CR network. In this context, three different scenarios to maximize the secondary user's throughput have been proposed. We found that the throughput improvement depends on the transition probabilities. However, considering the past information state of the spectrum can dramatically increases the secondary user's throughput by up to 40%. Moreover, by increasing the number of channels, the throughput of the network can be improved about 25%. Furthermore, to study the impact of Physical (PHY) Layer errors on cognitive MAC layer in MANETs, in this thesis, a Sensing Error-Aware MAC protocols for MANETs has been proposed. The developed model has been able to improve the MAC layer performance under the challenge of sensing errors. In this context, the proposed model examined two sensing error probabilities: the false alarm probability and the missed detection probability. The simulation results have shown that both probabilities could be adapted to maintain the false alarm probability at certain values to achieve good results. Finally, in this thesis, a cooperative sensing scheme with interference mitigation for Cognitive Wireless Mesh Networks (CogMesh) has been proposed. Moreover, a prioritybased traffic scenario to analyze the problem of packet delay and a novel technique for dynamic channel allocation in CogMesh is presented. Considering each channel in the system as a sub-server, the average delay of the users' packets is reduced and the cooperative sensing scenario dramatically increases the network throughput 50% more as the number of arrival rate is increased
- …