529 research outputs found
Performance analysis of a novel decentralised MAC protocol for cognitive radio networks
Due to the demand of emerging Cognitive Radio (CR) technology to permits using the unused licensed spectrum parts by cognitive users (CUs) to provide opportunistic and efficient utilisation of the white spaces. This requires deploying a CR MAC with the required characteristics to coordinate the spectrum access among CUs. Therefore, this paper presents the design and implementation of a novel Medium Access Control (MAC) protocol for decentralised CRNs (MCRN). The protocol provides efficient utilisations of the unused licensed channels and enables CUs to exchange data successfully over licensed channels. This is based on the observation procedure of sensing the status of the Licensed Users (LUs) are ON or OFF over the licensed channels. The protocol is validated with the comparison procedure against two different benchmark protocols in terms of the network performance; communication time and throughput. Therefore, performance analysis demonstrated that the proposed MCRN perform better and achieve higher throughput and time benefits than the benchmarks protocols
Spectrum sharing security and attacks in CRNs: a review
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of
the common control channel, more attention is paid to the
security of the common control channel by looking into its
security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges
Minimum energy wireless sensor networks
PhD programme overviewHere, on-off keying modulation is used as a means of reducing the transmit energy requirements whilst exploiting inherent channel coding, which sets the scene of this PhD study
DDH-MAC: a novel dynamic de-centralized hybrid MAC protocol for cognitive radio networks
The radio spectrum (3kHz - 300GHz) has become saturated and proven to be insufficient to address the proliferation of new wireless applications. Cognitive Radio Technology which is an opportunistic network and is equipped with fully programmable wireless devices that empowers the network by OODA cycle and then make intelligent decisions by adapting their MAC and physical layer characteristics such as waveform, has appeared to be the only solution for current low spectrum availability and under utilization problem. In this paper a novel Dynamic De-Centralized Hybrid âDDH-MACâ protocol for Cognitive Radio Networks has been presented which lies between Global Common Control Channel (GCCC) and non-GCCC categories of cognitive radio MAC protocols. DDH-MAC is equipped with the best features of GCCC MAC protocols but also overcomes the saturation and security issues in GCCC. To the best of authors' knowledge, DDH-MAC is the first protocol which is hybrid between GCCC and non-GCCC family of protocols. DDH-MAC provides multiple levels of security and partially use GCCC to transmit beacon which sets and announces local control channel for exchange of free channel list (FCL) sensed by the co-operatively communicating cognitive radio nodes, subsequently providing secure transactions among participating nodes over the decided local control channel. This paper describes the framework of the DDH-MAC protocol in addition to its pseudo code for implementation; it is shown that the pre-transmission time for DDH-MAC is on average 20% better while compared to other cognitive radio MAC protocols
Linearizability of Systems of Ordinary Differential Equations Obtained by Complex Symmetry Analysis
Five equivalence classes had been found for systems of two second-order
ordinary differential equations, transformable to linear equations
(linearizable systems) by a change of variables. An "optimal (or simplest)
canonical form" of linear systems had been established to obtain the symmetry
structure, namely with 5, 6, 7, 8 and 15 dimensional Lie algebras. For those
systems that arise from a scalar complex second-order ordinary differential
equation, treated as a pair of real ordinary differential equations, a "reduced
optimal canonical form" is obtained. This form yields three of the five
equivalence classes of linearizable systems of two dimensions. We show that
there exist 6, 7 and 15-dimensional algebras for these systems and illustrate
our results with examples
Pre-Generation of Student Module in Intelligent Tutoring System
An intelligent tutoring system (ITS) is a system that provides direct modified instruction or feedback to students without the interference of human beings. Most of
the researches in ITS have been in assessment, reforming of the learning objects and change of the learning object finding path. To make an ITS as efficient as expert human tutors, this research aims at identifying the user understanding level of a user prior to using an ITS by conducting a pre-test. Upon completing the test, user will be presented with a teaching session that is based on his/her performance in the undertaken pre-test. The system is intended for undergraduate students to learn knowledge representation. Two systems were developed for the purpose of evaluation and namely Version A and Version B. Version A adopts the existing approach that assumes all students have the same background knowledge, while Version B conducted the teaching session according to students existing knowledge. A pilot test was performed on the BIT undergraduate students. The results showed that by using Version B, students obtained a better result compared to using Version A
A survey of QoS-aware web service composition techniques
Web service composition can be briefly described as the process of aggregating services with disparate functionalities into a new composite service in order to meet increasingly complex needs of users. Service composition process has been accurate on dealing with services having disparate functionalities, however, over the years the number of web services in particular that exhibit similar functionalities and varying Quality of Service (QoS) has significantly increased. As such, the problem becomes how to select appropriate web services such that the QoS of the resulting composite service is maximized or, in some cases, minimized. This constitutes an NP-hard problem as it is complicated and difficult to solve. In this paper, a discussion of concepts of web service composition and a holistic review of current service composition techniques proposed in literature is presented. Our review spans several publications in the field that can serve as a road map for future research
- âŠ