529 research outputs found

    Performance analysis of a novel decentralised MAC protocol for cognitive radio networks

    Get PDF
    Due to the demand of emerging Cognitive Radio (CR) technology to permits using the unused licensed spectrum parts by cognitive users (CUs) to provide opportunistic and efficient utilisation of the white spaces. This requires deploying a CR MAC with the required characteristics to coordinate the spectrum access among CUs. Therefore, this paper presents the design and implementation of a novel Medium Access Control (MAC) protocol for decentralised CRNs (MCRN). The protocol provides efficient utilisations of the unused licensed channels and enables CUs to exchange data successfully over licensed channels. This is based on the observation procedure of sensing the status of the Licensed Users (LUs) are ON or OFF over the licensed channels. The protocol is validated with the comparison procedure against two different benchmark protocols in terms of the network performance; communication time and throughput. Therefore, performance analysis demonstrated that the proposed MCRN perform better and achieve higher throughput and time benefits than the benchmarks protocols

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    Minimum energy wireless sensor networks

    Get PDF
    PhD programme overviewHere, on-off keying modulation is used as a means of reducing the transmit energy requirements whilst exploiting inherent channel coding, which sets the scene of this PhD study

    DDH-MAC: a novel dynamic de-centralized hybrid MAC protocol for cognitive radio networks

    Get PDF
    The radio spectrum (3kHz - 300GHz) has become saturated and proven to be insufficient to address the proliferation of new wireless applications. Cognitive Radio Technology which is an opportunistic network and is equipped with fully programmable wireless devices that empowers the network by OODA cycle and then make intelligent decisions by adapting their MAC and physical layer characteristics such as waveform, has appeared to be the only solution for current low spectrum availability and under utilization problem. In this paper a novel Dynamic De-Centralized Hybrid “DDH-MAC” protocol for Cognitive Radio Networks has been presented which lies between Global Common Control Channel (GCCC) and non-GCCC categories of cognitive radio MAC protocols. DDH-MAC is equipped with the best features of GCCC MAC protocols but also overcomes the saturation and security issues in GCCC. To the best of authors' knowledge, DDH-MAC is the first protocol which is hybrid between GCCC and non-GCCC family of protocols. DDH-MAC provides multiple levels of security and partially use GCCC to transmit beacon which sets and announces local control channel for exchange of free channel list (FCL) sensed by the co-operatively communicating cognitive radio nodes, subsequently providing secure transactions among participating nodes over the decided local control channel. This paper describes the framework of the DDH-MAC protocol in addition to its pseudo code for implementation; it is shown that the pre-transmission time for DDH-MAC is on average 20% better while compared to other cognitive radio MAC protocols

    Linearizability of Systems of Ordinary Differential Equations Obtained by Complex Symmetry Analysis

    Get PDF
    Five equivalence classes had been found for systems of two second-order ordinary differential equations, transformable to linear equations (linearizable systems) by a change of variables. An "optimal (or simplest) canonical form" of linear systems had been established to obtain the symmetry structure, namely with 5, 6, 7, 8 and 15 dimensional Lie algebras. For those systems that arise from a scalar complex second-order ordinary differential equation, treated as a pair of real ordinary differential equations, a "reduced optimal canonical form" is obtained. This form yields three of the five equivalence classes of linearizable systems of two dimensions. We show that there exist 6, 7 and 15-dimensional algebras for these systems and illustrate our results with examples

    Cell cycle in early mouse embryos : implications for nuclear transfer

    Get PDF

    Pre-Generation of Student Module in Intelligent Tutoring System

    Get PDF
    An intelligent tutoring system (ITS) is a system that provides direct modified instruction or feedback to students without the interference of human beings. Most of the researches in ITS have been in assessment, reforming of the learning objects and change of the learning object finding path. To make an ITS as efficient as expert human tutors, this research aims at identifying the user understanding level of a user prior to using an ITS by conducting a pre-test. Upon completing the test, user will be presented with a teaching session that is based on his/her performance in the undertaken pre-test. The system is intended for undergraduate students to learn knowledge representation. Two systems were developed for the purpose of evaluation and namely Version A and Version B. Version A adopts the existing approach that assumes all students have the same background knowledge, while Version B conducted the teaching session according to students existing knowledge. A pilot test was performed on the BIT undergraduate students. The results showed that by using Version B, students obtained a better result compared to using Version A

    Differential Gene Expression and Its Possible Therapeutic Implications

    Get PDF

    A survey of QoS-aware web service composition techniques

    Get PDF
    Web service composition can be briefly described as the process of aggregating services with disparate functionalities into a new composite service in order to meet increasingly complex needs of users. Service composition process has been accurate on dealing with services having disparate functionalities, however, over the years the number of web services in particular that exhibit similar functionalities and varying Quality of Service (QoS) has significantly increased. As such, the problem becomes how to select appropriate web services such that the QoS of the resulting composite service is maximized or, in some cases, minimized. This constitutes an NP-hard problem as it is complicated and difficult to solve. In this paper, a discussion of concepts of web service composition and a holistic review of current service composition techniques proposed in literature is presented. Our review spans several publications in the field that can serve as a road map for future research
    • 

    corecore