{"title":"Analysis of path loss models of 4G femtocells","authors":"C. S. Vardhan, D. Ratnam, N. Bhagyasree, A. Dattu","doi":"10.1109/WOCN.2014.6923071","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923071","url":null,"abstract":"Mobile cellular communications revolutionized in communication system applications. The present mobile cellular communication networks normally often suffer from poor penetration and reception in certain areas, like indoor and apartments in turn decreasing quality of service. The main backbone of Long Term Evolution Advanced (LTE)- mobile network is internet. In order to reduced the traffic and enhance data rates, femtocell can be used to improve wireless coverage over a small area, especially in indoor and urban environment. Femtocell is a small cellular base station that connects to a broadband Internet connection. The major technical challenges of femtocells are cross-tier, Intra-tier and user equipment interference, quality of service, handover operation and spectral accuracy. The predominate issue is cross-tier interference constituting macro cell and femtocell networks constitutes the greater portion of interference in terms of adjacent channel interference. In this paper, Interference levels in reception of heterogeneous LTE Network by using two different path loss models are investigated. Signal to interference ratio and the throughput are estimated The trade-off between selections of Femto or Macro BS link by the User Equipment (UE) is examined by considering number of walls and penetration losses of Computer Block (7 floors, 10 walls), KL University, Vaddeswaram, Guntur, India. It is found that that model-2 is better in Interference mitigation and path loss estimation compared to model-1.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124622903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring uncertainty of MANET","authors":"Jasmeen I. Mujawar, S. Thorat","doi":"10.1109/WOCN.2014.6923070","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923070","url":null,"abstract":"MANET is a multi-hop network comprised of nodes that need to work in collaboration with each other for effective routing. But unfortunately, there is possibility of some nodes misbehaving for their own interests and disturbing the network. Therefore, reliability among nodes is very important in the network. Uncertainty is of prior importance, which deeply impacts a node's anticipation of others behavior and decision making during interaction. In this paper, we introduce the concept of uncertainty to rationally evaluate trust. We analyze the impact of network size, malicious nodes, number of connections and speed on the uncertainty of network under two cases i.e. with and without recommendations. The paper contributes to find uncertainty index of every node and ultimately obtaining average uncertainty of network. This is achieved by mathematical theory of evidence. Thus we conclude, uncertainty with recommendation is less as compared to uncertainty without recommendation.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123833154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient battery management in wireless sensor node: Review paper","authors":"Vivek P. Nighot, S. Lambor, S. Joshi","doi":"10.1109/WOCN.2014.6923085","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923085","url":null,"abstract":"Wireless sensor network is an emerging field in wireless networking. Wireless Sensor Node (WSN) is the key component of wireless sensor networks for data communication inn large networks. WSN is powered with battery as its source of energy. It is usually deployed in hostile. Alkaline batteries are dominantly used in WSN. We need to maximize utilization of battery used in WSN. In this paper we have reviewed various models of the alkaline battery for maximizing its utilization and its lifetime. A brief experiment on relaxation model has been carried out which is most suitable battery model for predicting lifetime of battery in WSN.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114780776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Tejaswini, P. Manjunath, G. V. K. Rao, Rajeshwari Hegde
{"title":"Comprehensive analysis of routing protocols for the application layer of LTE","authors":"G. Tejaswini, P. Manjunath, G. V. K. Rao, Rajeshwari Hegde","doi":"10.1109/WOCN.2014.6923054","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923054","url":null,"abstract":"LTE, an acronym for Long Term Evolution is a standard developed by the 3rd Generation Partnership Project (3GPP) for high peak data rates with a downlink speed of up to 150 megabits per second (Mbps) and an uplink speed of up to 50 Mbps. LTE is a way for cellular communications to operate at that high data rate. Routing is an important operation performed to route the data packets from the source node to destination node in any network. Hence there is a need for a protocol/algorithm to determine the best way to transfer the data. Routing protocols determine the best route to transfer data from one node to another. In this paper, a comparative study of the routing protocols for the application layer of LTE network is done. The protocols analyzed are Optimized Link State Routing (OLSR) and Routing Information Protocol (RIP). A study and comparison of the parameters are done based on the simulation results. The different performance metrics analyzed are Packet delivery ratio, Throughput, Average end-to-end delay and Jitter. The simulation results show that the best routing protocol w.r.t all the parameters analyzed is RIP.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122009526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A low power flash ADC with Wallace tree encoder","authors":"T. Pardhu, S. Manusha, K. Sirisha","doi":"10.1109/WOCN.2014.6923067","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923067","url":null,"abstract":"In this project, a Flash ADC with TIQ(Threshold Inverter Quantizer) comparator and a Wallace tree encoder is described. Both DC and transient analysis report for 3 bit ADC are included. A comparison between Wallace tree and ROM encoder is included in the project illustrating how power can be reduced using Wallace tree encoder instead of ROM encoder. The design was successfully simulated for piece-wise linear and sinusoidal input. The 4 bit and 5 bit flash ADC with TIQ comparator and Wallace tree encoder is also described.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127183501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Almost sure connectivity in secure wireless sensor network","authors":"Jyoti Pandey, B. Gupta, S. S. Lamba","doi":"10.1109/WOCN.2014.6923055","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923055","url":null,"abstract":"In this paper, our work is to focus on the almost sure connectivity properties of secure wireless sensor networks. We consider a wireless sensor network which is generated randomly using random key pre distribution scheme given by Eschenauer and Gligor under non-full visibilitys. Here, we consider a sensor network in 2-dimensional space, and a sequence Xn = {Xi, X2,...Xn}, with n sensor nodes distributed uniformly over a compact space C ⊂ R2 We focus on network cut to deal with connectivity issues in WSNs. We have given a strong relationship and derived a threshold for the proportion of key ring and key pool size, above which graph will have no cut in the network almost surely. We prove that if key pool size is n log n and key ring size of an arbitrary node is c log n and if c > 1/s(1-s/n) then there will be no cut in the network.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127872764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring and analysis of lung sounds for the diagnosis of lung abnormalities","authors":"K. A. Menon, A. Drishya, Dilraj Nadarajan","doi":"10.1109/WOCN.2014.6923077","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923077","url":null,"abstract":"Lung infections and lung diseases are common and can be potentially deadly. Hence preventing lung diseases is more mandatory than curing them. Specialist doctors are less available in rural areas compared to urban areas. Thus it has become necessary to develop some method by which people in remote areas can be monitored by specialist doctors who might be far away. This paper proposes a method for preliminary detection of lung infections by analyzing lung sounds obtained by auscultation. To analyze the lung sounds, FFT was calculated and plotted. A number of pre-recorded lung sounds aided the analysis as well. Classification of lung sounds, as normal or adventitious, was done based on the variations observed in the above calculations. This data can be sent wirelessly via GSM/3G to the server in hospital where a specialist doctor can further analyze it for confirmation on lung infection.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129229843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An ARM-7 based embedded energy efficient LED lighting system for domestic applications with user satisfaction","authors":"M. Sulthana, N. U. Rao","doi":"10.1109/WOCN.2014.6923078","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923078","url":null,"abstract":"Now-a-days, it is more of a win-win than ever to save on energy. Every time we lower our utility bills, we put more money back in our bank account and lower energy bills also means less energy consumed, which means less harmful emissions released into our environment. To make our homes more energy efficient, one of the least expensive and most effective changes that we can make is replacing the light bulbs. Hence this project proposes an intelligent house hold LED lighting system to make the house energy efficient and user satisfied. The proposed system utilizes multi sensors and wireless communication technology in order to control a LED light according to user's state and surroundings. An ARM 7 based embedded system design with day light and PIR sensors will be attempted to control the lighting and its intensity in a household environment. The wireless communication technology uses zigbee and RS-485 protocol for serial communication. The proposed system after implementation will be verified for its performance against a conventional system and the percentage of energy saving will be calculated.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126395449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Topology-aware Contributory Load based Channel Assignment algorithm for WMN","authors":"K. Athota, A. Negi","doi":"10.1109/WOCN.2014.6923044","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923044","url":null,"abstract":"Wireless Mesh Networks(WMNs) are evolving as an avenue for low-cost broadband wireless access networks. In WMN routers that are generally equipped with multiple radios. There are several challenges posed by WMN, here we look at Channel Assignment(CA) which influences capacity of WMN network. A solution to Channel Assignment problem must aim to improve network capacity by minimizing interference and retaining connectivity. In this paper we propose a novel CA algorithm named Topology-aware Contributory Load based CA (TCLCA). TCLCA addresses the objective of minimizing aggregate contributory load in the network yet preserving topology. The TCLCA uses `Contributory Load' to efficiently prioritize links based on expected load and interference. The performance evaluation of TCLCA is carried over ns-2 and is compared with an existing load aware CA algorithm and a load unaware CA algorithm. The TCLCA demonstrates improvement in terms of performance metrics throughput, delay and packet delivery ratio.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133922526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Vivaldi like antenna using fourier series approach","authors":"R. Anu, S. S. Kumar","doi":"10.1109/WOCN.2014.6923058","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923058","url":null,"abstract":"Antenna designed for ultra wide band (UWB) applications should offer a wider bandwidth with minimum distortion of radiated and received pulses. One such antenna which satisfies these requirements is the Vivaldi antenna. Conventional exponentially tapered slot Vivaldi antenna offers only a small gain at lower microwave frequencies. This paper presents the design of the complex flare geometry of a Vivaldi like antenna, using fourier series approach. In general, the radiating flare of a Vivaldi antenna is a closed contour and any complex closed structure can be represented using finite fourier series. Fourier coefficients and hence the antenna shape is selected so as to achieve the objective of maximum gain and minimum reflection coefficient (S11). Designed antenna structure using FR4_epoxy dielectric (εr=4.4, h=4.5 mm, tanδ=0.002) as substrate has a dimension of 79×126 mm and it can be operated over a band of spectrum from 2.1 to 9.2 GHz. At a frequency of 2.6 GHz it offers a peak gain of 6.1226 dB. Simulations were performed in high frequency structure simulator (HFSS) and antenna parameters like return loss (S11), radiation patterns, gain and directivity are studied. Simulation results and measurements made from prototype agrees well, which verifies the proposed design concepts.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}