2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)最新文献

筛选
英文 中文
Implementation of OFDM-based multi-relay multi-pair two-way communication network 基于ofdm的多中继多对双向通信网络的实现
N. Parveen, D. S. Venkateswarlu, B. Bhandari
{"title":"Implementation of OFDM-based multi-relay multi-pair two-way communication network","authors":"N. Parveen, D. S. Venkateswarlu, B. Bhandari","doi":"10.1109/WOCN.2014.6923057","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923057","url":null,"abstract":"With increasing demand for higher data rate, better quality of service, and higher network capacity, there is a migration from Single Input Single Output (SISO) antenna technology to a more promising Multiple Input Multiple Output (MIMO) antenna technology. On the other hand, Orthogonal Frequency Division Multiplexing (OFDM) technique has emerged as a very popular multi-carrier modulation technique to enhance the data rate of future broadband wireless communication systems. Applying these technologies with a wireless relay network where multiple user pairs conduct bidirectional communications via multiple relays based on OFDM transmission. The joint optimization of channel and relay assignment, including subcarrier pairing, subcarrier allocation as well as relay selection, for total throughput maximization is formulated as a combinatorial optimization problem. Using a graph theoretical approach, we solve the problem optimally in polynomial time by transforming it into a maximum weighted bipartite matching (MWBM) problem. Simulation studies are carried out to evaluate the network total throughput versus transmit power per node and the number of relay nodes.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132948121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bioengineering methods computational analysis of Cancer data 癌症数据的生物工程方法计算分析
V. Murthy, G. P. S. Varma
{"title":"Bioengineering methods computational analysis of Cancer data","authors":"V. Murthy, G. P. S. Varma","doi":"10.1109/WOCN.2014.6923099","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923099","url":null,"abstract":"Bioengineering, bioinformatics, and other advanced technologies provide crosscutting tools that facilitate research in many disciplines. This paper gives Analysis of Cancer data taken from Microarray profiles.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134391558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demonstration of RZ-OOK modulation scheme for high speed optical data transmission 高速光数据传输的RZ-OOK调制方案的演示
Adarsh Jain, R. K. Bahl, A. Banik
{"title":"Demonstration of RZ-OOK modulation scheme for high speed optical data transmission","authors":"Adarsh Jain, R. K. Bahl, A. Banik","doi":"10.1109/WOCN.2014.6923082","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923082","url":null,"abstract":"The optical communication has gained enormous popularity as an effective means of transferring data at high rates because of extremely high bandwidth access and cost effectiveness. On-Off keying (OOK) modulation scheme with direct detection is the most widely used intensity modulation scheme for optical communication. OOK can use either nonreturn-to-zero (NRZ) or return-to-zero (RZ) pulse formats for communication. RZ modulation format is becoming increasingly popular for high speed data transmission due to its superior performance over conventional NRZ format. In this paper, we demonstrate the design and implementation details for RZ-OOK modulation scheme for various duty cycles. The experimental setup and test results for 1 Gbps RZ-OOK transmitter has also been presented. This RZ-OOK transmitter consists of a laser diode followed by two Mach-Zehnder (MZ) modulators connected in cascade. We also present analysis and simulation results such as eye diagram, optical spectrum etc. for RZ-OOK as well as NRZ-OOK modulation schemes for data rates upto 10 Gbps.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129947743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance analysis of FTDSR and AOTDV trust based routing protocols 基于FTDSR和AOTDV信任的路由协议性能分析
Hema R. Karande, S. Thorat
{"title":"Performance analysis of FTDSR and AOTDV trust based routing protocols","authors":"Hema R. Karande, S. Thorat","doi":"10.1109/WOCN.2014.6923064","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923064","url":null,"abstract":"Ad hoc networks, due to their spontaneous nature, are frequently established in insecure environments and hence become prone to attacks. These attacks are due to the participation of malicious nodes in the network. Routing protocols are a common target of these nodes. A variety of secure routing protocols have been proposed, that make routes secure using cryptographic algorithms. However, in doing so, these protocols need a number of rudiments in both the network establishment and operation phases. In contrast, by observing the honesty in participation by other nodes, trust-based routing protocols discover trusted rather than secure routes in the network. These protocols thus allow rapid deployment along with a vigorously adaptive operation, which conforms to the present network situation. In this paper, we conduct the performance evaluation of four reactive routing protocols in a network with varying speed, network dimension and number of malicious nodes. With the help of comprehensive simulations, we demonstrate that the performance of these protocols is analyzed using Packet delivery ratio, Throughput, End-to-End Delay and Routing Load under similar attacks, traffic, and mobility conditions. However, each routing protocol has its own peculiar advantage making it suitable for application in a particular unplanned environment.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128450107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signal detection in cognitive radio networks over AWGN, Nakagami-m and Nakagami-q channels AWGN、Nakagami-m和Nakagami-q信道上认知无线网络的信号检测
R. Ujjinimatad, S. Patil
{"title":"Signal detection in cognitive radio networks over AWGN, Nakagami-m and Nakagami-q channels","authors":"R. Ujjinimatad, S. Patil","doi":"10.1109/WOCN.2014.6923092","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923092","url":null,"abstract":"In this paper, we consider the problem of spectrum sensing based on energy detection (ED) method in cognitive radio (CR) over wireless communication channels when users experiences fading and non fading effects. The closed form analytical expressions for the detection probability are derived over non fading Additive White Gaussian Noise (AWGN) channel and Nakagami-m and Nakagami-q fading channels. The detection probability involving Marcum-Q function is replaced by closed form expression. The probability distribution function (PDF) of fading channels is used to obtain the expressions for detection probability. The new derived numerical results are simulated under various parameters. The performance of the derived theoretical expressions closely matches with the simulated results.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128919645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An HSM-based scalable network service model 基于hsm的可扩展网络服务模型
Yinlu Peng, Jun Shen, Xiaojian Zhu
{"title":"An HSM-based scalable network service model","authors":"Yinlu Peng, Jun Shen, Xiaojian Zhu","doi":"10.1109/WOCN.2014.6923088","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923088","url":null,"abstract":"The scalability of the ability to provide and deploy network services is one of the major demands of the next generation network, and is also the main challenge of the development of the network service model technique. Through the comparison of several different network service models and the analysis of the key mechanisms of the next generation network, this paper proposes an HSM (hierarchical state machine) based scalable network service model which can dynamically build the users' required network services. The paper gives an example of implementing a network transfer service with connections using our proposed dynamic service composition method. The experiment results illustrate the feasibility and flexibility of this scalable network service model.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of effect of mobility and transmission power on AODV and DSR in mobile Adhoc network 移动Adhoc网络中移动性和发射功率对AODV和DSR的影响分析
B. K. Panda, J. Swain, Durga Prasad Mishra, B. Sahu
{"title":"Analysis of effect of mobility and transmission power on AODV and DSR in mobile Adhoc network","authors":"B. K. Panda, J. Swain, Durga Prasad Mishra, B. Sahu","doi":"10.1109/WOCN.2014.6923073","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923073","url":null,"abstract":"Now a days there is a remarkable growth in telecommunication technology which makes users of mobile electronic devices accessible to a communication network. These electronic devices are nothing but the nodes of the Mobile Ad hoc Network (MANET). Each node can move from one place to other during communication and this mobility is having its effect on performance of the network. Mobility changes when speed of the node and pause time with which it moves changes. Change in mobility causes break of link with neighboring nodes as a result of which the performance of a network may be reduced. A number of packets are dropped at different layers of the network. This paper describes the analysis of change in performance due to change in mobility and transmission power. The parameters describing the reason of variation in performance are (1) number of link breaks and (2) number of packet delivered. (3)End to end delay. The simulator we have used in our work for the calculation of performance matrices is GLOMOSIM. The performance comparison has also made between two types of on demand routing protocols AODV and DSR.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122640996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A novel approach to naval architecture using 1G VLAN with RSTP 一种基于RSTP的1G VLAN海军架构新方法
Zeba Syed, R. Raju, Sandeep Joshi, Jeril Kuriakose
{"title":"A novel approach to naval architecture using 1G VLAN with RSTP","authors":"Zeba Syed, R. Raju, Sandeep Joshi, Jeril Kuriakose","doi":"10.1109/WOCN.2014.6923086","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923086","url":null,"abstract":"Traditional naval architecture includes all the departments concatenated into a single physical network and if it has to be separated, then physically different network is formed. This paper strives on removing the logical single network whilst maintaining the physical network intact on all the departments by implementing VLAN. Various automation systems like IBS, IPMS, CCTV, APMS and communication systems could be on the same physical network (reducing the cabling) and logically separated leading to isolation of network traffic to specified systems and smooth running of the automation systems without additional load in it, further as VLAN segment the network into different broadcast domains so the packets are only delivered between ports that are combined for the same VLAN. The latency is of key importance, to boost this up, further rapid spanning tree protocol; RSTP is used to get better results. The monitoring software; wireshark was used to compare the analysis of latency, considering real time architectural parameters.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122382516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A digital watermarking approach based on DCT domain combining QR code and chaotic theory 结合QR码和混沌理论的基于DCT域的数字水印方法
Qingbo Kang, Ke Li, Jichun Yang
{"title":"A digital watermarking approach based on DCT domain combining QR code and chaotic theory","authors":"Qingbo Kang, Ke Li, Jichun Yang","doi":"10.1109/WOCN.2014.6923098","DOIUrl":"https://doi.org/10.1109/WOCN.2014.6923098","url":null,"abstract":"This paper proposes a robust watermarking approach based on Discrete Cosine Transform (DCT) domain that combines Quick Response (QR) Code and chaotic system. When embed the watermark, the high error correction performance and the strong decoding capability of QR Code are utilized to decode the text watermark information which improves the robustness of the watermarking algorithm. Then the QR Code image is encrypted with chaotic system to enhance the security of this approach. Finally the encrypted image is embedded to the carrier image's DCT blocks after they underwent block-based Arnold scrambling transformation. During the extraction process, as long as the QR Code image can be decoded, the completeness and accuracy of the text watermarking information can be guaranteed. The results of simulation experiment show that this approach has high robustness and security and has, therefore, some practical value in the copyright protection.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130880108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信