C. Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado, Nikolaos Papachristos
{"title":"A Comparative Study of Machine Learning Models for Spreading Factor Selection in LoRa Networks","authors":"C. Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado, Nikolaos Papachristos","doi":"10.4018/IJWNBT.2021070106","DOIUrl":"https://doi.org/10.4018/IJWNBT.2021070106","url":null,"abstract":"Low power wide area networks (LPWAN) technologies offer reasonably priced connectivity to a large number of low-power devices spread over great geographical ranges. Long range (LoRa) is a LPWAN technology that empowers energy-efficient communication. In LoRaWAN networks, collisions are strongly correlated with spreading factor (SF) assignment of end-nodes which affects network performance. In this work, SF assignment using machine learning models in simulation environment is presented. This work examines three approaches for the selection of the SF during LoRa transmissions: 1) random SF assignment, 2) adaptive data rate (ADR), and 3) SF selection through machine learning (ML). The main target is to study and determine the most efficient approach as well as to investigate the benefits of using ML techniques in the context of LoRa networks. In this research, a library that enables the communication between ML libraries and OMNeT++ simulator was created. The performance of the approaches is evaluated for different scenarios using the delivery ratio and energy consumption metrics.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124766684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategy for Reducing Delays and Energy Consumption in Cloudlet-Based Mobile Cloud Computing: Problems on Mobile Devices, Problem Solution, Selection of Cloudlets According to User Requirements","authors":"R. Alakbarov","doi":"10.4018/IJWNBT.2021010102","DOIUrl":"https://doi.org/10.4018/IJWNBT.2021010102","url":null,"abstract":"In the paper, the problem of using cloudlet-based mobile cloud computing to solve the issues (resource deficiency and limited energy) that require large computing and memory resources on mobile devices has been studied. Energy-saving of mobile devices, resource limitations in mobile devices, and elimination of network delays are analyzed. It is shown that the solution of mobile users' tasks in the cloud leads to the increased battery life of mobile devices and reduces network delays, which is shown by mathematical calculations. The article considers the balanced distribution of the tasks in the cloudlet network. The paper also deals with the selection of cloudlets according to user requirements. The cases for which a cloud application can be loaded by the user were evaluated and a model was proposed using the possible values that determine the importance of cloudlets (user proximity, high reliability, etc.).","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132454710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent Advances on Artificial Intelligence in Cognitive Radio Networks","authors":"B. Benmammar","doi":"10.4018/ijwnbt.2020010102","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020010102","url":null,"abstract":"Cognitive radio is a form of wireless communication that makes decisions about allocating and managing radio resources after detecting its environment and analyzing the parameters of its radio frequency environment. Decision making in cognitive radio can be based on optimization techniques. In this context, machine learning and artificial intelligence are to be used in cognitive radio networks in order to reduce complexity, obtain resource allocation in a reasonable time and improve the user's quality of service. This article presents recent advances on artificial intelligence in cognitive radio networks. The article also categorizes the techniques presented according to the type of learning—supervised or unsupervised—and presents their applications and challenges according to the tasks of the cognitive radio.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125492887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Networks of Underwater Sensor Wireless Systems: Latest Problems and Threats","authors":"M. Rani, Poonam Singal","doi":"10.4018/IJWNBT.2021010104","DOIUrl":"https://doi.org/10.4018/IJWNBT.2021010104","url":null,"abstract":"Underwater wireless networks have been the subject of considerable attention in research and development by both academia and industry, while applications are expanding to a wide range of uses, including industrial, scientific, military, and environmental applications. The paper presents a analysis of the underwater wireless sensor network, a system that is promising to reveal the secrets of marine life and other underwater applications. The information about the underwater channel was listed with a focus on communication of both the acoustic and optical kind. Then, the node location strategies and related protocols for routing that can be applied to the desired communication type were discussed briefly. The hard environment and peculiar features of UWSNs are responsible for efficient communication between sensors in UWSNs. This paper proposes a robust and energy-efficient UWSN location-free routing system, based on constraint. RE-PBR takes into account three criteria, including performance, depth, and residual power connections, to balance energy consumption and to produce usable results. The findings of the simulation show that the proposed work decreases travel costs and by using less energy increases the network's life.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122826995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks","authors":"Q. Mamun, M. Islam, M. Kaosar","doi":"10.4018/ijwnbt.2015010103","DOIUrl":"https://doi.org/10.4018/ijwnbt.2015010103","url":null,"abstract":"The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Frame Duration and Modulation Coding Schemes With WiMAX Bandwidth Asymmetry in Transmission Control Protocol Variants","authors":"K. C. Bandhu, A. Bhansali","doi":"10.4018/ijwnbt.2019010103","DOIUrl":"https://doi.org/10.4018/ijwnbt.2019010103","url":null,"abstract":"WiMAX stands for Worldwide Interoperability for Microwave Access which is based on IEEE 802.16 specification and is considered as de facto standard for the broadband wireless data transfer over the internet. The different values of various WiMAX parameters for different TCP variants may affect the performance of the network. This article compares the performance of different TCP variants with bandwidth asymmetry, frame duration, and modulation coding schemes, along with the operating parameter namely number of wireless nodes. During the simulation study the performance was evaluated only for one-way data transfer. The finding suggests that the TCP New Reno performed better than other variants included in the simulation study for the comparison. The performance was measured on the basis of throughput, goodput and packets dropped.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134272763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ming-Fong Tsai, N. Chilamkurti, Ping-Fan Ho, Yin-Chih Lu
{"title":"Implementation of Dedicated Short Range Communications Combined with Radar Detection for Forward Collision Warning System","authors":"Ming-Fong Tsai, N. Chilamkurti, Ping-Fan Ho, Yin-Chih Lu","doi":"10.4018/ijwnbt.2012010104","DOIUrl":"https://doi.org/10.4018/ijwnbt.2012010104","url":null,"abstract":"The Forward Collision Warning System (FCWS) has become an important research topic in recent years. Many FCWS products are used in the real world. However, these FCWS products cannot provide emergency braking events warning from the vehicle in front. Hence, this paper proposes a Dedicated Short Range Communications (DSRC) system combined with radar detection for an FCWS mechanism. The mechanism proposed by this paper will actively probe the emergency brakes of the vehicle in front and broadcast warning information with the Global Positioning System (GPS) position. Moreover, this mechanism uses warning information based on the GPS position to calculate the time of collision in order to alert the driver.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132311220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Leligou, P. Chatzimisios, L. Sarakis, T. Orphanoudakis, P. Karkazis, T. Zahariadis
{"title":"An 802.11p Compliant System Prototype Supporting Road Safety and Traffic Management Applications","authors":"H. Leligou, P. Chatzimisios, L. Sarakis, T. Orphanoudakis, P. Karkazis, T. Zahariadis","doi":"10.4018/ijwnbt.2014010101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2014010101","url":null,"abstract":"During the last decades Intelligent Transportation Systems ITS have been attracting the interest of an increasing number of researchers, engineers and entrepreneurs, as well as citizens and civil authorities, since they can contribute towards improving road transport safety and efficiency and ameliorate environmental conditions and life quality. Emerging technologies yield miniaturized sensing, processing and communication devices that enable a high degree of integration and open the way for a large number of smart applications that can exploit automated fusion of information and enable efficient decisions by collecting, processing and communicating a large number of data in real-time. The cornerstone of these applications is the realization of an opportunistic wireless communication system between vehicles as well as between vehicles and infrastructure over which the right piece of information reaches the right location on time. In this paper, the authors present the design and implementation of representative safety and traffic management applications. Specifically the authors discuss the hardware and software requirements presenting a use case based on the NEC Linkbird-MX platform, which supports IEEE 802.11p based communications. The authors show how the functionality of IEEE 802.11p can be exploited to build efficient road safety and traffic management applications over mobile opportunistic systems and discuss practical implementation issues.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129593695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safety of Mobile Wireless Sensor Networks Based on Clustering Algorithm","authors":"Amine Dahane, Berrached Nasr-Eddine, A. Loukil","doi":"10.4018/IJWNBT.2016010105","DOIUrl":"https://doi.org/10.4018/IJWNBT.2016010105","url":null,"abstract":"Clustering approaches for mobile wireless sensor networks (WSNs) tend to extend the battery life of the individual sensors and the network lifetime. Taking into account the mobility of the network, a powerful mechanism to safely elect a cluster head is a challenging task in many research works. As a proposed technique to deal with such problem, the approach based on the computing of the weight of each node in the network is chosen. This paper is intended to propose a new algorithm called “S-WCA” for safety of mobile sensor networks based on clustering algorithm using a combination of five metrics. Among these metrics lies the behavioral level metric which promotes a safe choice of a cluster head in the sense where this last one will never be a malicious node. Moreover, a summary of the highlight of the authors' work is provided in a comprehensive strategy for monitoring the network, so as to detect and remove the malicious nodes. Simulation study is used to demonstrate the performance of the proposed algorithm.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126995918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of a Three Node Client Relay System","authors":"S. Andreev, O. Galinina, A. Vinel","doi":"10.4018/ijwnbt.2011010106","DOIUrl":"https://doi.org/10.4018/ijwnbt.2011010106","url":null,"abstract":"In this paper, the authors examine a client relay system comprising three wireless nodes. Closed-form expressions for mean packet delay, as well as for throughput, energy expenditure, and energy efficiency of the source nodes are also obtained. The precision of the established parameters is verified by means of simulation.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126358772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}