Int. J. Wirel. Networks Broadband Technol.最新文献

筛选
英文 中文
A Comparative Study of Machine Learning Models for Spreading Factor Selection in LoRa Networks LoRa网络中扩展因子选择的机器学习模型比较研究
Int. J. Wirel. Networks Broadband Technol. Pub Date : 1900-01-01 DOI: 10.4018/IJWNBT.2021070106
C. Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado, Nikolaos Papachristos
{"title":"A Comparative Study of Machine Learning Models for Spreading Factor Selection in LoRa Networks","authors":"C. Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado, Nikolaos Papachristos","doi":"10.4018/IJWNBT.2021070106","DOIUrl":"https://doi.org/10.4018/IJWNBT.2021070106","url":null,"abstract":"Low power wide area networks (LPWAN) technologies offer reasonably priced connectivity to a large number of low-power devices spread over great geographical ranges. Long range (LoRa) is a LPWAN technology that empowers energy-efficient communication. In LoRaWAN networks, collisions are strongly correlated with spreading factor (SF) assignment of end-nodes which affects network performance. In this work, SF assignment using machine learning models in simulation environment is presented. This work examines three approaches for the selection of the SF during LoRa transmissions: 1) random SF assignment, 2) adaptive data rate (ADR), and 3) SF selection through machine learning (ML). The main target is to study and determine the most efficient approach as well as to investigate the benefits of using ML techniques in the context of LoRa networks. In this research, a library that enables the communication between ML libraries and OMNeT++ simulator was created. The performance of the approaches is evaluated for different scenarios using the delivery ratio and energy consumption metrics.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124766684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Strategy for Reducing Delays and Energy Consumption in Cloudlet-Based Mobile Cloud Computing: Problems on Mobile Devices, Problem Solution, Selection of Cloudlets According to User Requirements 基于cloudlet的移动云计算时延和能耗降低策略:移动设备上的问题,问题解决,根据用户需求选择cloudlet
Int. J. Wirel. Networks Broadband Technol. Pub Date : 1900-01-01 DOI: 10.4018/IJWNBT.2021010102
R. Alakbarov
{"title":"Strategy for Reducing Delays and Energy Consumption in Cloudlet-Based Mobile Cloud Computing: Problems on Mobile Devices, Problem Solution, Selection of Cloudlets According to User Requirements","authors":"R. Alakbarov","doi":"10.4018/IJWNBT.2021010102","DOIUrl":"https://doi.org/10.4018/IJWNBT.2021010102","url":null,"abstract":"In the paper, the problem of using cloudlet-based mobile cloud computing to solve the issues (resource deficiency and limited energy) that require large computing and memory resources on mobile devices has been studied. Energy-saving of mobile devices, resource limitations in mobile devices, and elimination of network delays are analyzed. It is shown that the solution of mobile users' tasks in the cloud leads to the increased battery life of mobile devices and reduces network delays, which is shown by mathematical calculations. The article considers the balanced distribution of the tasks in the cloudlet network. The paper also deals with the selection of cloudlets according to user requirements. The cases for which a cloud application can be loaded by the user were evaluated and a model was proposed using the possible values that determine the importance of cloudlets (user proximity, high reliability, etc.).","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132454710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Recent Advances on Artificial Intelligence in Cognitive Radio Networks 认知无线电网络人工智能研究进展
Int. J. Wirel. Networks Broadband Technol. Pub Date : 1900-01-01 DOI: 10.4018/ijwnbt.2020010102
B. Benmammar
{"title":"Recent Advances on Artificial Intelligence in Cognitive Radio Networks","authors":"B. Benmammar","doi":"10.4018/ijwnbt.2020010102","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020010102","url":null,"abstract":"Cognitive radio is a form of wireless communication that makes decisions about allocating and managing radio resources after detecting its environment and analyzing the parameters of its radio frequency environment. Decision making in cognitive radio can be based on optimization techniques. In this context, machine learning and artificial intelligence are to be used in cognitive radio networks in order to reduce complexity, obtain resource allocation in a reasonable time and improve the user's quality of service. This article presents recent advances on artificial intelligence in cognitive radio networks. The article also categorizes the techniques presented according to the type of learning—supervised or unsupervised—and presents their applications and challenges according to the tasks of the cognitive radio.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125492887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Networks of Underwater Sensor Wireless Systems: Latest Problems and Threats 水下传感器无线系统网络:最新问题和威胁
Int. J. Wirel. Networks Broadband Technol. Pub Date : 1900-01-01 DOI: 10.4018/IJWNBT.2021010104
M. Rani, Poonam Singal
{"title":"Networks of Underwater Sensor Wireless Systems: Latest Problems and Threats","authors":"M. Rani, Poonam Singal","doi":"10.4018/IJWNBT.2021010104","DOIUrl":"https://doi.org/10.4018/IJWNBT.2021010104","url":null,"abstract":"Underwater wireless networks have been the subject of considerable attention in research and development by both academia and industry, while applications are expanding to a wide range of uses, including industrial, scientific, military, and environmental applications. The paper presents a analysis of the underwater wireless sensor network, a system that is promising to reveal the secrets of marine life and other underwater applications. The information about the underwater channel was listed with a focus on communication of both the acoustic and optical kind. Then, the node location strategies and related protocols for routing that can be applied to the desired communication type were discussed briefly. The hard environment and peculiar features of UWSNs are responsible for efficient communication between sensors in UWSNs. This paper proposes a robust and energy-efficient UWSN location-free routing system, based on constraint. RE-PBR takes into account three criteria, including performance, depth, and residual power connections, to balance energy consumption and to produce usable results. The findings of the simulation show that the proposed work decreases travel costs and by using less energy increases the network's life.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122826995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks 基于集群的无线传感器网络安全通信密钥建立
Int. J. Wirel. Networks Broadband Technol. Pub Date : 1900-01-01 DOI: 10.4018/ijwnbt.2015010103
Q. Mamun, M. Islam, M. Kaosar
{"title":"Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks","authors":"Q. Mamun, M. Islam, M. Kaosar","doi":"10.4018/ijwnbt.2015010103","DOIUrl":"https://doi.org/10.4018/ijwnbt.2015010103","url":null,"abstract":"The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An 802.11p Compliant System Prototype Supporting Road Safety and Traffic Management Applications 支持道路安全和交通管理应用的802.11p兼容系统原型
Int. J. Wirel. Networks Broadband Technol. Pub Date : 1900-01-01 DOI: 10.4018/ijwnbt.2014010101
H. Leligou, P. Chatzimisios, L. Sarakis, T. Orphanoudakis, P. Karkazis, T. Zahariadis
{"title":"An 802.11p Compliant System Prototype Supporting Road Safety and Traffic Management Applications","authors":"H. Leligou, P. Chatzimisios, L. Sarakis, T. Orphanoudakis, P. Karkazis, T. Zahariadis","doi":"10.4018/ijwnbt.2014010101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2014010101","url":null,"abstract":"During the last decades Intelligent Transportation Systems ITS have been attracting the interest of an increasing number of researchers, engineers and entrepreneurs, as well as citizens and civil authorities, since they can contribute towards improving road transport safety and efficiency and ameliorate environmental conditions and life quality. Emerging technologies yield miniaturized sensing, processing and communication devices that enable a high degree of integration and open the way for a large number of smart applications that can exploit automated fusion of information and enable efficient decisions by collecting, processing and communicating a large number of data in real-time. The cornerstone of these applications is the realization of an opportunistic wireless communication system between vehicles as well as between vehicles and infrastructure over which the right piece of information reaches the right location on time. In this paper, the authors present the design and implementation of representative safety and traffic management applications. Specifically the authors discuss the hardware and software requirements presenting a use case based on the NEC Linkbird-MX platform, which supports IEEE 802.11p based communications. The authors show how the functionality of IEEE 802.11p can be exploited to build efficient road safety and traffic management applications over mobile opportunistic systems and discuss practical implementation issues.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129593695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
HTTP Traffic Model for Web2.0 and Future WebX.0 Web2.0和未来WebX.0的HTTP流量模型
Int. J. Wirel. Networks Broadband Technol. Pub Date : 1900-01-01 DOI: 10.4018/ijwnbt.2011010104
V. Deart, A. Pilugin
{"title":"HTTP Traffic Model for Web2.0 and Future WebX.0","authors":"V. Deart, A. Pilugin","doi":"10.4018/ijwnbt.2011010104","DOIUrl":"https://doi.org/10.4018/ijwnbt.2011010104","url":null,"abstract":"This article presents a method of estimation for HTTP traffic quality service parameters mean delay and lost packets percentage. This method, based on statistic measurements, includes simulation and analytical modeling. Statistical HTTP traffic models presented earlier take into account typical features of WEB2.0 Internet traffic, which were used for the simulation model. Developed universal simulation models make it possible to research service quality parameters under setting network conditions over a wide range considering Internet development. The presented analytical method based on batch packet arrival model allows an accuracy estimation of mean HTTP-packets delay in Core Router by simple calculations. Objective results of HTTP traffic quality service parameters can be used in QoS standard development for WEB traffic and model QoE standard development.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130201241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance Evaluation of a Three Node Client Relay System 三节点客户端中继系统的性能评估
Int. J. Wirel. Networks Broadband Technol. Pub Date : 1900-01-01 DOI: 10.4018/ijwnbt.2011010106
S. Andreev, O. Galinina, A. Vinel
{"title":"Performance Evaluation of a Three Node Client Relay System","authors":"S. Andreev, O. Galinina, A. Vinel","doi":"10.4018/ijwnbt.2011010106","DOIUrl":"https://doi.org/10.4018/ijwnbt.2011010106","url":null,"abstract":"In this paper, the authors examine a client relay system comprising three wireless nodes. Closed-form expressions for mean packet delay, as well as for throughput, energy expenditure, and energy efficiency of the source nodes are also obtained. The precision of the established parameters is verified by means of simulation.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126358772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Improving WLAN Performance by Modifying an IEEE 802.11 Protocol 通过修改IEEE 802.11协议提高WLAN性能
Int. J. Wirel. Networks Broadband Technol. Pub Date : 1900-01-01 DOI: 10.4018/ijwnbt.2011010102
N. Sarkar
{"title":"Improving WLAN Performance by Modifying an IEEE 802.11 Protocol","authors":"N. Sarkar","doi":"10.4018/ijwnbt.2011010102","DOIUrl":"https://doi.org/10.4018/ijwnbt.2011010102","url":null,"abstract":"One of the limitations of the IEEE 802.11 distributed coordination function DCF protocol is its low bandwidth utilization under medium-to-high traffic loads resulting in low throughput and high packet delay. To overcome performance problems, traditional IEEE 802.11 DCF \"DCF\" protocol is modified to the buffer unit multiple access BUMA protocol. The BUMA protocol achieves a better system performance by introducing a temporary buffer unit at the medium access control MAC layer to accumulate multiple packets and combine them into a single packet with a header and a trailer before transmission. This paper provides an in-depth performance evaluation by simulation of BUMA for multiuser ad hoc and infrastructure networks. Results obtained show that the BUMA is more efficient than that of DCF. The BUMA protocol is simple and its algorithm software can be upgraded to 802.11 networks requiring no hardware changes. The BUMA protocol is described and simulation results are presented to verify the performance.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127381654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Safety of Mobile Wireless Sensor Networks Based on Clustering Algorithm 基于聚类算法的移动无线传感器网络安全性研究
Int. J. Wirel. Networks Broadband Technol. Pub Date : 1900-01-01 DOI: 10.4018/IJWNBT.2016010105
Amine Dahane, Berrached Nasr-Eddine, A. Loukil
{"title":"Safety of Mobile Wireless Sensor Networks Based on Clustering Algorithm","authors":"Amine Dahane, Berrached Nasr-Eddine, A. Loukil","doi":"10.4018/IJWNBT.2016010105","DOIUrl":"https://doi.org/10.4018/IJWNBT.2016010105","url":null,"abstract":"Clustering approaches for mobile wireless sensor networks (WSNs) tend to extend the battery life of the individual sensors and the network lifetime. Taking into account the mobility of the network, a powerful mechanism to safely elect a cluster head is a challenging task in many research works. As a proposed technique to deal with such problem, the approach based on the computing of the weight of each node in the network is chosen. This paper is intended to propose a new algorithm called “S-WCA” for safety of mobile sensor networks based on clustering algorithm using a combination of five metrics. Among these metrics lies the behavioral level metric which promotes a safe choice of a cluster head in the sense where this last one will never be a malicious node. Moreover, a summary of the highlight of the authors' work is provided in a comprehensive strategy for monitoring the network, so as to detect and remove the malicious nodes. Simulation study is used to demonstrate the performance of the proposed algorithm.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126995918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信