1,687 results on '"Hidden node problem"'
Search Results
2. Determinantal point process-based new radio unlicensed link scheduling for multi-access edge computing.
- Author
-
Xing, Chigang, Li, Yangfan, Chen, Cen, Li, Fangmin, Zeng, Zeng, and Zou, Xiaofeng
- Subjects
- *
WIRELESS LANs , *POINT processes , *EDGE computing , *MULTICASTING (Computer networks) , *WIRELESS Internet , *INTERNET access , *INTERNET of things - Abstract
The combination of Multi-access Edge Computing (MEC) and New Radio Unlicensed (NR-U) can provide more powerful computing power and wireless access for the Internet of Things (IoT). An essential function in NR-U is to allocate time-frequency resources for IoT devices while ensuring coexistence with wireless local area networks (Wi-Fi) in the same spectrum. However, in the licensed assisted access (LAA) based NR-U, the listen-before-talk (LBT) mechanism makes the nodes located at the edges of the NR-U suffer from the hidden node problem. This can lead to a waste of time-frequency resources in NR-U and degrade the system performance. In this paper, we propose a determinantal point process (DPP) based link scheduling to improve the terminals downlink performance in the hidden nodes zone. Instead of scheduling relay links based on assignment methods, we introduce a recommendation scheme that recommends the D2D transmission nodes from a set of candidate nodes for hidden nodes and establishes D2D relay links. The recommendation scheme is designed based on a DPP model. The simulation results demonstrate that the proposed DPP method is capable of effectively selecting the optimal transmitting nodes and optimizing more hidden nodes while maximizing the sum rate. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. Geographic Multipath Routing based on Triangle Link Quality Metric with Minimum Inter-path Interference for Wireless Multimedia Sensor Networks
- Author
-
Shailendra Aswale and Vijay Ram Ghorpade
- Subjects
Wireless Multimedia Sensor Network ,QoS routing ,Triangle Link Quality Metric ,Multipath ,Interference ,Hidden Node Problem ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Wireless Multimedia Sensor Networks (WMSNs) have emerged as the new class of wireless sensor networks (WSNs) to meet the stringent Quality of Service (QoS) requirements of emerging applications. Multipath routing with cross-layer approach appears to be a potential solution for supporting the distinct characteristics of WMSNs. However, due to the broadcast nature of the underlying medium, multiple paths are exposed to inter-path interference. In addition, low-power wireless links are asymmetric, error-prone and unreliable in nature. Consequently, an accurate and stable link quality estimation is essential to guarantee the performance of routing protocol. This paper proposes Triangle link quality metric and minimum inter-path Interference based Geographic Multipath Routing (TIGMR) protocol which finds multiple node-disjoint paths in IEEE 802.15.4 compliant network. This cross-layer routing protocol selects forwarding node based on a triangle link quality metric, remaining energy, and distance while anticipating minimum adjacent path interference effect. In addition, TIGMR protocol avoids Hidden Node Problem (HNP) at the sink node without using Request-To-Send/Clear-To-Send (RTS/CTS) handshake mechanism. Simulation results indicate TIGMR protocol optimizes overall performance and improves network lifetime as compared with state-of-the-art Two-Phase Geographic Forwarding (TPGF) and Link Quality and Energy-Aware Routing (LQEAR) protocols.
- Published
- 2021
- Full Text
- View/download PDF
4. Group-Wise Listen-Before-Talk Protocol for Dynamic Spectrum Sharing: A New Framework for Full Frequency Reuse
- Author
-
Chan S. Yang and Chung G. Kang
- Subjects
Dynamic spectrum sharing ,cellular network ,listen-before-talk ,hidden node problem ,frequency reuse ,areal capacity ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In existing dynamic spectrum sharing (DSS) systems, each node arbitrates channel access independently based on carrier-sensing mechanisms such as the listen-before-talk (LBT) protocol. Owing to the uncoordinated channel access between all nodes, the channel is occupied in a random pattern. This makes it difficult to reduce the mismatch in channel quality indicator (CQI) while increasing the spatial reuse gain between the different nodes; therefore, the areal capacity gain obtained by adding nodes is much lower in existing DSS systems than in the cellular system. In this paper, we propose a different means of improving the areal capacity for downlink DSS systems. It is a group-wise DSS approach that ensures full frequency reuse in each group of base stations (BSs) by performing LBT only between the representative BSs, each of them selected by each group. Once a channel is secured by each group, all its member BSs share a channel simultaneously. This approach makes closed-loop feedback-based link adaptation practical while boosting spatial reuse gain even in the DSS environment. To implement the group-wise DSS, we propose a single unified framework that employs elementary algorithms for BS grouping and carrier-sensing threshold adjustment. Our system-level simulation results demonstrate that the proposed framework boosts the areal capacity gain by approximately 4.42 times as much as the conventional approach.
- Published
- 2020
- Full Text
- View/download PDF
5. An Adaptive Grouping Scheme for Avoiding Hidden Node Collision in IEEE 802.15.4 LR-WPAN
- Author
-
Irfan Khan, Mohammad, Rathi, Rakesh, Shetty, N. R., editor, Patnaik, L. M., editor, Prasad, N. H., editor, and Nalini, N., editor
- Published
- 2018
- Full Text
- View/download PDF
6. Modelling and analysis of wireless MAC protocols with applications to vehicular networks
- Author
-
Jafarian, Javad and Hamdi, Khairi
- Subjects
621.382 ,Modelling and Analysis ,CSMA ,Double-Threshold Energy Detection ,Intelligent Transportation System ,Wireless Network ,Hidden Node Problem ,Dimension Reduction ,Markovian Chain ,Throughput Optimization ,RSU Placement - Abstract
The popularity of the wireless networks is so great that we will soon reach the point where most of the devices work based on that, but new challenges in wireless channel access will be created with these increasingly widespread wireless communications. Multi-channel CSMA protocols have been designed to enhance the throughput of the next generation wireless networks compared to single-channel protocols. However, their performance analysis still needs careful considerations. In this thesis, a set of techniques are proposed to model and analyse the CSMA protocols in terms of channel sensing and channel access. In that respect, the performance analysis of un-slotted multi-channel CSMA protocols is studied through considering the hidden terminals. In the modelling phase, important parameters such as shadowing and path loss impairments are being considered. Following that, due to the high importance of spectrum sensing in CSMA protocols, the Double-Threshold Energy Detector (DTED) is thoroughly investigated in this thesis. An iterative algorithm is also proposed to determine optimum values of detection parameters in a sensing-throughput problem formulation. Vehicle-to-Roadside (V2R) communication, as a part of Intelligent Transportation System (ITS), over multi-channel wireless networks is also modelled and analysed in this thesis. In this respect, through proposing a novel mathematical model, the connectivity level which an arbitrary vehicle experiences during its packet transmission with a RSU is also investigated.
- Published
- 2014
7. Geographic Multipath Routing based on Triangle Link Quality Metric with Minimum Inter-path Interference for Wireless Multimedia Sensor Networks.
- Author
-
Aswale, Shailendra and Ghorpade, Vijay Ram
- Subjects
WIRELESS sensor networks ,QUALITY of service ,TRIANGLES ,MULTICASTING (Computer networks) ,MAXIMA & minima ,NETWORK performance - Abstract
Wireless Multimedia Sensor Networks (WMSNs) have emerged as the new class of wireless sensor networks (WSNs) to meet the stringent Quality of Service (QoS) requirements of emerging applications. Multipath routing with cross-layer approach appears to be a potential solution for supporting the distinct characteristics of WMSNs. However, due to the broadcast nature of the underlying medium, multiple paths are exposed to inter-path interference. In addition, low-power wireless links are asymmetric, error-prone and unreliable in nature. Consequently, an accurate and stable link quality estimation is essential to guarantee the performance of routing protocol. This paper proposes Triangle link quality metric and minimum inter-path Interference based Geographic Multipath Routing (TIGMR) protocol which finds multiple node-disjoint paths in IEEE 802.15.4 compliant network. This cross-layer routing protocol selects forwarding node based on a triangle link quality metric, remaining energy, and distance while anticipating minimum adjacent path interference effect. In addition, TIGMR protocol avoids Hidden Node Problem (HNP) at the sink node without using Request-To-Send/Clear-To-Send (RTS/CTS) handshake mechanism. Simulation results indicate TIGMR protocol optimizes overall performance and improves network lifetime as compared with state-of-the-art Two-Phase Geographic Forwarding (TPGF) and Link Quality and Energy-Aware Routing (LQEAR) protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
8. SCSMA: A Smart CSMA/CA Using Blind Learning for Wireless Sensor Networks.
- Author
-
Nguyen, Trang Tien and Oh, Hoon
- Subjects
- *
WIRELESS sensor networks , *CARRIER sense multiple access , *DATA transmission systems - Abstract
A smart carrier sense multiple access (SCSMA) using control messages is proposed for low power and low bandwidth wireless sensor networks (WSNs). In traditional WSNs, the use of media access control (MAC) messages is not recommended since data are of small size. However, if data size is increased with data aggregation or multimedia data, the control messages can be used for reliable data transmission. Thus, an efficient mechanism is needed to avoid the collision of control messages and data. SCSMA employs a blind learning algorithm with low complexity to prevent collision during channel contention and data transmission, even in the presence of hidden nodes. It is shown by simulation and analysis that SCSMA improves throughput by 29.5% to 71.6%, and reduces energy consumption by 20.5% to 36.2%, compared to the recent best approach using MAC messages. Simulation data are also verified by experimental data. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
9. Efficient method to identify hidden node collision and improving Quality-of-Service (QoS) in wireless sensor networks
- Author
-
B.P. Vijay Kumar, Syed Musthak Ahmed, and Mahendhra Nanjappa Giri Prasad
- Subjects
Computational model ,Hidden node problem ,business.industry ,Computer science ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Throughput ,General Medicine ,Interference (wave propagation) ,Multipath routing ,Routing (electronic design automation) ,business ,Wireless sensor network ,Computer network - Abstract
The proposed approach is designed to boost the IEEE 802.15.4 / ZigBee-based WSN streaming efficiency by introducing multipurpose routing. We investigate how those networks can be designed in order to achieve optimum throughput using computational models to explain intra-track and inter-track interference in multipath routing networks. One mode of action in particular – Spatial-TDMA (S-TDMA), Zig Bee dependent WSNs, will greatly reduce the amount of interference, both in one- and multi-track environments. It is also seen that two-way networks can be stronger than their one-way counterparts by means of deliberately selected implementation parameters. Finally, a greater degree of spatial isolation between the routes used indicates improved average efficiency in multi-path scenarios. The simulation is one of our results.
- Published
- 2023
10. Joint Usage of Dynamic Sensitivity Control and Time Division Multiple Access in Dense 802.11ax Networks
- Author
-
Khorov, Evgeny, Kiryanov, Anton, Krotov, Alexander, Gallo, Pierluigi, Garlisi, Domenico, Tinnirello, Ilenia, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Madsen, Tatiana K., editor, Nielsen, Jimmy J., editor, and Pratas, Nuno K., editor
- Published
- 2016
- Full Text
- View/download PDF
11. Hidden Node Problem
- Author
-
Shen, Xuemin (Sherman), editor, Lin, Xiaodong, editor, and Zhang, Kuan, editor
- Published
- 2020
- Full Text
- View/download PDF
12. An Efficient Beam Scanning Algorithm for Hidden Node Collision Avoidance in Wireless Sensor Networks
- Author
-
Sujatha, Moorthy, Bhuvaneswaran, Raghuvel Subramaniam, Sulaiman, Hamzah Asyrani, editor, Othman, Mohd Azlishah, editor, Othman, Mohd Fairuz Iskandar, editor, Rahim, Yahaya Abd, editor, and Pee, Naim Che, editor
- Published
- 2015
- Full Text
- View/download PDF
13. HIATus: Hidden Interference-Aware Transmission Bandwidth Adjustment in IEEE 802.11ac WLANs.
- Author
-
Yang, Changmok, Kim, Seongwon, Byeon, Seongho, and Choi, Sunghyun
- Abstract
In the IEEE 802.11ac wide bandwidth operation, interference may exist only on secondary channels. In particular, if the interference is not sensed at the transmitter, i.e., the interference is hidden, performance can be severely degraded. This problem cannot be resolved with RTS/CTS if the hidden interference is also not sensed at the receiver. We propose a hidden interference-aware bandwidth adjustment (HIATus)to resolve the problem, which uses error statistics to detect the hidden interference and adjusts transmission bandwidth to avoid hidden interference on the secondary channel. We evaluate the feasibility of HIATus with extensive measurement and analysis. When hidden interference exists on the secondary channel, HIATus is expected to achieve up to $14.4\times $ higher throughput compared with the baseline 802.11ac. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
14. Timely and reliable packets delivery over internet of vehicles for road accidents prevention: a cross‐layer approach
- Author
-
Elias C. Eze, Sijing Zhang, Enjie Liu, Emmanuel N. Nweso, and Joy C. Eze
- Subjects
packet collision rate ,hidden node problem ,RTB/CTB handshake ,request‐to‐broadcast/clear‐to‐broadcast ,CARER ,code aided retransmission based error recovery ,Telecommunication ,TK5101-6720 - Abstract
With the envisioned era of internet of things, all aspects of Intelligent Transportation Systems will be connected to improve transport safety, relieve traffic congestion, reduce air pollution, enhance the comfort of transportation and significantly reduce road accidents. In internet of vehicles, regular exchange of current position, direction, velocity and so on, enables mobile vehicles to predict an upcoming accident and alert the human drivers in time or proactively take precautionary actions to avoid the accident. The actualisation of this concept requires the use of channel access protocols that can guarantee reliable and timely broadcast of safety messages. This study investigates the application of network coding concept to increase content of every transmission and achieve improved broadcast reliability with less number of retransmissions. In particular, the authors proposed Code Aided Retransmission‐based Error Recovery (CARER) scheme, introduced a request‐to‐broadcast/clear‐to‐broadcast (RTB/CTB) handshake to overcome hidden node problem and reduce packets collision rate. In order to avoid broadcast storm problem associated with the use of RTB/CTB packet in a broadcast transmission, they developed a rebroadcasting metric used to successfully select a vehicle to rebroadcast the encoded message. The performance of CARER protocol is clearly shown with detailed theoretical analysis and further validated with simulation experiments.
- Published
- 2016
- Full Text
- View/download PDF
15. Hierarchal Grouping Strategy with Adaptive Power Tuning in ZigBee Wireless Sensor Networks
- Author
-
Mehran Pourmohammad Abdollahi, Javad Musevi Niya, and Payman Mahmoudi Biroun
- Subjects
Hidden node problem ,exposed node problem ,Quality of Service (QoS) ,power consumption ,hierarchy ,Technology (General) ,T1-995 ,Science - Abstract
Designing wireless sensor networks should meet appropriate parameters such as quality of service (QoS) defined by different users. The variable physical conditions of the environment, processing and transmission power limitations and limited communication capabilities are the most important obstacles that influence QoS parameters such as throughput, delay, reliability and network lifetime. The most important problems that directly have destructive effects on these parameters are hidden and exposed node problems. These problems extremely decrease throughput and increase delay and power consumption in the network. In this paper, we propose a new and efficient method that relies on clustering, grouping and subgrouping strategy to create smaller zones and avoid collisions. By allocating different transmission powers to different nodes depending on their hierarchy level in the network, the mentioned problems decrease and as a result power consumption decreases due to reduction in the retransmissions. This mechanism has been simulated by OPNET on IEEE802.15.4/Zigbee
- Published
- 2016
16. Visible light communication networks MAC layer solutions: open issues and trends
- Author
-
Midia Reshadi, Mohammad Salah Esfahani, Mehdi Dehghan, and Amir Masoud Rahmani
- Subjects
Hidden node problem ,Computer Networks and Communications ,Wireless network ,Computer science ,business.industry ,Reliability (computer networking) ,Visible light communication ,Context (language use) ,Spectrum management ,Atomic and Molecular Physics, and Optics ,Hardware and Architecture ,Electrical and Electronic Engineering ,business ,Software ,5G ,Communication channel ,Computer network - Abstract
Visible light communication (VLC) network is an appropriate solution to meet the 5G and 6G. It can overcome the spectrum scarcity and capacity in the radio frequency (RF) networks. This network faces some challenges. Obstacles can break links and disconnect the network. Mobile nodes cannot receive data continuously because the transmitters have few fields of view. Using common MAC solutions in wireless networks does not solve VLC network problems. VLC MAC solutions should solve deafness, hidden node, full-duplex capability, channel utilization, and connectivity. This paper provided a survey in MAC layer solutions in VLC networks based on the systematic literature review (SLR). The methods have been recently published from 2011 to 2021. We analyzed analytically and statistically and the technical taxonomy presented with the SLR process according to the proposed solutions. Solutions were categorized into half-duplex, full-duplex, cooperative, and VLC/RF categories. Also, other proposed methods were described briefly. We explained the features, advantages, and disadvantages of each method. MAC layer design challenges in VLC networks were discussed to fill the gap in the previous literature. By classification and problem analysis, fewer attention topics that need more research were extracted. We found that fairness and reliability metrics received less attention and dynamic resource allocation was the main context in the VLC MAC solutions. Finally, future research challenges and open issues in VLC MAC solutions were proposed.
- Published
- 2021
17. Joint Optimization of Fusion Rule Threshold and Transmission Power for Energy Efficient CSS in Cognitive Wireless Sensor Networks
- Author
-
Girraj Sharma and Ritu Sharma
- Subjects
Fusion ,Cognitive radio ,Hidden node problem ,Transmission (telecommunications) ,Computer science ,Electronic engineering ,Electrical and Electronic Engineering ,Joint (audio engineering) ,Energy (signal processing) ,Computer Science Applications ,Power (physics) ,Efficient energy use - Abstract
Cooperative spectrum sensing (CSS) can resolve the hidden terminal problem in cognitive radio (CR) networks. In CSS, the unlicensed users also known as secondary users (SUs) are often battery-operated, hence it is essential to use their energy efficiently. In CSS, the fusion rule threshold, number of CR users, sensing time, and transmission power directly affect the energy efficiency (EE). In this paper, fusion rule threshold and transmission power are optimized and evaluated to maximize the EE of the CR network. Iterative algorithms have been proposed to calculate individual optimum fusion rule threshold and joint optimal transmission power and fusion rule threshold, which maximizes the EE. It is found that EE is maximum at optimum fusion rule threshold = 14 and transmission power 0.81 W at average SNR = − 18 dB. EE at the optimum point is = 4.4598 Mbits/Hz/J.
- Published
- 2021
18. Distributed and Adaptive Reservation MAC Protocol for Beaconing in Vehicular Networks
- Author
-
Yue Li, Hamed Mosavat-Jahromi, Yuanzhi Ni, and Lin Cai
- Subjects
Vehicular ad hoc network ,Hidden node problem ,Computer Networks and Communications ,business.industry ,Wireless ad hoc network ,Computer science ,Reliability (computer networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Time division multiple access ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Network congestion ,Broadcasting (networking) ,0203 mechanical engineering ,11. Sustainability ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,business ,Software ,Computer network - Abstract
In vehicular ad hoc networks (VANETs), beacon broadcasting plays a critical role in improving road safety and avoiding hazardous situations. How to ensure reliability and scalability of beacon broadcasting is a difficult and open problem, due to high mobility, dynamic network topology, hidden terminal, and varying density in both the time and location domains. In this paper, wireless resources are divided into basic resource units in the time and frequency domains, and a distributed and adaptive reservation based MAC protocol (DARP) is proposed to solve the above problem. For decentralized control in VANETs, each vehicle's channel access is coordinated with its neighbors to solve the hidden terminal problem. To ensure the reliability of beacon broadcasting, different kinds of preambles are applied in DARP to support distributed reservation, detect beacon collisions, and resolve collisions. Once a vehicle reserves a resource unit successfully, it will not release it until collision occurs due to topology change. The protocol performance in terms of access collision probability and access delay are analyzed. Based on the analysis, protocol parameters, including transmission power and time slots duration, can be adjusted to reduce collision probability and enhance reliability and scalability. Using NS-3 with vehicle traces generated by simulation of urban mobility (SUMO), simulation results show that the proposed DARP protocol can achieve the design goals of reliability and scalability, and it substantially outperforms the existing standard solutions.
- Published
- 2021
19. Restricted Boltzmann Machines as Models of Interacting Variables
- Author
-
Nicola Bulso and Yasser Roudi
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Hidden node problem ,Cognitive Neuroscience ,Activation function ,Boltzmann machine ,FOS: Physical sciences ,Binary number ,Machine Learning (stat.ML) ,Disordered Systems and Neural Networks (cond-mat.dis-nn) ,Condensed Matter - Disordered Systems and Neural Networks ,Type (model theory) ,Expression (mathematics) ,Machine Learning (cs.LG) ,Arts and Humanities (miscellaneous) ,Statistics - Machine Learning ,Physics - Data Analysis, Statistics and Probability ,Statistical physics ,Marginal distribution ,Data Analysis, Statistics and Probability (physics.data-an) ,MNIST database ,Mathematics - Abstract
We study the type of distributions that Restricted Boltzmann Machines (RBMs) with different activation functions can express by investigating the effect of the activation function of the hidden nodes on the marginal distribution they impose on observed binary nodes. We report an exact expression for these marginals in the form of a model of interacting binary variables with the explicit form of the interactions depending on the hidden node activation function. We study the properties of these interactions in detail and evaluate how the accuracy with which the RBM approximates distributions over binary variables depends on the hidden node activation function and on the number of hidden nodes. When the inferred RBM parameters are weak, an intuitive pattern is found for the expression of the interaction terms which reduces substantially the differences across activation functions. We show that the weak parameter approximation is a good approximation for different RBMs trained on the MNIST dataset. Interestingly, in these cases, the mapping reveals that the inferred models are essentially low order interaction models., Comment: Supplemental material is available as ancillary file and can be downloaded from a link on the right
- Published
- 2021
20. Fair MAC protocol for IEEE 802.11 wireless LANs with hidden node problem.
- Author
-
Choi, Woo-Yong
- Subjects
- *
WIRELESS LANs , *FAIRNESS - Abstract
In IEEE 80211 wireless LANs, hidden nodes can disrupt the backoff algorithm of other nodes that are located outside the physical carrier sensing range of hidden nodes. The fairness problem between the nodes that are vulnerable and not vulnerable to the hidden node problem is dealt with in this paper. We propose an efficient fair MAC protocol to resolve the fairness problem. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
21. No-collision grid based broadcast scheme and ant colony system with victim lifetime window for navigating robot in first aid applications.
- Author
-
Allali, Sarah, Benchaïba, Mahfoud, Ouzzani, Fares, and Menouar, Hamid
- Subjects
FIRST aid equipment ,FIRST aid kits ,RESCUE work ,RESCUE robots ,WIRELESS sensor networks - Abstract
The system that we propose in this paper aims to help robots to rescue immobilized victims by providing first aid (e.g.: oxygen masks). Such first aid can increase the chances of saved lives, by maintaining the status of victims until the arrive of rescue team for the take over. The proposed system takes advantage from a grid-based architecture for sites monitoring that has been presented in a previous work. It is composed of a mobile robot and a wireless sensor network (WSN). The robot has the mission of rescuing victims, and the WSN has three main missions: (1) detecting the existence of victims or any anomaly in the area, (2) disseminating reliably information and alerts and finally (3) providing the robot with efficient route guidance. To disseminate information with low cost (i.e avoids collisions caused mainly by the hidden node problem), we propose a distributed algorithm that insures the no collisions in the broadcast scheme using a grid, we called it No-Collision Grid Based (NCCB). Using NCGB allows to create all possible paths from any cell to the victim. This helps in guiding the robot through the safest and shortest route in a distributed manner. In order to increase the number of rescued victims, we used Ant Colony System with Victim Lifetime Window (ACS-VLM) to schedule the sequence of victims to rescue. The proposed solution has been validated through intensive simulations which show an important improvement in terms of overall network overhead, success ratio and the number of rescued victims. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
22. A novel energy-efficient neighbor discovery procedure in a wireless self-organization network.
- Author
-
Wang, Yupeng, Yu, Zelong, Huang, Jun, and Choi, Chang
- Subjects
- *
WIRELESS communications , *ELECTRIC power consumption , *DATA packeting , *COMPUTER networks , *DATA transmission systems - Abstract
Highlights • A novel neighbor discovery procedure is proposed to improve the energy efficiency. • A new Beacon signal is used to assist the proposed procedure for packet collision indication and further power allocation. • An autonomous location deduction based power allocation method is proposed to reduce overhead and collision probability. Abstract Neighbor discovery plays a major role in the wireless self-organizing network, which is the cornerstone for the autonomous coverage extension and performance enhancement such as cooperative transmission and multi-hop transmission. However, the hidden node problem is frequently encountered in neighbor discovery procedure based on the simple flooding due to the uncoordinated transmission, which gives rise to unnecessary energy waste. In this paper, the hidden node problem in the conventional neighbor discovery procedure is analyzed. A novel neighbor discovery procedure with the ability of node distance estimation and power allocation for the packet retransmission after collision is proposed, which utilizes fuzzy location information to properly configure the transmission power of the collided packets for better reception. The proposed algorithm improves the power efficiency of the neighbor discovery procedure by reducing the number of transmissions required for the successful reception with negligible induced complexity. Through the Monte-Carlo simulation, the proposed procedure with fuzzy location information and the power allocation method outperforms the conventional procedure in different node population scenarios, and the proposed procedure is insensitive to the distance estimation error, displaying strong robustness. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
23. Genetic algorithm optimized fuzzy decision system for efficient data transmission with deafness avoidance in multihop cognitive radio networks
- Author
-
K. Vidya and V. Noel Jeygar Robert
- Subjects
General Computer Science ,Hidden node problem ,Computer science ,business.industry ,Bandwidth (signal processing) ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,Spectrum management ,Frequency allocation ,Cognitive radio ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,020201 artificial intelligence & image processing ,business ,Communication channel ,Computer network - Abstract
Cognitive radio (CR) is an emergent communication platform that offers solutions for spectrum scarcity issues. Cognitive radio networks (CRNs) will offer increased bandwidth to mobile consumers through wireless heterogeneous architectures and dynamic spectrum acquisition mechanisms. However, CRNs enforce challenges because of the fluctuating behaviour of the spectrum available and the diverse requirements for a varied range of applications. The functions of spectrum management can resolve those challenges to realize a new paradigm of the network. Secondary users (SUs) can opportunistically explore and employ the blank spaces present in licensed channels. This makes the SU evacuate the licensed channel and then switch to a vacant channel, when an incumbent primary user (PU) interferes with the channel, it causes degradation of SUs because of the frequent switching of channels. Also, the deafness problem is commonly seen in a CRN, where the QoS is critically affected due to the hidden interferences. This research proposes a Genetic Algorithm Optimized Fuzzy decision system for performing channel selection, channel switching, and spectrum allocation in a multi-channel multi-hop CRN. The proposed scheme acts as a decision support system (DSS), focusing on reducing the channel switching rate, hidden node interferences, and efficient spectrum allocation. Meta-heuristic genetic algorithm (GA) optimizes the parameters of the fuzzy decision system (FDS), for obtaining optimized decisions. The proposed DSS in the CR environment is simulated in the MATLAB platform and the results show improved performance concerning throughput and channel utilization.
- Published
- 2021
24. Analytical Study on IEEE 802.11ah Standard Impact of Hidden Node
- Author
-
Doan Perdana, Bayu Erfianto, and Sarah Hafidzah
- Subjects
General Computer Science ,Hidden node problem ,Computer science ,business.industry ,General Engineering ,business ,IEEE 802.11ah ,Computer network - Published
- 2021
25. Hidden terminal-aware access point selection for IEEE 802.11ah networks
- Author
-
Jung Han Han and Seung-Jae Han
- Subjects
Scheme (programming language) ,Hidden node problem ,Computer Networks and Communications ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,Provisioning ,02 engineering and technology ,Energy consumption ,Terminal (electronics) ,Transmission (telecommunications) ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,020201 artificial intelligence & image processing ,business ,computer ,Computer network ,computer.programming_language ,IEEE 802.11ah - Abstract
Connectivity provisioning in large-scale Internet-of-Things (IoT) networks raises several challenges, one of which is the high collision rate among the transmission attempts of IoT devices. Transmission collisions result in prolonged data delivery delay and increased energy consumption of IoT devices. Contention-based wireless communication technologies such as WiFi is particularly vulnerable to this issue. As a remedy, a new standard IEEE 802.11ah is designed and such methods as RAW (Restricted Access Window) grouping is incorporated in order to curb the high collision rate. Meanwhile, in IEEE 802.11ah the transmission range and the number of devices that can be accommodated are also drastically increased. As a result, the impact of the hidden terminal problem is significantly amplified, which causes transmission collisions. In this paper, we propose an approach to avoid the high collision rate at the phase of the AP(Access Point) selection for IEEE 802.11ah networks. The proposed scheme considers the traffic load balancing and the hidden terminal issue simultaneously, without incurring any burden to the IoT devices. No modification of the IEEE 802.11ah standard is needed. Via extensive NS-3 simulations, we have verified that the proposed AP selection scheme outperforms the existing schemes in terms of data delivery delay and energy consumption by reducing transmission collisions.
- Published
- 2021
26. A Power Transformer Fault Diagnosis Method Based on Random Vector Functional-Link Neural Network
- Author
-
Rong Shi, Yong Li, Qian Wang, and Shinan Wang
- Subjects
010302 applied physics ,Article Subject ,Artificial neural network ,Hidden node problem ,Multivariate random variable ,Computer science ,General Mathematics ,Node (networking) ,General Engineering ,02 engineering and technology ,Engineering (General). Civil engineering (General) ,Fault (power engineering) ,Scale factor ,01 natural sciences ,0103 physical sciences ,QA1-939 ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Sensitivity (control systems) ,TA1-2040 ,Algorithm ,Mathematics ,Network model - Abstract
The random vector functional link (RVFL) network is suitable for solving nonlinear problems from transformer fault symptoms and different fault types due to its simple structure and strong generalization ability. However, the RVFL network has a disadvantage in that the network structure, and parameters are basically determined by experiences. In this paper, we proposed a method to improve the RVFL neural network algorithm by introducing the concept of hidden node sensitivity, classify each hidden layer node, and remove nodes with low sensitivity. The simplified network structure could avoid interfering nodes and improve the global search capability. The five characteristic gases produced by transformer faults are divided into two groups. A fault diagnosis model of three layers with four classifiers was built. We also investigated the effects of the number of hidden nodes and scale factors on RVFL network learning ability. Simulation results show that the number of implicit layer nodes has a large impact on the network model when the number of input dimensions is small. The network requires a higher number of implicit layer neurons and a smaller threshold range. The size of the scale factor has significant influence on the network model with larger input dimension. This paper describes the theoretical basis for parameter selection in RVFL neural networks. The theoretical basis for the selection of the number of hidden nodes, and the scale factor is derived. The importance of parameter selection for the improvement of diagnostic accuracy is verified through simulation experiments in transformer fault diagnosis.
- Published
- 2021
27. CQI-Based Interference Detection and Resource Allocation With QoS Provision in LTE-U Systems
- Author
-
Fu-Chun Zheng, Xijun Wang, Howard H. Yang, Lifeng Lai, Daquan Feng, and Tony Q. S. Quek
- Subjects
Hidden node problem ,Computer Networks and Communications ,Computer science ,business.industry ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Aerospace Engineering ,020302 automobile design & engineering ,Throughput ,02 engineering and technology ,Spectrum management ,Subcarrier ,0203 mechanical engineering ,Automotive Engineering ,Cellular network ,Resource allocation ,Resource management ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
Long-Term Evolution in unlicensed spectrum (LTE-U) is a promising solution to address the spectrum scarcity in the cellular networks. However, the LTE-U and WiFi systems may interfere with each other and degrade the performance. Thus, many works have focused on coexistence design and proposed various solutions. Nevertheless, the hidden terminal problem has not been well studied in the LTE-U system. In this paper, we investigate joint interference detection and resource allocation in the LTE-U system to maximize the overall system throughput while guaranteeing each user's quality-of-service (QoS) requirements. Firstly, to solve the hidden terminal problem and avoid the co-channel interference between the WiFi and LTE-U users, we adopt a cluster-based algorithm to find the potential WiFi interference for each LTE-U user according to their channel quality indicator (CQI) feedback and location information. Secondly, we formulate a joint subcarrier and power allocation problem over the licensed and unlicensed bands with each user's QoS provision. To make the original problem more tractable, we separate it into licensed and unlicensed subproblems and then derive the optimal solution. Moreover, we propose a low-complexity resource allocation scheme. The simulation results show that the proposed schemes can significantly improve the system performance and outperform the existing schemes.
- Published
- 2021
28. Listen Before Receive (LBR) Assisted Network Access in LAA and WiFi Heterogeneous Networks
- Author
-
Tzu-Ling Cheng, Chen-Hao Huang, Chin-Ya Huang, Chen-Chi Chang, Hsueh-Yi Chen, Shiann-Tsong Sheu, and Te-Wei Chiang
- Subjects
General Computer Science ,Computer science ,Throughput ,02 engineering and technology ,Spectrum management ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,listen-before-talk (LBT) ,General Materials Science ,Network performance ,Exposed node problem (ENP) ,Access network ,Hidden node problem ,business.industry ,Node (networking) ,licensed assisted access (LAA) ,General Engineering ,020302 automobile design & engineering ,020206 networking & telecommunications ,Exposed node problem ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,hidden node problem (HNP) ,listen-before-receive (LBR) ,business ,lcsh:TK1-9971 ,Heterogeneous network ,Computer network - Abstract
The Listen-Before-Talk (LBT) is the main procedure for Licensed Assisted Access (LAA) to accomplish fair and friendly coexistence with other operators or technologies operating over unlicensed spectrum. However, in LBT, the lack of coordination with other existing systems brings challenges in sustaining performance in the coexistence of LAA and WiFi networks. Specifically, the hidden node problem (HNP) and exposed node problem (ENP) cannot be effectively handled when both LAA and WiFi nodes attempt to access the unlicensed spectrum at the same time. Thus, transmission failure might occur and the network performance would be degraded. In order to mitigate the influences caused by HNP and ENP, based on LBT, we firstly analyze HNP and ENP by means of mathematical approach. The analytical results surprisingly reveal that the hidden node and exposed node probabilities are as high as 41% and 39.33%, respectively. Then, a Give And p-persistent Take (GAT) mechanism with the Listen-Before-Receive (LBR) procedure, namely LBR-GAT, is proposed to cope with LBT to reduce the collision caused by HNP as well as to retrieve the bandwidth sacrificed by the ENP. With LBR-GAT, the LAA sender conditionally gives up or takes back transmission opportunities, and thus the unlicensed spectrum could be efficiently shared between LAA and WiFi. Evaluation results show that the proposed LBR-GAT could conditionally obtain better network performance comparing to legacy LBT.
- Published
- 2021
29. Geographic Multipath Routing based on Triangle Link Quality Metric with Minimum Inter-path Interference for Wireless Multimedia Sensor Networks
- Author
-
Vijay R. Ghorpade and Shailendra Aswale
- Subjects
Routing protocol ,General Computer Science ,Handshake ,Computer science ,QoS routing ,02 engineering and technology ,lcsh:QA75.5-76.95 ,Multipath ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Wireless multimedia sensor networks ,Triangle Link Quality Metric ,Hidden node problem ,business.industry ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,Multipath routing ,Hidden Node Problem ,020201 artificial intelligence & image processing ,lcsh:Electronic computers. Computer science ,Wireless Multimedia Sensor Network ,Interference ,business ,Wireless sensor network ,Computer network - Abstract
Wireless Multimedia Sensor Networks (WMSNs) have emerged as the new class of wireless sensor networks (WSNs) to meet the stringent Quality of Service (QoS) requirements of emerging applications. Multipath routing with cross-layer approach appears to be a potential solution for supporting the distinct characteristics of WMSNs. However, due to the broadcast nature of the underlying medium, multiple paths are exposed to inter-path interference. In addition, low-power wireless links are asymmetric, error-prone and unreliable in nature. Consequently, an accurate and stable link quality estimation is essential to guarantee the performance of routing protocol. This paper proposes Triangle link quality metric and minimum inter-path Interference based Geographic Multipath Routing (TIGMR) protocol which finds multiple node-disjoint paths in IEEE 802.15.4 compliant network. This cross-layer routing protocol selects forwarding node based on a triangle link quality metric, remaining energy, and distance while anticipating minimum adjacent path interference effect. In addition, TIGMR protocol avoids Hidden Node Problem (HNP) at the sink node without using Request-To-Send/Clear-To-Send (RTS/CTS) handshake mechanism. Simulation results indicate TIGMR protocol optimizes overall performance and improves network lifetime as compared with state-of-the-art Two-Phase Geographic Forwarding (TPGF) and Link Quality and Energy-Aware Routing (LQEAR) protocols.
- Published
- 2021
30. Slot Reallocation and Rejection for Collision Avoidance in Autonomous TSCH Networks
- Author
-
Hye-Bin Park and Jinoo Joung
- Subjects
IEEE 802.15.4 ,Schedule ,General Computer Science ,Hidden node problem ,Computer science ,Network packet ,business.industry ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,General Engineering ,Time division multiple access ,orchestra ,TK1-9971 ,Scheduling (computing) ,wireless network ,TSCH ,Autonomous scheduling ,Overhead (computing) ,General Materials Science ,Electrical engineering. Electronics. Nuclear engineering ,Latency (engineering) ,business ,Computer network - Abstract
The IEEE 802.15.4-2015 TSCH (Time Slotted Channel Hopping) standard provides high-reliability, deterministic delay, and energy efficiency with the channel hopping and the TDMA. The standard does not specify the scheduling method, which is an essential part of the solution. One of the representative studies in TSCH scheduling is Orchestra. It is an autonomous scheduling method with minimal overhead that does not require a negotiation process between nodes. However, with high traffic load, performance of the Orchestra is greatly degraded because of its fixed schedule. If a node has children, continuous collisions occur in the slot of the node. We propose a novel algorithm called SRCA (Slot Reallocation for Collision Avoidance), as a solution for this problem. The SRCA autonomously updates the schedule. When a child requests a slot reallocation, the parent allocates a new slot with a low probability of collision. Another algorithm called SJCA (Slot reJection for Collision Avoidance) is further proposed in this work. It improves the SRCA to operate in an environment with interference where a sending node can disturb a transmission from a hidden node. In the SJCA, a node determines whether a collision due to interference will occur in the slot newly allocated by the parent. If so, it rejects the slot and requests again. We compare the performance of the SRCA and the SJCA against the Orchestra and e-TSCH-Orch through simulations. It is confirmed that the SJCA is robust to interference. In most cases, the SJCA shows better performance of PAR (Packet Acknowledgement Ratio), PLR (Packet Loss Rate), and latency than others. It is also verified that the SJCA provides high-reliability and low latency compared to existing technologies.
- Published
- 2021
31. Effects of Retransmission Limit on the Performance of Centralized Random Backoff
- Author
-
Jinho D. Kim
- Subjects
Markov chain ,Hidden node problem ,Wireless network ,business.industry ,Computer science ,Applied Mathematics ,Retransmission ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Local area network ,Markov process ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,Distributed coordination function ,Computer Science Applications ,symbols.namesake ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Wireless ,Electrical and Electronic Engineering ,business ,Computer network ,Communication channel - Abstract
Previous studies showed that the packet collision probability in the 802.11 Distributed Coordination Function (DCF) can approach zero by adopting Centralized Random Backoff (CRB), which improves the total throughput performance. Moreover, it was reported that wireless networks using CRB maintain a high level of compatibility to legacy wireless local area networks (WLANs) when they coexist. However, little attention has been paid to relations between the performance of CRB and the retransmission limit, although the number of retransmission limit is an essential parameter that must be carefully chosen when implementing CRB for efficient WLANs. This article presents more realistic Markov chain models, and studies the impact of retransmission limit on the performance of CRB. These relations are also investigated by Monte Carlo simulation in more practical scenarios. Results show the trade-off that the total throughput increases with the retransmission limit when the number of nodes is larger than 15; whereas, the channel access opportunities in the mixed network scenario are more unevenly distributed between nodes as the retransmission limit increases. It is also shown in the simulation results that the throughput degradation caused by the hidden node problem is alleviated as the retransmission limit increases.
- Published
- 2020
32. Radial Basis Function Neural Network With Hidden Node Interconnection Scheme for Thinned Array Modeling
- Author
-
Bing-Zhong Wang, Li-Ye Xiao, Wei Shao, Fu-Long Jin, and Qing Huo Liu
- Subjects
Coupling ,Interconnection ,Hidden node problem ,Artificial neural network ,Phased array ,Computer science ,Computer Science::Neural and Evolutionary Computation ,020206 networking & telecommunications ,Basis function ,02 engineering and technology ,Topology ,Finite element method ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Element (category theory) - Abstract
To extend the modeling area with artificial neural networks (ANNs) from finite periodic arrays to thinned arrays, where spacings between adjacent elements are crucial for array performance, an efficient model is proposed in this letter. Considering the spacings, a novel hidden node interconnection-radial basis function neural network (HNI–RBFNN) is developed to map the relationship between the array electromagnetic (EM) responses and the element ones. The element EM responses are obtained with the traditional RBFNN only involving the element geometry, while the connected weights of hidden layer nodes are determined by mutual coupling and array environment with the HNI scheme. A numerical example of the thinned phased array is used to evaluate the validity of the proposed model.
- Published
- 2020
33. A Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks.
- Author
-
Obite, Felix, Yusof, Kamaludin Mohammad, and Din, Jafri
- Subjects
- *
WIRELESS communications , *INTERFERENCE (Telecommunication) , *RADIO networks , *RADIO technology , *COGNITIVE radio - Abstract
Cognitive radio (CR) technology has emerged as a realistic solution to the spectrum scarcity problem in present day wireless networks. A major challenge in CR radio networks is the hidden node problem, which is the inability of the CR nodes to detect the primary user. This paper proposes energy detector-based distributed sequential cooperative spectrum sensing over Nakagami-m fading, as a tool to solve the hidden node problem. The derivation of energy detection performance over Nakagami-m fading channel is presented. Since the observation represents a random variable, likelihood ratio test (LRT) is known to be optimal in this type of detection problem. The LRT is implemented using the Neyman-Pearson Criterion (maximizing the probability of detection but at a constraint of false alarm probability). The performance of the proposed method has been evaluated both by numerical analysis and simulations. The effect of cooperation among a group of CR nodes and system parameters such as SNR, detection threshold and number of samples per CR nodes is investigated. Results show improved detection performance by implementing the proposed model. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
34. Effective Static and Adaptive Carrier Sensing for Dense Wireless CSMA Networks.
- Author
-
Chau, Chi-Kin, Ho, Ivan W. H., Situ, Zhenhui, Liew, Soung Chang, and Zhang, Jialiang
- Subjects
WIRELESS sensor networks ,CARRIER sense multiple access ,INTERNET of things ,COMPUTER network protocols ,DATA transmission systems ,MATHEMATICAL models - Abstract
The increasingly dense deployments of wireless CSMA networks arising from applications of Internet-of-things call for an improvement to mitigate the interference among simultaneous transmitting wireless devices. For cost efficiency and backward compatibility with legacy transceiver hardware, a simple approach to address interference is by appropriately configuring the carrier sensing thresholds in wireless CSMA protocols, particularly in dense wireless networks. Most prior studies of the configuration of carrier sensing thresholds are based on a simplified conflict graph model, whereas this paper considers a realistic signal-to-interference-and-noise ratio model. We provide a comprehensive study for two effective wireless CSMA protocols: Cumulative-interference-Power Carrier Sensing and Incremental-interference-Power Carrier Sensing, in two aspects: (1) static approach that sets a universal carrier sensing threshold to ensure interference-safe transmissions regardless of network topology, and (2) adaptive approach that adjusts the carrier sensing thresholds dynamically based on the feedback of nearby transmissions. We also provide simulation studies to evaluate the starvation ratio, fairness, and goodput of our approaches. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
35. Packet Delivery Ratio Prediction for V2V Based on Radio Environment Map Considering Hidden Terminal Problem
- Author
-
Ayumu Ueda and Takeo Fujii
- Subjects
Hidden node problem ,Computer science ,Network packet ,General Neuroscience ,Applied Mathematics ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,Aerospace Engineering ,Computer Science Applications ,Control and Systems Engineering ,Automotive Engineering ,Software ,Reflection mapping ,Information Systems - Abstract
Recently, vehicle-to-vehicle communication has been envisaged to be one of the technologies for realizing highly safe connected and automated driving. One of the approaches for predicting the radio environment is the use of a measurement-based spectrum database, which stores various pieces of information on the radio environment of data received and collected by vehicles; however, prediction of an accurate packet delivery ratio (PDR) with consideration of packet collisions is difficult if the vehicle density changes after the generation of PDR maps. This paper proposes a method for predicting the PDR with consideration of packet collisions, including the influence of hidden nodes, by using the positions and number of vehicles.
- Published
- 2020
36. Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs)
- Author
-
S. Barani and D.N.S. Ravi Kumar
- Subjects
Vehicular ad hoc network ,Hidden node problem ,Transmission delay ,Computer Networks and Communications ,Network packet ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,02 engineering and technology ,010501 environmental sciences ,01 natural sciences ,Broadcasting (networking) ,Transmission (telecommunications) ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,business ,Dissemination ,Software ,0105 earth and related environmental sciences ,Computer network - Abstract
Vehicular Adhoc Networks (VANETs) is one of the prominent and most important technologies that have reached a milestone in today’s modern world. One of the important key functions of VANET is known to be data dissemination that attracted most researchers to deal the problem and technical aspects towards its development. As collective perception technique is used by VANETs for expanding the perceptual range for the road traffic by sharing the sensor data regarding the objects in region using Vehicle-to-Vehicle communication. However, hidden terminal problem and packet collision occurs due to high vehicle density which makes data dissemination more difficult to deliver its messages which contains sensor data. In this paper, the proposed Epidemic and Transmission Control Priority (ETCP) based data dissemination model is presented. The proposed technique is used for controlling the transmission frequency of the sensor data or messages to avoid collision and to find the infected number of vehicles which are affected by the message without network overload. Furthermore, the vehicles are selected automatically with high probability for broadcasting sensor data. The simulation results of proposed ETCP algorithm is compared with existing Epic and Condensation Based Forwarding (CBF) algorithms, where transmission delay is as low as 214 millisecond which is lower when compared to other existing models. Packet delivery ratio of the proposed model is 99.12% which is significantly higher when compared to other existing models. The performance evaluation shows that the proposed model can deliberately avoid collision accidents and minimize the overhead and delay by comparing with other existing techniques.
- Published
- 2020
37. Modeling and simulation of the IEEE 802.11e wireless protocol with hidden nodes using Colored Petri Nets
- Author
-
Fernando L. Pelayo, Luis Orozco-Barbosa, María-Emilia Cambronero, Estefania Coronado, and Valentín Valero
- Subjects
IEEE 802 ,Hidden node problem ,computer.internet_protocol ,business.industry ,Computer science ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Local area network ,020206 networking & telecommunications ,02 engineering and technology ,CPN Tools ,Modeling and Simulation ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Wireless Application Protocol ,Wireless ,020201 artificial intelligence & image processing ,business ,computer ,Software ,Computer network - Abstract
Wireless technologies are continuously evolving, including features such as the extension to mid- and long-range communications and the support of an increasing number of devices. However, longer ranges increase the probability of suffering from hidden terminal issues. In the particular case of Wireless Local Area Networks (WLANs), the use of Quality of Service (QoS) mechanisms introduced in IEEE 802.11e compromises scalability, exacerbates the hidden node problem, and creates congestion as the number of users and the variety of services in the network grow. In this context, this paper presents a configurable Colored Petri Net (CPN) model for the IEEE 802.11e protocol with the aim of analyzing the QoS support in mid- and long-range WLANs The CPN model covers the behavior of the protocol in the presence of hidden nodes to examine the performance of the RTS/CTS exchange in scenarios where the QoS differentiation may involve massive collision chains and high delays. Our CPN model sets the basis for further exploring the performance of the various mechanisms defined by the IEEE 802.11 standard. We then use this CPN model to provide a comprehensive study of the effectiveness of this protocol by using the simulation and monitoring capabilities of CPN Tools.
- Published
- 2020
38. Improved likelihood ratio statistic‐based cooperative spectrum sensing for cognitive radio
- Author
-
Dhaval K. Patel, Miguel Lopez-Benitez, and Brijesh Soni
- Subjects
Cognitive radio ,0203 mechanical engineering ,Hidden node problem ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,Test statistic ,020206 networking & telecommunications ,020302 automobile design & engineering ,Detection theory ,02 engineering and technology ,Electrical and Electronic Engineering ,Algorithm ,Computer Science Applications - Abstract
Cooperative spectrum sensing (CSS) is a technique where multiple cognitive radio users cooperate among themselves to make binary decisions about the presence of a primary user. The single cognitive user often faces the hidden terminal problem. However, CSS tackles this problem by sending local sensing-based decisions to the fusion centre. A major drawback of conventional energy detection is the poor performance at low SNR regime. In this work, likelihood ratio statistics is considered as a test-statistic due to its highest statistical power. An improved likelihood ratio statistic-based CSS scheme is proposed by considering several past sensing events. The proposed scheme mitigates the poor detection at low SNR regime and misdetections arising due to sudden drops in signal energy. Furthermore, the generalised Byzantine attack is taken into account considering a security aspect. The proposed scheme is also shown to outperform Anderson Darling-based malicious user detection in CSS at a low SNR regime. The proposed scheme is verified and validated over empirical spectrum data. The performance improvement is at the cost of computational time, which in practice is very low and is justified by the significant performance improvements of the proposed scheme at low SNR regime.
- Published
- 2020
39. Performance Analysis of Full Duplex MAC protocols for Wireless Local Area Networks with Hidden Node Collisions
- Author
-
Kosuke Sanada and Kazuo Mori
- Subjects
Markov chain ,Hidden node problem ,Computer Networks and Communications ,Computer science ,business.industry ,Local area network ,Wireless ,Electrical and Electronic Engineering ,business ,Software ,Computer network - Published
- 2020
40. A Contract Theory Approach-Based Scheme to Encourage Secondary Users for Cooperative Sensing in Cognitive Radio Networks
- Author
-
Sanjay Kumar Dhurandher, Aarushi Sehgal, and Nitin Gupta
- Subjects
021103 operations research ,Hidden node problem ,Computer Networks and Communications ,business.industry ,Computer science ,Reliability (computer networking) ,0211 other engineering and technologies ,Contract theory ,02 engineering and technology ,Computer Science Applications ,Identification (information) ,Cognitive radio ,Control and Systems Engineering ,Complete information ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Private information retrieval ,Information Systems ,Computer network - Abstract
In cognitive radio networks, the identification of a primary user (PU) with the help of spectrum sensing is very important for a secondary user (SU), such that interference free transmission can be performed. In recent times, the cooperative spectrum sensing that improves the reliability of the decisions made about the presence of a PU and overcoming hidden terminal problem by obtaining sensing results from different sensors is gaining much attention. However, the selfish SUs are sometimes not willing to cooperate. This paper proposes a contract theory-based approach, which is an incentive design mechanism where the participants are offered appropriately designed reward to encourage cooperation. The secondary base-station (BS)–SU interaction is modeled as a labor market using contract theory. Contract theory helps in analyzing the case of incomplete information where the BS is not aware of the SU’s private information. Further, the contract is formed in such a way that only the limited number of noncorrelated SUs can participate in sensing such that unnecessary energy consumption is reduced. Simulation results show that the contract can effectively incentivize SU’s cooperation, and outperforms the considered benchmark scheme in terms of PU detection probability.
- Published
- 2020
41. Field Dependent-Shear Stress Prediction of Magnetorheological Fluid Using an Optimum Extreme Learning Machine Model
- Author
-
Mohd Ibrahim Shapiai, Ubaidillah Ubaidillah, Nur Anis Nordin, Fitrian Imaduddin, Nur Azmah Nordin, Saiful Amri Mazlan, Irfan Bahiuddin, and Dimas Adiputra
- Subjects
Fluid Flow and Transfer Processes ,Stress (mechanics) ,Shear rate ,Hidden node problem ,Computer science ,Control theory ,Magnetorheological fluid ,Shear stress ,Particle swarm optimization ,Trial and error ,Extreme learning machine - Abstract
Extreme learning machine (ELM) application to model the shear stress of magnetorheological (MR) fluids has superiority over the existing methods, such as Herschel-Bulkley. Although the shear stress has been successfully predicted, the hidden node numbers are too high reaching up to 10,000 that will hinder the application of the models. Furthermore, the existing works have tried to determine the hidden node number only by trial and error method. Therefore, this paper aims to reduce the hidden node number by employing the particle swarm optimization (PSO) considering the accuracy and the hidden node numbers. The ELM based-shear stress model was firstly defined by treating the magnetic field and shear rate as the inputs and shear stress as output. The objective function optimization method was then formulated to minimize the normalized error and the hidden node numbers. Finally, the proposed methods were tested at various ELM activation functions and samples. The results have shown that the platform has successfully reduced the hidden node numbers from 10,000 to 571 while maintaining the error of less than 1%. In summary, the proposed objective function for PSO optimization has successfully built the optimum shear stress model automatically.
- Published
- 2020
42. Implementation of cooperative spectrum sensing using cognitive radio testbed
- Author
-
R Aswatha, A Reethika, V Seethalakshmi, K Murugan, N Sathishkumar, and S Gunanandhini
- Subjects
Multidisciplinary ,Signal-to-noise ratio ,Cognitive radio ,Hidden node problem ,Computer science ,Real-time computing ,Transmitter ,Detector ,Fading ,False alarm ,Energy (signal processing) ,Communication channel - Abstract
Objectives: To implement energy detection and eigenvalue based cooperative spectrum sensing in NI-USRP hardware platform and to obtain its performance.Cooperative spectrum sensing is to be implemented using O and AND fusion rules. Methodology: The hardware is implemented using one primary user transmitter and two cognitive radio users. The implementation is done using LABVIEW and detection performance is analyzed. In cooperative spectrum sensing (CSS), CR system shares its own sensing information with other sensing nodes and utilizes the sensing outcomes of others to give a decision. Findings: Energy detection performs well in high SNR region and eigenvalue based detection performs well even with low SNR region. Energy detector detects the signal completely with SNR greater than 10dB. Eigenvalue detector detects signal completely at SNR of -9dB. Detection probability with OR Cooperative rule is better than AND rule. It increases with number of samples and signal to noise ratio. It is found that cooperative spectrum sensing performs well than the noncooperative sensing by decreasing the chances of miss detection. Novelty: CSS is robust in sensing errors due to hidden node or fading channels and also it decreases the probabilities of false alarm as well as probabilities of miss detection. Keywords: Cognitive radio; Cooperative spectrum sensing; Primary users; Secondary users; Energy detection
- Published
- 2020
43. Reliable Emergency Message Dissemination Scheme for Urban Vehicular Networks
- Author
-
Abdelhakim Hafid, Pratap Kumar Sahu, and Wiem Benrhaiem
- Subjects
050210 logistics & transportation ,Vehicular ad hoc network ,Hidden node problem ,Exploit ,business.industry ,Computer science ,Mechanical Engineering ,05 social sciences ,Lossy compression ,Dedicated short-range communications ,Computer Science Applications ,Beacon ,Spread spectrum ,0502 economics and business ,Automotive Engineering ,Wireless ,business ,Computer network - Abstract
Vehicular safety applications based on DSRC/802.11p have strict reliability requirement (greater than 0.99). However, it is difficult to achieve high reliability in wireless medium as the transmission is vulnerable to various wave propagation issues. To the best of our knowledge, none of the existing emergency message dissemination schemes in the literature, achieves a predefined reliability in lossy channel. In this paper, we propose a novel scheme, called reliable emergency message dissemination scheme (REMD), which achieves a predefined reliability for message dissemination while satisfying delay requirements, for various channel conditions. We aim to guarantee very high reliability (e.g., 99%) in each hop, with low control overhead while keeping low end-to-end latency for time-critical applications. We employ zero-correlated unipolar orthogonal codes to combat hidden terminal problem. We exploit periodic beacons, to accurately estimate reception quality of 802.11p wireless link in each cell; then, we use this information to determine the optimal number of broadcast repetitions in each hop. In addition, to ensure reliability in multi-hop, we utilize cooperative communication. The simulation results show that REMD outperforms the existing well-known schemes in the literature. Furthermore, REMD satisfies latency requirements for time-critical vehicular applications and has less network overhead than the existing schemes.
- Published
- 2020
44. Learning Optimized Structure of Neural Networks by Hidden Node Pruning With $L_{1}$ Regularization
- Author
-
Junze Wang, Xuetao Xie, Nikhil R. Pal, Qin Chang, Jian Wang, and Huaqing Zhang
- Subjects
0209 industrial biotechnology ,Artificial neural network ,Hidden node problem ,Computer science ,02 engineering and technology ,Regularization (mathematics) ,Computer Science Applications ,Human-Computer Interaction ,Matrix (mathematics) ,020901 industrial engineering & automation ,Control and Systems Engineering ,Multilayer perceptron ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Algorithm ,Software ,Smoothing ,Information Systems - Abstract
We propose three different methods to determine the optimal number of hidden nodes based on $L_{1}$ regularization for a multilayer perceptron network. The first two methods, respectively, use a set of multiplier functions and multipliers for the hidden-layer nodes and implement the $L_{1}$ regularization on those, while the third method equipped with the same multipliers uses a smoothing approximation of the $L_{1}$ regularization. Each of these methods begins with a given number of hidden nodes, then the network is trained to obtain an optimal architecture discarding redundant hidden nodes using the multiplier functions or multipliers. A simple and generic method, namely, the matrix-based convergence proving method (MCPM), is introduced to prove the weak and strong convergence of the presented smoothing algorithms. The performance of the three pruning methods has been tested on 11 different classification datasets. The results demonstrate the efficient pruning abilities and competitive generalization by the proposed methods. The theoretical results are also validated by the results.
- Published
- 2020
45. An analytical framework for reliability evaluation of d-dimensional IEEE 802.11 broadcast wireless networks
- Author
-
Wu Zhuofei, Jing Zhao, Yanbin Wang, Zhijuan Li, Xiaomin Ma, and Yue Zhao
- Subjects
Hidden node problem ,Computer Networks and Communications ,Wireless network ,Network packet ,Computer science ,business.industry ,Quality of service ,Reliability (computer networking) ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,IEEE 802.11 ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Fading ,Electrical and Electronic Engineering ,business ,Information Systems ,Communication channel ,Computer network - Abstract
In this paper, we validate that the deterministic distance-based analytical model can be used to estimate the reliability of one-dimensional (1-D) 802.11 broadcast wireless networks compared with the interference-based analytical model. Therefore, we propose a deterministic distance-based reliability analytical framework for such networks in d-dimensional (d-D, $$d \ge 1$$ ) scenarios. This framework takes into account the fading channel and hidden terminal problem and makes three commonly used reliability metrics able to be resolved, including point-to-point packet reception probability (NRP), packet delivery ratio (PDR), and packet reception ratio (PRR). There are two key factors involved in deducing the effect of hidden terminals. One is to measure the hidden terminal transmission probability during the vulnerable period, which can be calculated based on the approximate solution of the semi-Markov process model capturing the channel contention and the back-off behavior. Another is the challenge to determine the size of the area to which the hidden terminals belong. First, we give a general mathematical expression on the size of the hidden terminal coverage affecting NRP which is an important part of the closed-form solution of NRP/PRR. Second, we adopt the Monte-Carlo method to solve the size of general hidden terminal coverage affecting PDR, making it possible to approximate PDR, as well as control the efficiency and accuracy by constraining the relative error. Finally, we adopt a multi-parameter optimization scheme to find the optimum settings for the network to ensure the quality of service and maximize channel utilization. A series of experimental results show that the framework can be used to access the reliability of 802.11 based d-D broadcast wireless network and pave the way for further optimization.
- Published
- 2020
46. Hidden-Node Problem in Full-Duplex Enabled CSMA Networks
- Author
-
Liqun Fu, Shengbo Liu, and Wei Xie
- Subjects
Hidden node problem ,Computer Networks and Communications ,Wireless network ,Computer science ,business.industry ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Duplex (telecommunications) ,020206 networking & telecommunications ,Throughput ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Interference (wave propagation) ,law.invention ,Transmission (telecommunications) ,Relay ,law ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,business ,Software ,Computer network - Abstract
The in-band full-duplexing is a promising technique to boost wireless network throughput by allowing a node to transmit and receive simultaneously. This paper provides a comprehensive investigation on the hidden-node problem that arises in the full-duplex (FD) enabled carrier-sensing multiple-access (CSMA) networks. In particular, we first provide the fundamental conditions that guarantee successful receptions for all the FD transmission cases, and propose an ellipse interference model and an ellipse carrier-sensing model to capture the interference relations and the carrier-sensing mechanism in FD CSMA networks, respectively. We further establish the hidden-node-free design in FD CSMA networks. Specifically, we show the sufficient conditions on the carrier-sensing power threshold that can eliminate hidden-node collisions. We show that compared with half-duplex CSMA networks, the FD CSMA network needs a much smaller carrier-sensing power threshold to prevent hidden-node collisions, which leads to poor network spatial reuse. This motivates us to further propose a new medium access control (MAC) protocol with Full-duplex Enhanced Carrier-Sensing (FECS) mechanism. The FECS-MAC enables the secondary carrier-sensing before starting the secondary transmission. We show that with the secondary carrier-sensing design, the required carrier-sensing power threshold can be increased while keeping the network hidden-node free. Therefore, the network spatial reuse and throughput can be significantly improved. Simulation results demonstrate that the FECS-MAC can improve the throughput of dense three-node FD networks by more than 30 percent, compared with relay full-duplex (RFD) MAC protocol proposed in [1] .
- Published
- 2020
47. Parallel PPDU Transmission Mechanism for Wideband Wireless LANs
- Author
-
Dong Geun Jeong, Shinnazar Seytnazarov, and Wha Sook Jeon
- Subjects
General Computer Science ,parallel transmission ,Computer science ,Throughput ,02 engineering and technology ,Data_CODINGANDINFORMATIONTHEORY ,Interference (wave propagation) ,Narrowband ,channel bonding ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,General Materials Science ,Wideband ,narrowband collision ,Hidden node problem ,Frame (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,General Engineering ,020206 networking & telecommunications ,wide channel access ,wireless local area network (WLAN) ,Transmission (telecommunications) ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,lcsh:TK1-9971 ,Communication channel ,802.11 - Abstract
When the preambles of a wideband 802.11n/ac frame transmission are affected by a collision with a 20MHz frame on one of the subchannels, a receiver might fail to decode the whole wideband frame. Experimental evaluations with off-the-shelf 802.11n hardware showed that the vulnerability of wideband frame transmission to a narrowband collision/interference is a real problem. To mitigate the severe impact of narrowband collision/interference on wideband transmission, we propose to transmit several 20MHz frames in parallel instead of a single wideband frame so that a narrowband collision on one of the subchannels affects only the parallel frame transmitted on that subchannel. Performance evaluations demonstrated that the proposed parallel frame transmission scheme significantly improves the throughput and delay performance of wideband transmissions under different traffic and channel conditions. While the throughput performance of the proposed scheme for saturated traffic conditions was analytically validated, extensive simulation-based evaluations showed that the proposed scheme achieves great performance improvement for unsaturated traffic conditions and hidden node environment.
- Published
- 2020
48. Comparison of self-organized tree hierarchy MAC protocol and PP-MAC for energy consideration in wireless sensor networks
- Author
-
N. Srikanth and T. Shankar
- Subjects
010302 applied physics ,Hidden node problem ,Computer science ,business.industry ,Access control ,02 engineering and technology ,General Medicine ,Intrusion detection system ,Load balancing (computing) ,021001 nanoscience & nanotechnology ,01 natural sciences ,Duty cycle ,0103 physical sciences ,0210 nano-technology ,business ,Wireless sensor network ,Carrier sense multiple access with collision avoidance ,Computer network ,Data transmission - Abstract
Sensor network contains plenty of nodes for many applications like environmental monitoring, target identification and intrusion detection. So that, the life cycle of the network should be maximized as much as possible with less delay and high channel utilization. In this paper the proposed work presents a Self-organized Tree Hierarchy medium access control protocol (STH-MAC) for the data transfer from source to destination. Hidden terminal problem and load balancing are the common issues of the sensor network. Carrier Sense Multiple Access with collision avoidance is the normal scheme to avoid such kind of problem. MAC controls can have pipelining with priority base. Sleep interval is monitored based on the priority of nodes.
- Published
- 2020
49. Emergency Message Dissemination in Vehicular Networks: A Review
- Author
-
Balawal Shabir, Asad Waqar Malik, Muhammad Sher Ramzan, M.A. Khattak, and Muhammad Uzair Ghazi
- Subjects
VANET ,General Computer Science ,Computer science ,02 engineering and technology ,Computer security ,computer.software_genre ,Broadcasting (networking) ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Broadcast radiation ,Intelligent transportation system ,Dissemination ,Vehicular ad hoc network ,Hidden node problem ,General Engineering ,020206 networking & telecommunications ,020302 automobile design & engineering ,broadcast ,fog ,emergency message dissemination ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Software-defined networking ,computer ,lcsh:TK1-9971 ,5G ,clustering - Abstract
The number of vehicles on the roads has increased proportionally over the last couple of years and this number is likely to rise due to the increase in population growth and the number of vehicles that are manufacturing every day. This high traffic density leads to several problems, from which effectively disseminating the emergency messages is a major concern. Keeping in view the dynamic characteristics of VANETs, significant challenges are faced in disseminating the message across the network. The major challenges are the broadcast storm problem, hidden node problem and the packet collision. Many studies have been performed to devise an effective and reliable mechanism for disseminating emergency messages in a Vehicular ad-Hoc Network (VANET). Researchers have proposed different models to tackle various types of scenarios for emergency message dissemination. This paper not only reviews some recent contributions to emergency message dissemination in vehicular networks but also discusses various proposed methods based on Intelligent Transportation System (ITS), Internet of Things (IoT), Priority messaging, Clustering approach, Software Defined Network (SDN) and Fog Computing. We have also tried to explore the latest developments in emergency message dissemination using 5G networks.
- Published
- 2020
50. A COMPACT OPTIMAL LEARNING MACHINE
- Author
-
Kanathip Sae-pae and Kuntpong Woraratpanya
- Subjects
General Computer Science ,Artificial neural network ,Hidden node problem ,Computer science ,business.industry ,Machine learning ,computer.software_genre ,Residual ,Function approximation ,Principal component analysis ,Pattern recognition (psychology) ,Artificial intelligence ,Cluster analysis ,business ,computer ,Extreme learning machine - Abstract
Artificial neural networks (ANNs) have been developed and applied to a variety of problems, such as pattern recognition, clustering, function approximation, forecasting, optimization, etc. However, existing ANNs have a high computational cost, since their learning methods are mostly based on a parameter tuning approach. Extreme learning machine (ELM) is a state-of-the-art method that generally dramatically reduces the computational cost. An analysis of the ELM method reveals that there are unsolved key factors, including inefficient hidden node construction, redundant hidden nodes, and unstable results. Therefore, we describe a new learning machine based on analytical incremental learning (AIL) in conjunction with principal component analysis (PCA). This learning machine, PCA-AIL, inherited the advantages from the original one and solved the unsolved key factors of ELM, and also extended AIL capability to serve a multiple-output structure. PCA-AIL was implemented with a single-layer feed-forward neural network architecture, used an adaptive weight determination technique to achieve a compact optimal structure and also used objective relations to support multiple output regression tasks. PCA-AIL has two steps: objective relation estimation and multiple optimal hidden node constructions. In the first step, PCA estimated the objective relations from multiple-output residual errors. In the second step, the multiple optimal nodes were obtained from objective relations and added to the model. PCA-AIL was tested with 16 multiple-objective regression datasets. PCA-AIL mostly outperformed other methods (ELM, EM-ELM, CP-ELM, DP-ELM, PCA-ELM, EI-ELM) in terms of fast testing speed – 0.0017 second, a compact model – 19.9 nodes, an accurate performance – RMSE 0.11261, and a stable result – S.D. of RMSE 0.00911: reported in averaged.
- Published
- 2019
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.