Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2022
Chipnet: Enabling Large-scale Backscatter Network with Processor-free Devices
ACM Transactions on Sensor Networks (TOSN), Volume 18, Issue 4Article No.: 61, Pages 1–26https://doi.org/10.1145/3544492Differing from tremendous existing works that mainly focus on optimizing backscatter communication, Radio-to-Bus (R2B) communication utilizes backscatter to offload processors from IoT devices to the gateway, achieving processor-free devices of ...
- research-articleSeptember 2022
Improving Quality of Service in 5G Resilient Communication with the Cellular Structure of Smartphones
ACM Transactions on Sensor Networks (TOSN), Volume 18, Issue 3Article No.: 43, Pages 1–23https://doi.org/10.1145/3512890Recent studies in information computation technology (ICT) are focusing on Next-generation networks, SDN (Software-defined networking), 5G, and 6G. Optimal working mode for device-to-device (D2D) communication is aimed at improving the quality of service ...
- research-articleJanuary 2022
eeFFA/DE - a fuzzy-based clustering algorithm using hybrid technique for wireless sensor networks
International Journal of Advanced Intelligence Paradigms (IJAIP), Volume 21, Issue 1-2Pages 129–157https://doi.org/10.1504/ijaip.2022.121034Designing an energy-aware clustering algorithm for wireless sensor networks (WSNs) has become an issue of great concern among the scientific community in these days. This is due to the non-rechargeable nature of the battery operated sensor devices, which ...
- research-articleNovember 2021
Measuring the network performance of Google cloud platform
IMC '21: Proceedings of the 21st ACM Internet Measurement ConferencePages 54–61https://doi.org/10.1145/3487552.3487862Public cloud platforms are vital in supporting online applications for remote learning and telecommuting during the COVID-19 pandemic. The network performance between cloud regions and access networks directly impacts application performance and users' ...
- research-articleFebruary 2021
Concurrent transmission scheduling algorithm based on Stackelberg game to enhance time reuse for D2D communications in mmWave networks
IET Communications (CMU2), Volume 14, Issue 21Pages 3882–3892https://doi.org/10.1049/iet-com.2020.0633Due to the tremendous propagation loss of millimeter wave (mmWave) communication, device‐to‐device (D2D) communications are widely used over directional mmWave networks to improve network throughput. Most of existing works are mainly focused on ...
-
- research-articleSeptember 2020
Intelligent traffic management algorithm for wireless sensor networks
ICONIC '20: Proceedings of the 2nd International Conference on Intelligent and Innovative Computing ApplicationsArticle No.: 27, Pages 1–7https://doi.org/10.1145/3415088.3415115Wireless Sensor Networks (WSNs) are used to simplify various real-time applications which include traffic management, humidity, monitoring of the temperature, and pressure by using a wide range of sensor nodes. Sensor nodes are assigned through various ...
- research-articleJuly 2020
Deadlock‐free adaptive 3D network‐on‐chips routing algorithm with repetitive turn concept
IET Communications (CMU2), Volume 14, Issue 11Pages 1783–1792https://doi.org/10.1049/iet-com.2019.0269With the emergence of a large number of multi‐core systems, many 3D routing schemes have been developed for network‐on‐chips (NoCs) in order to obtain low overhead and high‐performance. Nevertheless, it is difficult to possess these characteristics for ...
- research-articleFebruary 2020
A novel routing metric for IEEE 802.11s-based swarm-of-drones applications
MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and ServicesPages 514–521https://doi.org/10.1145/3360774.3368197With the proliferation of drones in our daily lives, there is an increasing need for handling their numerous challenges. One of such challenge arises when a swarm-of-drones are deployed to accomplish a specific task which requires coordination and ...
- research-articleNovember 2019
Differential back‐pressure routing for single‐queue time‐varying wireless networks
IET Communications (CMU2), Volume 13, Issue 18Pages 3117–3123https://doi.org/10.1049/iet-com.2019.0371Dynamic resource control and routing are important for realising the intelligent control of data transmission in wireless multi‐hop networks. It is well known that back‐pressure routing based on a max‐weight policy maximises network throughput and ...
- research-articleOctober 2019
MO‐CSO‐based load‐balanced routing in MRMC WMN
IET Communications (CMU2), Volume 13, Issue 16Pages 2453–2460https://doi.org/10.1049/iet-com.2018.6060The multi‐radio–multi‐channel wireless mesh networks (MRMC WMNs) have attracted much attention due to their low cost, reliable coverage, stable topology, and so forth. Load balancing among gateways (GWs) is a challenging task in MRMC WMNs. The GW nodes ...
- research-articleSeptember 2019
Shortest‐path‐based back‐pressure routing with single‐FIFO queueing in ad hoc networks'
IET Networks (NTW2), Volume 8, Issue 5Pages 339–345https://doi.org/10.1049/iet-net.2018.5085Owing to the limited network resources in ad hoc networks, improving network throughput is the key to solve network congestion and increase network transmission efficiency. Back‐pressure routeing, as an optimal routeing strategy for throughput, has ...
- research-articleMarch 2017
Efficient coding for unicast flows in opportunistic wireless networks
IET Communications (CMU2), Volume 11, Issue 4Pages 584–592https://doi.org/10.1049/iet-com.2015.1170In this study the authors consider the scenario of multiple unicast flows intersecting a common router in an opportunistic wireless network. Instead of forwarding packets in each of the flows independently, the router can perform inter‐session network ...
- research-articleOctober 2016
Adaptive stochastic radio access selection scheme for cellular‐WLAN heterogeneous communication systems
IET Communications (CMU2), Volume 10, Issue 15Pages 1986–1994https://doi.org/10.1049/iet-com.2015.1084This study proposes a novel adaptive stochastic radio access selection scheme for mobile users in heterogeneous cellular‐wireless local area network (WLAN) systems. In this scheme, a mobile user located in dual coverage area randomly selects WLAN with ...
- research-articleSeptember 2016
Two‐way relay networks with wireless power transfer: design and performance analysis
IET Communications (CMU2), Volume 10, Issue 14Pages 1810–1819https://doi.org/10.1049/iet-com.2015.0728This study considers amplify‐and‐forward two‐way relay networks, where an energy constrained relay node harvests energy from the received radio‐frequency signal. Based on time switching receiver, they separate the energy harvesting (EH) phase and the ...
- research-articleAugust 2015
Single-Hop Transport Throughput of Secondary Networks in Spectrum Sharing Systems
IEEE Transactions on Mobile Computing (ITMV), Volume 14, Issue 8Pages 1726–1736https://doi.org/10.1109/TMC.2014.2363091In order to improve the spectrum efficiency, spectrum sharing systems allow multiple systems to utilize the same spectrum with different priorities. Typically, the primary network performs as a stand-alone network while the secondary one accesses the ...
- research-articleJuly 2015
Interference alignment‐and‐cancellation scheme based on Alamouti code for the three‐user multi‐input–multi‐output interference channel
IET Communications (CMU2), Volume 9, Issue 10Pages 1278–1288https://doi.org/10.1049/iet-com.2014.1084An interference alignment (IA) scheme for interference channels was recently proposed to achieve the maximum degrees of freedom (DoF). Although most studies of IA focus on network throughput, that is, DoF, reliability in terms of diversity order is also ...
- ArticleSeptember 2014
Performance Analysis of Cognitive Bluetooth Networks Based on the Orthogonal FH Sequences
CIT '14: Proceedings of the 2014 IEEE International Conference on Computer and Information TechnologyPages 869–875https://doi.org/10.1109/CIT.2014.58Since the existing orthogonal frequency hopping (FH) sequence cannot support the high throughput and high spectrum efficiency cognitive Bluetooth network (CBN) due to its disadvantage of small family size, high computational complexity and short period, ...
- research-articleJanuary 2014
Performance implications of remote-only load balancing under adversarial traffic in Dragonflies
INA-OCMC '14: Proceedings of the 8th International Workshop on Interconnection Network Architecture: On-Chip, Multi-ChipArticle No.: 5, Pages 1–4https://doi.org/10.1145/2556857.2556860Dragonfly topologies are recent network designs that are considered one of the most promising interconnect options for Exascale systems. They offer a low diameter and low network cost, but do so at the expense of path diversity, which makes them ...
- ArticleDecember 2013
Routing Design and Analysis of Place Based Opportunistic Networks
CSE '13: Proceedings of the 2013 IEEE 16th International Conference on Computational Science and EngineeringPages 252–259https://doi.org/10.1109/CSE.2013.48Opportunistic networks, as a key enabling technology for pervasive computing, have attracted enormous attentions from researchers recently. In this paper, we focus on designing and analyzing routing schemes in our new place-based opportunistic networks, ...
- research-articleDecember 2013
Simplified compute‐and‐forward and its performance analysis
IET Communications (CMU2), Volume 7, Issue 18Pages 2054–2063https://doi.org/10.1049/iet-com.2013.0324The compute‐and‐forward (CMF) method has shown a great promise as an innovative approach to exploit interference towards achieving higher network throughput. The CMF was primarily introduced by means of information theory tools. Although there have been ...