To see the other types of publications on this topic, follow the link: Protocol relay.

Journal articles on the topic 'Protocol relay'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Protocol relay.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Nasaruddin, Nasaruddin, Elizar Mustafa, and Yusnidar Yusnidar. "Performance Evaluation of Amplify-Quantize and Forward Protocol for Multi-relay Cooperative Networks." ECTI Transactions on Electrical Engineering, Electronics, and Communications 15, no. 1 (2016): 8–18. http://dx.doi.org/10.37936/ecti-eec.2017151.171272.

Full text
Abstract:
Fading which occurs during the process of information transmission can significantly degrade system performance. The cooperative communication system is a well-known diversity technique that is able to mitigate the impact of fading. The relay protocol is the core of such systems. In this research, we evaluated the performance of amplify-quantize and forward (AQF) relays using a hybrid of two protocols: amplify-and-forward (AF) and quantize-and-forward (QF). The outage probability and throughput of multi-relay cooperative networks were derived, and computer simulation was used to evaluate the i
APA, Harvard, Vancouver, ISO, and other styles
2

Nasaruddin, Nasaruddin, Rony Kurnia, and Ramzi Adriman. "Efisiensi Daya Protokol Quantize and Forward Pada Sistem Komunikasi Kooperatif Multi-relay." Jurnal Rekayasa Elektrika 13, no. 1 (2017): 57. http://dx.doi.org/10.17529/jre.v13i1.6568.

Full text
Abstract:
One of effective diversity techniques to combat fading on wireless channel is a cooperative communication system in which a source sends information through several relays and then forward it to a destination. A cooperative communication system has shown increased the system performance and reduced the energy consumption. However, it depends on the used relay mechanism that is relay protocols such as quantize and forward (QF) and amplify and forward (AF). In the previous research, energy efficiency of AF relay has investigated for a single-relay cooperative system, but multi-relay is more prac
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Jie, Jianrong Bao, Shenji Luan, Bin Jiang, and Chao Liu. "Power Optimized Single Relay Selection with an Improved Link-Adaptive-Regenerative Protocol." Journal of Electrical and Computer Engineering 2018 (July 2, 2018): 1–8. http://dx.doi.org/10.1155/2018/8364594.

Full text
Abstract:
To improve the reliability and efficiency in cooperative communications, a power optimized single relay selection scheme is proposed by increasing the diversity effort with an improved link-adaptive-regenerative (ILAR) protocol. The protocol determines the forwarding power of a relay node by comparing the signal-to-noise ratio (SNR) at both sides of the node; thus it improves the power efficiency. Moreover, it also proposes a single relay selection strategy to maximize the instantaneous SNR product, which ensures the approximate best channel link quality for good relay forwarding. And the syst
APA, Harvard, Vancouver, ISO, and other styles
4

Kung, Chun-Ta, Ko-Wei Ma, and Hung-Yu Wei. "Cognitive relay protocol." ACM SIGMOBILE Mobile Computing and Communications Review 14, no. 3 (2010): 28–30. http://dx.doi.org/10.1145/1923641.1923652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Suoping, Tongtong Jia, Hailing Yang, Ruiman Gao, and Qian Yang. "SWIPT Cooperative Protocol for Improving the Communication Quality of Cell-Edge Users in NOMA Network and Its Performance Analysis." Electronics 12, no. 17 (2023): 3583. http://dx.doi.org/10.3390/electronics12173583.

Full text
Abstract:
To solve the problems of complex energy supply and poor communication effect of cell-edge users, combining the advantages of simultaneous wireless information and power transfer (SWIPT) and collaborative non-orthogonal multiple access (CNOMA), two novel protocols are proposed. By employing the PS and TS strategies in SWIPT, respectively, two protocols are named: SWIPT-CNOMA-PS and SWIPT-CNOMA-TS. Based on the protocols, a new method for selecting relays is first established by considering two factors—energy state and channel condition. To further improve energy efficiency, the relay harvests t
APA, Harvard, Vancouver, ISO, and other styles
6

Du, Guanyao, Ke Xiong, and Zhengding Qiu. "Outage Analysis of Cooperative Transmission with Energy Harvesting Relay: Time Switching versus Power Splitting." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/598290.

Full text
Abstract:
This paper investigates the multiuser transmission network with an energy harvesting (EH) cooperative relay, where a source transmits independent information to multiple destinations with the help of an energy constrained relay. The relay can harvest energy from the radio frequency (RF) signals transmitted from the source, and it helps the multiuser transmission only by consuming the harvested energy. By adopting the time switching and the power splitting relay receiver architectures, we firstly propose two protocols, the time switching cooperative multiuser transmission (TSCMT) protocol and t
APA, Harvard, Vancouver, ISO, and other styles
7

Abidin, Aysajan. "On Detecting Relay Attacks on RFID Systems Using Qubits." Cryptography 4, no. 2 (2020): 14. http://dx.doi.org/10.3390/cryptography4020014.

Full text
Abstract:
As RFID technology is being widely used in access control systems to identify and track both objects and people, relay attacks on RFID systems continue to pose serious threats to security. To mitigate relay attacks, distance bounding protocols can be used. Until recently, all distance bounding protocols were based on classical cryptography and communication techniques. In this paper, we take a closer look at a recently proposed protocol by Jannati and Ardeshir-Larijani [Quantum Information Processing 2016, 18] to detect relay attacks using qubits. We first observe that the protocol has a weakn
APA, Harvard, Vancouver, ISO, and other styles
8

Son, Pham Ngoc, Tran Trung Duy, and Khuong Ho-Van. "SIC-Coding Schemes for Underlay Two-Way Relaying Cognitive Networks." Wireless Communications and Mobile Computing 2020 (August 24, 2020): 1–17. http://dx.doi.org/10.1155/2020/8860551.

Full text
Abstract:
In this paper, we propose an underlay two-way relaying scheme with the successive interference cancellation (SIC) solution in which two secondary sources transmit simultaneously their data to each other through secondary relays. The proposed scheme is operated in only two time slots and under an interference constraint of a primary receiver, denoted as the UTW-2TS scheme. In the UTW-2TS scheme, the secondary relays employ the SIC operation to decode successively the data from received broadcast signals and then encode these data by two techniques: digital network coding (DNC) enforced by XOR o
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Xiufeng, Mingcheng Qu, Gang Cui, et al. "Regular-hexagon-equilateral-triangle area grouping–based broadcast protocol for safety message in urban vehicular ad hoc networks." International Journal of Distributed Sensor Networks 13, no. 1 (2017): 155014771668382. http://dx.doi.org/10.1177/1550147716683829.

Full text
Abstract:
Road-based directional broadcast protocols are proposed in the literatures to offset efficiency of message dissemination of traditional broadcast protocol in urban vehicular ad hoc networks. However, these protocols cannot provide enough reliability and efficiency for vehicles’ misclassification at intersection or on straight road. Therefore, we present regular-hexagon-equilateral-triangle area grouping–based broadcast protocol for urban vehicular ad hoc networks. The area covered by relay node is averagely divided using regular-hexagon-equilateral-triangle, and vehicles are grouped according
APA, Harvard, Vancouver, ISO, and other styles
10

Kakria, Arvind, and Trilok Chand Aseri. "An Efficient Distributed Single-hop Relay Supporting (EDSRS) MAC Protocol for Wireless Sensor Networks." International Journal of Sensors, Wireless Communications and Control 9, no. 2 (2019): 153–64. http://dx.doi.org/10.2174/2210327908666180801125223.

Full text
Abstract:
Background & Objective: Wireless communication has immensely grown during the past few decades due to significant demand for mobile access. Although cost-effective as compared to their wired counterpart, maintaining good quality-of-service (QoS) in these networks has always remained a challenge. Multiple-input Multiple-output (MIMO) systems, which consists of multiple transmitter and receiver antennas, have been widely acknowledged for their QoS and transmit diversity. Though suited for cellular base stations, MIMO systems are not suited for small-sized wireless nodes due to their hardware
APA, Harvard, Vancouver, ISO, and other styles
11

Kim, Kwang-Yul, and Yoan Shin. "Inter-Relay Interference Mitigation for Chirp-Based Two-Path Successive Relaying Protocol." Sensors 19, no. 15 (2019): 3346. http://dx.doi.org/10.3390/s19153346.

Full text
Abstract:
Since the chirp spread spectrum (CSS) system is considered as a communication technology for the Internet of things (IoT), long-range communication and a high data rate are required. In wireless communications, in order to increase spectral efficiency and to extend transmission coverage, a two-path successive relaying (TPSR) protocol has been proposed. Thus, in order to improve transmission performance of the CSS system, in this paper we apply the TPSR protocol to the CSS system. However, since the TPSR protocol is successively relaying data, the spectral efficiency may be limited due to inter
APA, Harvard, Vancouver, ISO, and other styles
12

Hammad, Ahmed, M. A. Mohamed, and Heba M. Abdel-Atty. "An Optimized Distributed Routing Protocol for Energy Management Systems Based on Wireless Sensor Networks in Intelligent and Smart Structures." International journal of electrical and computer engineering systems 13, no. 4 (2022): 269–77. http://dx.doi.org/10.32985/ijeces.13.4.3.

Full text
Abstract:
Energy and spectrum efficiency for energy management systems based on wireless sensor networks in intelligent structures and powered by ambient energy harvesting (EH) are the main problems in wireless sensor networks. Herein, we consider relay selection methods. To address this issue, we proposed the optimal multiantenna power beacon opportunistic relay selection (OMPB-ORS) protocol, which uses decoding and forward methods, in which the relay wireless sensor nodes and the second source are energy-restricted and can harvest energy from a power beacon (PB) multiantenna to transmit aggregated inf
APA, Harvard, Vancouver, ISO, and other styles
13

Alawady, Ahmed Allawy, Ahmed Alkhayyat, Mohammed Ahmed Jubair, Mustafa Hamid Hassan, and Salama A. Mostafa. "Analyzing bit error rate of relay sensors selection in wireless cooperative communication systems." Bulletin of Electrical Engineering and Informatics 10, no. 1 (2021): 216–23. http://dx.doi.org/10.11591/eei.v10i1.2492.

Full text
Abstract:
Cooperative communication systems, which make use of the intermediate relays between the transmitter and the receiver, have been employed as an effective technique to combat the channel fading and to enhance system performance. Cooperative systems have some drawbacks such as high latency and may diversity order not guaranteed. To alleviate the negative effects of these factors, the relay selection protocol is employed in cooperative communication systems to increase overall cooperative system performance. Relay selection in the cooperative systems enables the source to cooperate with the singl
APA, Harvard, Vancouver, ISO, and other styles
14

Yang, Dongmei, Cheng Li, Baoquan Ren, Hongjun Li, and Kefeng Guo. "Analysis of relay selection schemes in underlay cognitive radio non-orthogonal multiple access networks." International Journal of Distributed Sensor Networks 18, no. 5 (2022): 155014772110663. http://dx.doi.org/10.1177/15501477211066304.

Full text
Abstract:
This article investigates the impacts of relay selection schemes on cooperative underlay cognitive radio non-orthogonal multiple access networks, where the partial relay selection scheme, the max–min relay selection scheme and the two-stage relay selection scheme are applied in the network. Moreover, decode-and-forward protocol is used at the transmission relays. What’s more, in order to show the effect of the schemes on the considered network, the closed-form expressions and asymptotic expressions for the outage probability of the system are derived. Furthermore, the outage performance under
APA, Harvard, Vancouver, ISO, and other styles
15

Mir, Shabir Ahmed, and T. Padma. "Evaluation of Power Minimization for Routing Protocol and Multicast Networks." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (2018): 299. http://dx.doi.org/10.11591/ijeecs.v9.i2.pp299-301.

Full text
Abstract:
In this paper explore the scenario of wireless multicast with a single source and multiple relay that together convey consecutively refined sources to multiple receiver. Joint source-channel coding (JSCC) protocol is proposed aimed at mitigating the complexity and difficulty in signal synchronization in multicast taking end-to-end mean cube error deformation as the quality of service measure the problems of JSCC communication are formulated to minimize the total power utilization where both relay selection and power allocation at the base station (BS) and all the relays are jointly determined
APA, Harvard, Vancouver, ISO, and other styles
16

Gong, Wen Tao. "The Design of Multi-Protocol Network Based on Point-to-Point Protocol and Frame Relay." Advanced Materials Research 936 (June 2014): 2293–97. http://dx.doi.org/10.4028/www.scientific.net/amr.936.2293.

Full text
Abstract:
Local area network and wide area network are different network protocols, small and medium enterprises due to the geographical distribution of discrete and interface diversity, leading to its needs to be compatible with different network protocols, it is difficult to use a single network protocol to realize network architecture, and due to the ipv4 address scarcity, making its application or maintenance cost greatly increased, based on this, this paper presents the design of multi-protocol network architecture based on point-to-point protocol and frame relay, and with the advantages of the rou
APA, Harvard, Vancouver, ISO, and other styles
17

Liu, Qiao, Hui Li, and Yong Wang. "General Secure Information Exchange Protocol for a Multiuser MIMO Relay Channel." Entropy 21, no. 11 (2019): 1054. http://dx.doi.org/10.3390/e21111054.

Full text
Abstract:
Secure information exchange occurs in many recently emerging cooperative-based networks, such as 5G networks (especially those with a Device to Device architecture), the Internet of Things, and vehicular ad hoc networks. However, the existing information exchange protocols only focus on either pairwise information exchange or group information exchange, and none of these protocols enable private and public information exchange to occur simultaneously. Thus, a general secure information exchange protocol for a multiuser channel is desirable. With this motivation, this paper investigates simulta
APA, Harvard, Vancouver, ISO, and other styles
18

Yang, Ming-Hour, Jia-Ning Luo, Murugesan Vijayalakshmi, and Selvaraj Mercy Shalinie. "Contactless Credit Cards Payment Fraud Protection by Ambient Authentication." Sensors 22, no. 5 (2022): 1989. http://dx.doi.org/10.3390/s22051989.

Full text
Abstract:
In recent years, improvements to the computational ability of mobile phones and support for near-field-communication have enabled transactions to be performed by using mobile phones to emulate a credit card or by using quick response codes. Thus, users need not carry credit cards but can simply use their mobile phones. However, the Europay MasterCard Visa (EMV) protocol is associated with a number of security concerns. In contactless transactions, attackers can make purchases by launching a relay attack from a distance. To protect message transmission and prevent relay attacks, we propose a tr
APA, Harvard, Vancouver, ISO, and other styles
19

Azeem, Abdul, Majid Jamil, Shamimul Qamar, Hasmat Malik, and Rayees Ahmad Thokar. "Design of Hardware Setup Based on IEC 61850 Communication Protocol for Detection & Blocking of Harmonics in Power Transformer." Energies 14, no. 24 (2021): 8284. http://dx.doi.org/10.3390/en14248284.

Full text
Abstract:
In this paper, the authors have developed a hardware model for blocking even and odd harmonics of a power transformer. In the proposed hardware model, intelligent differential & over-current relays are used for the blocking of harmonics of a power transformer. The harmonic restraint function on the differential relay (7UT61) prevents the relay from tripping during transformer magnetizing inrush current. However, the over-current relays which are used for back up protection does not have a harmonic restraint element, and over-current relay trips due to magnetizing inrush current, causes unw
APA, Harvard, Vancouver, ISO, and other styles
20

Zhou, Yongqiang, Huan Qian, Qihao Wang, and Suoping Li. "Performance Modeling Analysis of D-MSMR-CARQ with Relay Selection in Wireless Sensor Networks." Security and Communication Networks 2021 (July 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/5533926.

Full text
Abstract:
Reliable and efficient real-time transmission is an important and challenging issue for wireless sensor networks (WSNs). Truncated retransmission times and relay selection can effectively reduce transmission delay and improve system throughput. A new direct multisource multirelay cooperative automatic repeat request (D-MSMR-CARQ) protocol based on truncation with two relay selection methods in WSNs is analytically analyzed in this paper. Firstly, based on two different relay selection methods under the maximum ratio combining (MRC), the discrete time Markov chain (DTMC) model of D-MSMR-CARQ pr
APA, Harvard, Vancouver, ISO, and other styles
21

Ojo, Festus K., Bidemi Olajide, Damilare O. Akande, and Olasunkanmi F. Oseni. "Performance Evaluation of a Wireless Cooperative Network with Maximal Ratio Combining Technique." FUOYE Journal of Engineering and Technology 7, no. 2 (2022): 169–73. http://dx.doi.org/10.46792/fuoyejet.v7i2.792.

Full text
Abstract:
Research on wireless communication is on the rise due to its capability in improving communication in terms of spectrum efficiency, power and communication reliability. In wireless network, power is consumed mostly in the process of data transmission, hence, the need for cooperative relay protocol and technique to improve systems’ performance through power management and quality of service (QoS). Although, there are various cooperative protocols which include: amplify-and-forward, decode-and-forward among others. However, by using these cooperative protocols, the amount of power consumed and Q
APA, Harvard, Vancouver, ISO, and other styles
22

Katsavos, Panagiotis, and Vijay Varadharajan. "Security protocol for Frame Relay." ACM SIGCOMM Computer Communication Review 23, no. 5 (1993): 17–35. http://dx.doi.org/10.1145/165611.165614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Abrar, Muhammad, Xiang Gui, and Amal Punchihewa. "Two-Way Relaying Cooperative Wireless Networks: Resource Allocation and Performance Analysis." International Journal of Electronics and Telecommunications 59, no. 3 (2013): 229–35. http://dx.doi.org/10.2478/eletel-2013-0027.

Full text
Abstract:
Abstract Relay-based cooperative wireless networks have been widely considered one of the cost-effective solutions to meet the demands in future wireless networks. In order to maximize the overall sum-rate while maintaining proportional fairness among users, we investigate different resource allocation algorithms in two-way relay networks with analog network coding (ANC) protocol and time division broadcast (TDBC) protocol. The algorithms investigated are different from traditional proportional fairness schemes in terms of fairness and computational complexity as we have applied Access Proport
APA, Harvard, Vancouver, ISO, and other styles
24

Kumar, Nagesh, Yashwant Singh, and Pradeep Kumar Singh. "An Energy Efficient Trust Aware Opportunistic Routing Protocol for Wireless Sensor Network." International Journal of Information System Modeling and Design 8, no. 2 (2017): 30–44. http://dx.doi.org/10.4018/ijismd.2017040102.

Full text
Abstract:
As the wireless sensor networks (WSN) are gaining popularity the need of reliable delivery of data packets becomes more important. The reliable delivery is only possible when the routing protocols are efficient and secure. Because of lack of resources it is not possible to use existing cryptosystems to provide security in WSN. But, trust aware routing can provide the security with lesser resources, which become popular in last three to four years. In this paper, a new energy efficient and trust aware reliable opportunistic routing (TAEROR) protocol is proposed. The protocol consists of a trust
APA, Harvard, Vancouver, ISO, and other styles
25

Duo, Bin, Zhen Yong Wang, and Xue Mai Gu. "Cooperative Partial Message Relaying Based on Distributed Polar Codes for the Two-Relay Network." Applied Mechanics and Materials 303-306 (February 2013): 1974–83. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.1974.

Full text
Abstract:
A cooperative partial message relaying (CPMR) scheme based on distributed polar codes (DPC) is proposed to achieve the maximal decode-and-forward (DF) rate of the stochastically degraded symmetric binary-input two-relay network with orthogonal receiver components (TRN-ORCs). In the proposed scheme, the code design problem of the degraded TRN-ORCs is transformed into a problem of polar codes with CPMR protocol. According to the nested structure of polar codes, the messages transmitted by the source and the first relay are recovered successfully at the two relays, respectively, and then the two
APA, Harvard, Vancouver, ISO, and other styles
26

Perumal, Madhumathy, and Sivakumar Dhandapani. "Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks." Scientific World Journal 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/495945.

Full text
Abstract:
Data gathering and optimal path selection for wireless sensor networks (WSN) using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS). This protocol finds the rendezv
APA, Harvard, Vancouver, ISO, and other styles
27

Hwang, Kyu-Sung. "Performance Analysis of Secrecy Outage Probability for AF-Based Partial Relay Selection with Outdated Channel Estimates." Mobile Information Systems 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/7461803.

Full text
Abstract:
We study the secrecy outage probability of the amplify-and-forward (AF) relaying protocol, which consists of one source, one destination, multiple relays, and multiple eavesdroppers. In this system, the aim is to transmit the confidential messages from a source to a destination via the selected relay in presence of eavesdroppers. Moreover, partial relay selection scheme is utilized for relay selection based on outdated channel state information where only neighboring channel information (source-relays) is available and passive eavesdroppers are considered where a transmitter does not have any
APA, Harvard, Vancouver, ISO, and other styles
28

Sarella, Venkata Ramana, P. V. G. D. Prasad Reddy, S. Krishna Rao, and Preethi Padala. "EEECARP." Journal of Global Information Management 25, no. 4 (2017): 125–38. http://dx.doi.org/10.4018/jgim.2017100108.

Full text
Abstract:
WSN is a promising approach for variety of different real time applications. Different Routing protocols for WSNs are very effective challenge in present days because of scalability, efficient energy utilization and robustness in large number of wireless sensor networks with consists of more number of sensor nodes. LEATCH is a traditional routing protocol for energy optimization in WSNs. However, LEATCH cannot scale performance for large scale wireless sensor networks and difficulty to apply effective utilization of real time wireless sensor networks. So, in this paper the authors propose to d
APA, Harvard, Vancouver, ISO, and other styles
29

Tran, Thanh-Nam, and Miroslav Voznak. "HD/FD and DF/AF with Fixed-Gain or Variable-Gain Protocol Switching Mechanism over Cooperative NOMA for Green-Wireless Networks." Sensors 19, no. 8 (2019): 1845. http://dx.doi.org/10.3390/s19081845.

Full text
Abstract:
This article studied the application of multiple protocol switching mechanism (PSM) over cooperating Non-Orthogonal Multiple Access (NOMA) networks to minimize the probability of outage and maximize the system throughput and energy efficiency (EE). This study investigated six scenarios: (1) a cooperative NOMA system with half-duplex (HD) and decode-and-forward (DF) protocols at the relay; (2) a cooperative NOMA system with full-duplex (FD) and DF protocols at the relay; (3) a cooperative NOMA system with HD and amplification amplify-and-forward (AF) with fixed-gain (FG) protocols at the relay;
APA, Harvard, Vancouver, ISO, and other styles
30

Lasiyono, M. Munawir. "Setting Relai Differensial Pada Transformator Daya 150kv Gardu Induk Pondok Indah Menggunakan Protocol Communications Modbus." ETNIK: Jurnal Ekonomi dan Teknik 1, no. 3 (2021): 204–13. http://dx.doi.org/10.54543/etnik.v1i3.25.

Full text
Abstract:
Transformers in power systems require different types of protection.This protection is provided by various types of relays, bothelectromagnetic and static. In general, transformer protection servesto protect the transformer in the event of a disturbance, so that thetransformer can be avoided from damage. The relay that will be usedto protect the transformer is a differential relay. This relay workswhen there is a difference in the current of the Current Transformer[CT] on the primary and secondary sides. If the fault occurs outsidethe protection zone, the relay will not work. The method used i
APA, Harvard, Vancouver, ISO, and other styles
31

Alrfaay, M., A. K. Ali, S. Chaoui, H. Lenando, and S. Alanazi. "R-SOR: Ranked Social-based Routing Protocol in Opportunistic Mobile Social Networks." Engineering, Technology & Applied Science Research 12, no. 1 (2022): 7998–8006. http://dx.doi.org/10.48084/etasr.4612.

Full text
Abstract:
Exploiting social information to improve routing performance is an increasing trend in Opportunistic Mobile Social Networks (OMSNs). Selecting the next message’s relay node based on the user’s social behavior is a critical factor in attaining a high delivery rate. So, to ascertain the most efficient selection of the next relay, the correlation between daily social activities and the social characteristics in the user profiles can be exploited. In this paper, we consider the impact of the social characteristics on mobile user activities during certain periods of the day and then rank these char
APA, Harvard, Vancouver, ISO, and other styles
32

Paul, Sumit, Md Javed Hossain, and Abul Kalam Azad. "An Energy Efficient and Cooperative Congestion Control Protocol in MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 9 (2012): 3004–14. http://dx.doi.org/10.24297/ijct.v11i9.3413.

Full text
Abstract:
MANET is collection of mobile devices form a self-creating, self-organizing and self-administering wireless networks. Due to mobility of nodes it is not possible to establish fixed paths for message delivery through the network. Hence, congestion is happening and it is the key problem for MANET. Many routing protocols have been proposed to overcome the congestion in MANET. One of the popular routing protocol is AODV, but it depends on individual receivers to detect congestion and adjust their receiving rates. Another common routing protocol is EERCCP, which is better than AODV but sometimes it
APA, Harvard, Vancouver, ISO, and other styles
33

Luo, Chunbo, Gerard Parr, Sally I. McClean, Cathryn Peoples, and Xinheng Wang. "Hybrid Demodulate-Forward Relay Protocol for Two-Way Relay Channels." IEEE Transactions on Wireless Communications 14, no. 8 (2015): 4328–41. http://dx.doi.org/10.1109/twc.2015.2419627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Song, Chuanwang, Haisong Zhang, Yuming Li, Hao Zhang, Enyu Li, and Keyong Hu. "Outage Performance Analysis of CR-NOMA Based on Incremental Relay." Wireless Communications and Mobile Computing 2022 (October 10, 2022): 1–15. http://dx.doi.org/10.1155/2022/3786839.

Full text
Abstract:
Considering the problem of limited spectrum and relay resources, we proposed a scheme using incremental relay protocol to improve the secondary network outage performance. Firstly, a CR-NOMA network system model combined with incremental relay protocol is constructed. The primary network and the secondary network share the same relay for communication. When the user of the secondary network fails to receive information, the node closest to the shared relay is selected as an incremental relay to assist transmission. Secondly, the exact expressions of outage probability and throughput are derive
APA, Harvard, Vancouver, ISO, and other styles
35

Kim, Kihyun, and Sunmyeng Kim. "Cross Layer Based Cooperative Communication Protocol for Improving Network Performance in Underwater Sensor Networks." International Journal of Engineering and Technology Innovation 10, no. 3 (2020): 200–210. http://dx.doi.org/10.46604/ijeti.2020.5327.

Full text
Abstract:
For underwater sensor networks (USNs), cooperative communications have been introduced to improve network performance with the help of relay nodes. The previous cooperative communications select the best relay node on a hop-by-hop basis. Therefore, they have limitations in improving performance. In order to get better performance, a cooperative communication protocol based on the cross layer is proposed in this paper. The proposed protocol uses the information provided by a routing protocol at the network layer for the erroneous data packet delivery. It selects one with the minimum routing cos
APA, Harvard, Vancouver, ISO, and other styles
36

Shim, Kyuwook, and Hyung-Kun Park. "Priority-Based Pipelined-Forwarding MAC Protocol for EH-WSNs." Wireless Communications and Mobile Computing 2019 (May 14, 2019): 1–7. http://dx.doi.org/10.1155/2019/5418516.

Full text
Abstract:
To reduce the end-to-end delay in EH-WSNs (energy-harvesting wireless sensor networks), medium access control protocols using pipelined-forwarding have been introduced and studied. In real-life applications, there are several situations where it is difficult to harvest more energy than the energy consumed. Therefore, it is crucial to design a MAC protocol that allows nodes to efficiently relay data without exhausting the power in pipelined-forwarding multihop transmission. In this paper, we propose a PP-MAC (priority-based pipelined-forwarding MAC) protocol that determines the priority of rela
APA, Harvard, Vancouver, ISO, and other styles
37

Zhou, Yongqiang, Huan Qian, and Zhenggang Song. "Performance Modeling and Analysis of BASUR-CARQ Protocol Based on Interrelay Interference Cancellation." Wireless Communications and Mobile Computing 2023 (April 12, 2023): 1–11. http://dx.doi.org/10.1155/2023/2973709.

Full text
Abstract:
To recover the performance loss of nodes in half-duplex mode, this paper proposes a buffer-aided successive relay protocol based on cooperative automatic repeat request mechanism (BASUR-CARQ). Based on the fact that interrelay interference (IRI) will occur when relay nodes transmit or receive simultaneously, an interference cancellation operator is proposed to determine whether the interference is eliminated to reduce the outage probability. Moreover, a delay model for data frame transmission is proposed based on CARQ mechanism, and a closed-form expression for the average delay is derived. A
APA, Harvard, Vancouver, ISO, and other styles
38

Zhang, Chao Yi, and Yan Dong Zhao. "Multi-Path Relay Selection Based on Radio and Television Business." Advanced Materials Research 756-759 (September 2013): 1883–88. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1883.

Full text
Abstract:
This paper presents a relay selection method for radio and television business, this method uses nodes time-delay and power information, obtains the value of network interrupt as decision threshold, then selects the relay node. At same time this paper proposes an optimal relay selection strategy which can minimize the network interrupt probability combination with power distributionMulti-Path Relay Routing Protocol, this protocol can change the appropriate route path according to the dynamic network. Simulation results show that this protocol can extend cells coverage area, reduce time-delay a
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Weipeng, Jihong Zhao, and Hua Qu. "Outage Probability Analysis for Two-Way Amplify-and-Forward Mobile Relay Assisted Device-to-Device Communication in Rayleigh Fading Channel." Journal of Physics: Conference Series 2218, no. 1 (2022): 012005. http://dx.doi.org/10.1088/1742-6596/2218/1/012005.

Full text
Abstract:
Abstract Device-to-Device (D2D) communication underlaying cellular network is potential to enhance the spectral efficiency, reduce the energy consumption and improve individual quality-of-service (QoS) experience. But intra-cell orthogonality is impaired due to spectral reusing and severe co-channel interference could be imposed between cellular and D2D links. Besides, the direct links between local communicating pairs may be unfavorable and suffer an unsatisfied QoS experience since the randomness of channel condition. So, we are focused on analyzing the outage probability of D2D links assist
APA, Harvard, Vancouver, ISO, and other styles
40

KMurthy, Jayanthi, and Sambasiva Rao V. "Relay based Clustering Protocol for WSN." International Journal of Computer Applications 68, no. 16 (2013): 7–10. http://dx.doi.org/10.5120/11661-7243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Lee, Sangku, Janghyuk Youn, and Bang Chul Jung. "Hybrid AF/DF Cooperative Relaying Technique with Phase Steering for Industrial IoT Networks." Energies 14, no. 4 (2021): 937. http://dx.doi.org/10.3390/en14040937.

Full text
Abstract:
For the next generation of manufacturing, the industrial internet of things (IoT) has been considered as a key technology that enables smart factories, in which sensors transfer measured data, actuators are controlled, and systems are connected wirelessly. In particular, the wireless sensor network (WSN) needs to operate with low cost, low power (energy), and narrow spectrum, which are the most technical challenges for industrial IoT networks. In general, a relay-assisted communication network has been known to overcome scarce energy problems, and a spectrum-sharing technique has been consider
APA, Harvard, Vancouver, ISO, and other styles
42

Alkhayyat, Ahmed, Orhan Gazi, and Sattar B. Sadkhan. "The Role of Delay and Connectivity in Throughput Reduction of Cooperative Decentralized Wireless Networks." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/294016.

Full text
Abstract:
We proposed a multiple relay selection protocol for decentralized wireless networks. The proposed relays selection protocol aims to address three issues: (1) selecting relays within the coverage area of the source and destination to ensure that the relays are positioned one hop away from the destination, (2) ensuring that the best node (best relays with less distance and attenuation from the destination) access the channel first, and (3) ensuring that the proposed relays selection is collision-free. Our analysis also considers three important characteristics of decentralized wireless networks
APA, Harvard, Vancouver, ISO, and other styles
43

Rao, Wen Yuan. "On Performance of Combining Methods for Three-Node Relay Network." Applied Mechanics and Materials 263-266 (December 2012): 1160–64. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1160.

Full text
Abstract:
We study the performance of the three-node relay network. Three combining methods for the Amplify-and-Forward (AF) protocol and the Decode-and-Forward (DF) protocol are compared. Simulations indicate that the AF protocol is better than DF under all these three combining methods. To combine the incoming signals the channel quality should be estimated as accuracy as possible, more estimation accuracy requires more resource. A very simple combining method can obtain the performance comparative with optimal combining methods approximately. At the same time, all three combining methods for both div
APA, Harvard, Vancouver, ISO, and other styles
44

Press, Rifqah, and Vipin Balyan. "Outage probability for a multiuser NOMA-based network using energy harvesting relays." Nonlinear Engineering 11, no. 1 (2022): 672–79. http://dx.doi.org/10.1515/nleng-2022-0240.

Full text
Abstract:
Abstract This article evaluates the energy-harvesting capabilities of a multiuser non-orthogonal multiple access-based system, where energy harvesting relays utilise the power splitting relaying protocol to harvest energy and amplify-and-forward protocol to forward the signals to the connected users. The expressions for each user’s energy harvesting outage probability are calculated and compared to the same system model without energy harvesting. Simulation results show the effectiveness of the energy-harvesting relay nodes and the improved outage probability of each user.
APA, Harvard, Vancouver, ISO, and other styles
45

Chaoui, Slim, Omar Alruwaili, Chafaa Hamrouni, Aarif Alutaybi, and Afif Masmoudi. "On the Performance of Coded Cooperative Communication with Multiple Energy-Harvesting Relays and Error-Prone Forwarding." Applied Sciences 13, no. 5 (2023): 2910. http://dx.doi.org/10.3390/app13052910.

Full text
Abstract:
In this paper, we consider a coded cooperative communication network with multiple energy-harvesting (EH) relays. In order to adequately address the problem of error propagation due to the erroneous decoding at the relays, as in the case of conventional decode and forward (DF) relaying protocol, we propose coded cooperative schemes with hard information relaying (HIR) and soft information relaying (SIR) strategies. The performance of the relayed communication with EH relay depends crucially on the channel decoding capability at the relay, channel gains at the source–relay and relay–destination
APA, Harvard, Vancouver, ISO, and other styles
46

CARTIGNY, JULIEN, FRANÇOIS INGELREST, and DAVID SIMPLOT. "RNG RELAY SUBSET FLOODING PROTOCOLS IN MOBILE AD-HOC NETWORKS." International Journal of Foundations of Computer Science 14, no. 02 (2003): 253–65. http://dx.doi.org/10.1142/s0129054103001716.

Full text
Abstract:
In this paper, we study broadcasting protocols where nodes use some of their neighbors to forward messages. We propose a new protocol based on a variant of neighbor elimination scheme using RNG graph to ensure a full coverage of the network. The computation of RNG uses two kinds of distance: a geometrical one and and neighborhood-based distance that permits to use our protocol without positioning system. This protocol, called RRS for RNG Relay Subset, provides a self-selecting forwarding neighbor operating mode which guarantees a fair broadcast loading. In RRS a node v is a relay for a node u
APA, Harvard, Vancouver, ISO, and other styles
47

He, Yixin, Daosen Zhai, Dawei Wang, Xiao Tang, and Ruonan Zhang. "A Relay Selection Protocol for UAV-Assisted VANETs." Applied Sciences 10, no. 23 (2020): 8762. http://dx.doi.org/10.3390/app10238762.

Full text
Abstract:
In this paper, we investigate the relay selection problem for the unmanned aerial vehicle (UAV)-assisted vehicular ad-hoc networks (VANETs). For the considered network, we first model and analyze the link quality of service (LQoS) from the source node (SN) to the neighbor node and the node forward capacity (NFC) from the neighbor node to the destination node (DN). Then, the relay selection problem is formulated as a multi-objective optimization problem by jointly considering the LQoS and the NFC. Afterward, we decompose the problem into two subproblems and propose a relay selection protocol wi
APA, Harvard, Vancouver, ISO, and other styles
48

Zhang, Qin, Yikai Liu, Xiaosong Yu, Yongli Zhao, and Jie Zhang. "Topology-Abstraction-Based Protection Scheme in Quantum Key Distribution Networks with Partially Trusted Relays." Photonics 9, no. 4 (2022): 239. http://dx.doi.org/10.3390/photonics9040239.

Full text
Abstract:
Quantum key distribution (QKD) can protect the exchange process of confidential information between communicating parties. By using the basic principles of quantum mechanics and combined with “one-time pad” cipher encryption, information can be unconditionally secure. The BB84 protocol first describes the method of transmitting information by photon polarization state, and it expounds the transmission process of services between trusted relays. However, due to the defects of real experimental devices, there are security vulnerabilities in QKD in a real system. The birth of measurement-device-i
APA, Harvard, Vancouver, ISO, and other styles
49

Dao, Thu-Thuy Thi, and Pham Ngoc Son. "Cancel-Decode-Encode Processing on Two-Way Cooperative NOMA Schemes in Realistic Conditions." Wireless Communications and Mobile Computing 2021 (April 28, 2021): 1–15. http://dx.doi.org/10.1155/2021/8828443.

Full text
Abstract:
This paper considers the effects of perfect/imperfect successive interference cancellation (SIC) and perfect/imperfect ` information (CSI) in a multiple-relay two-way cooperative network using nonorthogonal multiple access (NOMA) and digital network coding (DNC). In this model, a relay is selected by maximizing estimated channel gains to enhance the decoding capacity of the nearer source and minimize the collection time of imperfect CSI. Spectrum utilization efficiency is enhanced two times by a mixture of the SIC and DNC techniques at the selected relay (called as the SIC-2TS protocol). The s
APA, Harvard, Vancouver, ISO, and other styles
50

Tan, Zhicheng, Yun Li, Haixin Sun, Shaohua Hong, and Shanlin Sun. "Ocean-Current-Motion-Model-Based Routing Protocol for Void-Avoided UASNs." Journal of Marine Science and Engineering 12, no. 4 (2024): 537. http://dx.doi.org/10.3390/jmse12040537.

Full text
Abstract:
An increasing number of scholars are researching underwater acoustic sensor networks (UASNs), including the physical layer, the protocols of the routing layer, the MAC layer, and the cross-layer. In UASNs, the ultimate goal is to transmit data from the seabed to the surface, and a well-performed routing protocol can effectively achieve this goal. However, the nodes in the network are prone to drift, and the topology is easily changed because of the movement caused by ocean currents, resulting in a routing void. The data cannot be effectively aggregated to the sink terminal on the surface. Thus
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!