Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University for Business and Technology in Kosovo (28)
- SelectedWorks (13)
- Singapore Management University (13)
- Selected Works (11)
- California Polytechnic State University, San Luis Obispo (9)
-
- California State University, San Bernardino (9)
- Technological University Dublin (9)
- University of Massachusetts Amherst (4)
- University of Nebraska - Lincoln (4)
- Old Dominion University (3)
- University of Arkansas, Fayetteville (3)
- University of Kentucky (3)
- DePaul University (2)
- Edith Cowan University (2)
- Governors State University (2)
- Tennessee State University (2)
- The University of Akron (2)
- The University of Maine (2)
- University of Pennsylvania Carey Law School (2)
- Western University (2)
- Air Force Institute of Technology (1)
- Georgia Southern University (1)
- Liberty University (1)
- Luther Seminary (1)
- Montclair State University (1)
- Southwestern Oklahoma State University (1)
- The University of San Francisco (1)
- The University of Southern Mississippi (1)
- Union College (1)
- United Arab Emirates University (1)
- Keyword
-
- Computer security (4)
- Editor (4)
- Routing (4)
- Table (4)
- Cloud computing (3)
-
- Contents (3)
- CubeSat (3)
- Internet (3)
- Open Orbiter Project (3)
- OpenOrbiter (3)
- Published Articles (3)
- Small Spacecraft (3)
- Technology (3)
- Android (2)
- Applied sciences (2)
- Big Data (2)
- Cyber security (2)
- Cybersecurity (2)
- Data (2)
- Detection (2)
- Education (2)
- Engineering, Industrial (2)
- Hackers (2)
- Information (2)
- Information security (2)
- Infrastructure (2)
- International (2)
- International Journal of Scientific Engineering and Technology (IJSET) (2)
- Journal (2)
- LTE (2)
- Publication
-
- UBT International Conference (28)
- Research Collection School Of Computing and Information Systems (12)
- Journal of International Technology and Information Management (8)
- The ITB Journal (8)
- Jeremy Straub (5)
-
- Computer Engineering (3)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (3)
- Electronic Theses and Dissertations (3)
- Masters Theses (3)
- Rana Asif Rehman (3)
- All Capstone Projects (2)
- All Faculty Scholarship (2)
- Computer Science Faculty Research (2)
- Computer Science Theses & Dissertations (2)
- Computer Science and Software Engineering (2)
- Doctoral Dissertations (2)
- Dr. Chen Ling (2)
- Electrical Engineering (2)
- Electronic Thesis and Dissertation Repository (2)
- Graduate Theses and Dissertations (2)
- Innovative Research Publications IRP India (2)
- Ivan M. Jorrín Abellán (2)
- Theses and Dissertations--Computer Science (2)
- Williams Honors College, Honors Research Projects (2)
- 2017 Academic High Altitude Conference (1)
- Amean S Al_Safi (1)
- Australian Digital Forensics Conference (1)
- Biology Faculty Publications (1)
- Carl Heine (1)
- Computer Science Faculty Publications (1)
- Publication Type
- File Type
Articles 91 - 120 of 145
Full-Text Articles in Computer Engineering
Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad
Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad
Dissertations
Abstract
Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical …
Pitch Detection Of Speech Signal Using Wavelet Transform, Innovative Research Publications Irp India, Amin Shadravan Lalezari, Jalil Shirazi
Pitch Detection Of Speech Signal Using Wavelet Transform, Innovative Research Publications Irp India, Amin Shadravan Lalezari, Jalil Shirazi
Innovative Research Publications IRP India
Pitch frequency is the fundamental frequency of a speech signal. It is one of the most important parameters for speech signal processing. The simulated results on Keele pitch reference database show that the performance of the proposed wavelet transform based pitch detection algorithm is obviously better than the original AMDF and its improvements based algorithms
Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr.
Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr.
Electronic Theses and Dissertations
The Federal Aviation Administration is in the process of replacing the current Air Traffic Management (ATM) system with a new system known as NextGen. Automatic Dependent Surveillance-Broadcast (ADS-B) is the aircraft surveillance protocol currently being introduced as a part of the NextGen system deployment. The evolution of ADS-B spans more than two decades, with development focused primarily on increasing the capacity of the Air Traffic Control (ATC) system and reducing operational costs. Security of the ADS-B communications network has not been a high priority, and the inherent lack of security measures in the ADS-B protocol has come under increasing scrutiny …
Vcare: A Personal Emergency Response System To Promote Safe And Independent Living Among Elders Staying By Themselves In Community Or Residential Settings, Priyankar Bhattacharjee
Vcare: A Personal Emergency Response System To Promote Safe And Independent Living Among Elders Staying By Themselves In Community Or Residential Settings, Priyankar Bhattacharjee
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
‘Population aging’ is a growing concern for most of us living in the twenty first century, primarily because many of us in the next few years will have a senior person to care for - spending money towards their healthcare expenditures AND/OR having to balance a full-time job with the responsibility of care-giving, travelling from another city to be with this elderly citizen who might be our parent, grand-parent or even community elders. As informal care-givers, if somehow we were able to monitor the day-to-day activities of our elderly dependents, and be alerted when wrong happens to them that would …
Design, Programming, And User-Experience, Kaila G. Manca
Design, Programming, And User-Experience, Kaila G. Manca
Honors Scholar Theses
This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.
I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.
The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …
Tweetement: Pseudo-Relevance Feedback For Twitter Search, Kanatbay Bektemirov
Tweetement: Pseudo-Relevance Feedback For Twitter Search, Kanatbay Bektemirov
Computer Science and Computer Engineering Undergraduate Honors Theses
Microblogging platforms such as Twitter let users communicate with short messages. Due to the messages’ short content and the users’ tendency to type short queries while searching, it is particularly challenging to locate useful tweets that match user queries. The fundamental problems of word mismatch due to ambiguity are especially acute. To solve this problem, this thesis explores and compares multiple automatic query expansion methods that involve the most frequent hashtags and keywords. We built a Web service that provides real-time Twitter Search results incorporating automatic query expansion. Six pseudo-relevance feedback methods were studied and the numbers indicate that results …
Ambient Rendezvous: Energy Efficient Neighbor Discovery Via Acoustic Sensing, Keyu Wang, Zheng Yang, Zimu Zhou, Yunhao Liu, Lionel M. Ni
Ambient Rendezvous: Energy Efficient Neighbor Discovery Via Acoustic Sensing, Keyu Wang, Zheng Yang, Zimu Zhou, Yunhao Liu, Lionel M. Ni
Research Collection School Of Computing and Information Systems
The continual proliferation of mobile devices has stimulated the development of opportunistic encounter-based networking and has spurred a myriad of proximity-based mobile applications. A primary cornerstone of such applications is to discover neighboring devices effectively and efficiently. Despite extensive protocol optimization, current neighbor discovery modalities mainly rely on radio interfaces, whose energy and wake up delay required to initiate, configure and operate these protocols hamper practical applicability. Unlike conventional schemes that actively emit radio tones, we exploit ubiquitous audio events to discover neighbors passively. The rationale is that spatially adjacent neighbors tend to share similar ambient acoustic environments. We propose …
Phaseu: Real-Time Los Identification With Wifi, Chenshu Wu, Zheng Yang, Zimu Zhou, Kun Qian, Yunhao Liu, Mingyan Liu
Phaseu: Real-Time Los Identification With Wifi, Chenshu Wu, Zheng Yang, Zimu Zhou, Kun Qian, Yunhao Liu, Mingyan Liu
Research Collection School Of Computing and Information Systems
WiFi technology has fostered numerous mobile computing applications, such as adaptive communication, finegrained localization, gesture recognition, etc., which often achieve better performance or rely on the availability of Line-Of-Sight (LOS) signal propagation. Thus the awareness of LOS and NonLine-Of-Sight (NLOS) plays as a key enabler for them. Realtime LOS identification on commodity WiFi devices, however, is challenging due to limited bandwidth of WiFi and resulting coarse multipath resolution. In this work, we explore and exploit the phase feature of PHY layer information, harnessing both space diversity with antenna elements and frequency diversity with OFDM subcarriers. On this basis, we propose …
Matchmaking Game Players On Public Transport, Nairan Zhang, Youngki Lee, Rajesh Krishna Balan
Matchmaking Game Players On Public Transport, Nairan Zhang, Youngki Lee, Rajesh Krishna Balan
Research Collection School Of Computing and Information Systems
This paper extends our recent work, called GameOn, which presented a system for allowing public transport commuters to engage in multiplayer games with fellow commuters traveling on the same bus or train. An important challenge for GameOn is to group players with reliable connections into the same game. In this case, the meaning of reliability has two dimensions. First, the network connectivity (TCP, UDP etc.) should be robust. Second, the players should be collocated with each other for a sufficiently long duration so that a game session will not be terminated by players leaving the public transport modality such as …
Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo
Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo
All Faculty Scholarship
The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.
Advanced Compression And Latency Reduction Techniques Over Data Networks, Fuad Shamieh
Advanced Compression And Latency Reduction Techniques Over Data Networks, Fuad Shamieh
Electronic Thesis and Dissertation Repository
Applications and services operating over Internet protocol (IP) networks often suffer from high latency and packet loss rates. These problems are attributed to data congestion resulting from the lack of network resources available to support the demand. The usage of IP networks is not only increasing, but very dynamic as well. In order to alleviate the above-mentioned problems and to maintain a reasonable Quality of Service (QoS) for the end users, two novel adaptive compression techniques are proposed to reduce packets’ payload size. The proposed schemes exploit lossless compression algorithms to perform the compression process on the packets’ payloads and …
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Information Science Faculty Publications
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …
Diversified Users' Satisfaction With Advanced Mobile Phone Features, Chen Ling, Wonil Hwang, Gavriel Salvendy
Diversified Users' Satisfaction With Advanced Mobile Phone Features, Chen Ling, Wonil Hwang, Gavriel Salvendy
Dr. Chen Ling
Mobile phones are widely used all over the world, and with their increasing number of value-added features, they are becoming far more than a mere mobile voice communication device. Rather, they provide a powerful platform for accessing information universally. This paper reports a study which scrutinized users’ preference levels with five new mobile phone design features facilitating universal information access through mobile phones: camera, colour screen, voice-activated dialing, Internet browsing, and wireless connectivity (e.g. Bluetooth, infrared, etc.). The survey study involved college students and investigated the degree to which each of the above features impacts the users’ overall satisfaction and …
Effect Of Glance Duration On Perceived Complexity And Segmentation Of User Interfaces, Yifei Dong, Chen Ling, Lesheng Hua
Effect Of Glance Duration On Perceived Complexity And Segmentation Of User Interfaces, Yifei Dong, Chen Ling, Lesheng Hua
Dr. Chen Ling
Computer users who handle complex tasks like air traffic control (ATC) need to quickly detect updated information from multiple displays of graphical user interface. The objectives of this study are to investigate how much computer users can segment GUI display into distinctive objects within very short glances and whether human perceives complexity differently after different durations of exposure. Subjects in this empirical study were presented with 20 screenshots of web pages and software interfaces for different short durations (100ms, 500ms, 1000ms) and were asked to recall the visual objects and rate the complexity of the images. The results indicate that …
A Software Defined Radio Communications System For A Small Spacecraft, Michael Hlas, Jeremy Straub, Ronald Marsh
A Software Defined Radio Communications System For A Small Spacecraft, Michael Hlas, Jeremy Straub, Ronald Marsh
Jeremy Straub
Software defined radios (SDRs) are poised to significantly enhance the future of small spacecraft communications. They allow signal processing to be performed on a computer by software rather than requiring dedicated hardware. The OpenOrbiter SDR (discussed in [1] and refined in [2]) takes data from the flight computer and converts it into an analog signal that is transmitted via the spacecraft antenna. Because the signal processing is done in software, the radio can be easily reconfigured. This process is done in reverse for incoming transmissions, which are received by the SDR and decoded by software. Figures 1 and 2 provide …
Creating A Low-Cost Radio For An Open Cubesat, Michael Wegerson, Jeremy Straub, Ronald Marsh
Creating A Low-Cost Radio For An Open Cubesat, Michael Wegerson, Jeremy Straub, Ronald Marsh
Jeremy Straub
A reliable communication system is key to the success of a CubeSat mission, allowing for data to be trans-mitted to the ground station and commands to be up-loaded to the satellite. To satisfy this need, the OpenOrbiter satellite (a 1-U CubeSat [1], being devel-oped with a target parts budget of under $5,000 [2]) is leveraging previously space-tested [3], low-cost trans-ceiver design which is based on the SI 4463 IC unit. This board design will be included in the publically available Open Framework for Educational Nanosatel-lites (OPEN) allowing others to modify, enhance and/or make use of the design in the future.
Three-Dimensional Printing And Scanning Web-Based Job Management System, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin
Three-Dimensional Printing And Scanning Web-Based Job Management System, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin
Jeremy Straub
Three-dimensional (3D) printers have gained popularity for use for many different projects. The work presented herein aims to make this process simpler. This poster discusses a system that will allow individuals from all over campus to submit object files for printing, without having to schedule appointments and schedule 3D scanning appointments and retrieve scan results.
Cumulonimbus Computing Concerns: Information Security In Public, Private, And Hybrid Cloud Computing, Daniel Adams
Cumulonimbus Computing Concerns: Information Security In Public, Private, And Hybrid Cloud Computing, Daniel Adams
Senior Honors Theses
Companies of all sizes operating in all markets are moving toward cloud computing for greater flexibility, efficiency, and cost savings. The decision of how to adopt the cloud is a question of major security concern due to the fact that control is relinquished over certain portions of the IT ecosystem. This thesis presents the position that the main security decision in moving to cloud computing is choosing which type of cloud to employ for each portion of the network – the hybrid cloud approach. Vulnerabilities that exist on a public cloud will be explored, and recommendations on decision factors will …
Youth And The Posthuman: Personhood, Transcendence, And Siri, Erik Leafblad, Andrew Root
Youth And The Posthuman: Personhood, Transcendence, And Siri, Erik Leafblad, Andrew Root
Faculty Publications
When everything gets turned into a technology, and existence is about practical mastery, the mystery of being is buried and everything is made an object, blurring the lines between human personhood and other technological objects.
Exploring Discriminative Features For Anomaly Detection In Public Spaces, Shriguru Nayak, Archan Misra, Kasthuri Jeyarajah, Philips Kokoh Prasetyo, Ee-Peng Lim
Exploring Discriminative Features For Anomaly Detection In Public Spaces, Shriguru Nayak, Archan Misra, Kasthuri Jeyarajah, Philips Kokoh Prasetyo, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
Context data, collected either from mobile devices or from user-generated social media content, can help identify abnormal behavioural patterns in public spaces (e.g., shopping malls, college campuses or downtown city areas). Spatiotemporal analysis of such data streams provides a compelling new approach towards automatically creating real-time urban situational awareness, especially about events that are unanticipated or that evolve very rapidly. In this work, we use real-life datasets collected via SMU's LiveLabs testbed or via SMU's Palanteer software, to explore various discriminative features (both spatial and temporal - e.g., occupancy volumes, rate of change in topic{specific tweets or probabilistic distribution of …
Remote Mobile Screen (Rms): An Approach For Secure Byod Environments, Santiago Manuel Gimenez Ocano
Remote Mobile Screen (Rms): An Approach For Secure Byod Environments, Santiago Manuel Gimenez Ocano
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Bring Your Own Device (BYOD) is a policy where employees use their own personal mobile devices to perform work-related tasks. Enterprises reduce their costs since they do not have to purchase and provide support for the mobile devices. BYOD increases job satisfaction and productivity in the employees, as they can choose which device to use and do not need to carry two or more devices.
However, BYOD policies create an insecure environment, as the corporate network is extended and it becomes harder to protect it from attacks. In this scenario, the corporate information can be leaked, personal and corporate spaces …
Crowdsourced Earthquake Early Warning, Sarah Minson, Benjamin Brooks, Craig Glennie, Jessica Murray, John Langbein, Susan Owen, Thomas Heaton, Robert Iannucci, Darren Hauser
Crowdsourced Earthquake Early Warning, Sarah Minson, Benjamin Brooks, Craig Glennie, Jessica Murray, John Langbein, Susan Owen, Thomas Heaton, Robert Iannucci, Darren Hauser
Robert A Iannucci
Earthquake early warning (EEW) can reduce harm to people and infrastructure from earthquakes and tsunamis, but it has not been implemented in most high earthquake-risk regions because of prohibitive cost. Common consumer devices such as smartphones contain low-cost versions of the sensors used in EEW. Although less accurate than scientific-grade instruments, these sensors are globally ubiquitous. Through controlled tests of consumer devices, simulation of an Mw (moment magnitude) 7 earthquake on California’s Hayward fault, and real data from the Mw 9 Tohoku-oki earthquake, we demonstrate that EEW could be achieved via crowdsourcing.
Cybersecurity In The Information Age
Cybersecurity In The Information Age
DePaul Magazine
According to the Identify Theft Resource Center, more than 750 breaches occurred in 2014, exposing more than 83 million records. Breaches occur because people have discovered that there’s money to be made from stealing corporate and customer information. Faced with this reality, consumers and companies may wonder if it’s possible to protect their personal and financial data. DePaul's College of Computing and Digital Media is training the next generation of cybersecurity experts to thwart cybersecurity attacks. In addition, DePaul faculty and alumni in data security offer advice to consumers on securing their financial and personal information.
Analysis Of A ‘Turn-Key’ No Hardware Space Mission Using The Orbital Services Model, Jeremy Straub
Analysis Of A ‘Turn-Key’ No Hardware Space Mission Using The Orbital Services Model, Jeremy Straub
Jeremy Straub
Many applications that would benefit from access to space cannot afford the cost of spacecraft development, launch and operations. Other operations require only a fraction of a spacecraft or complete use of a spacecraft for a limited period of time. This paper considers the value of a ‘turn-key’ style space mission. It considers what types of missions could be reasonably conducted using this approach. The economics of being a service provider are considered. Then, a prospective mission concept for one OSM ‘turn-key’ mission is presented. The value proposition of this mission is assessed and the hardware and other capabilities required …
Small Satellite Communications Security And Student Learning In The Development Of Ground Station Software, Scott Kerlin, Jeremy Straub, Jacob Huhn, Alexander Lewis
Small Satellite Communications Security And Student Learning In The Development Of Ground Station Software, Scott Kerlin, Jeremy Straub, Jacob Huhn, Alexander Lewis
Jeremy Straub
Communications security is gaining importance as small spacecraft include actuator capabilities (i.e., propulsion), payloads which could be misappropriated (i.e., high resolution cameras), and research missions with high value/cost. However, security is limited by capability, interoperability and regulation. Additionally, as the small satellite community becomes more mainstream and diverse, the lack of cheap, limited-to-no configuration, pluggable security modules for small satellites also presents a limit for user adoption of security.
This paper discusses a prospective approach for incorporating robust security into a student-developed ground station created at the University of North Dakota as part of a Computer Science Department senior design …
Csr: Small: Collaborative Research: Sane: Semantic-Aware Namespace In Exascale File Systems, Yifeng Zhu
Csr: Small: Collaborative Research: Sane: Semantic-Aware Namespace In Exascale File Systems, Yifeng Zhu
University of Maine Office of Research Administration: Grant Reports
Explosive growth in volume and complexity of data exacerbates the key challenge facing the management of massive data in a way that fundamentally improves the ease and efficacy of their usage. Exascale storage systems in general rely on hierarchically structured namespace that leads to severe performance bottlenecks and makes it hard to support real-time queries on multi-dimensional attributes. Thus, existing storage systems, characterized by the hierarchical directory tree structure, are not scalable in light of the explosive growth in both the volume and the complexity of data. As a result, directory-tree based hierarchical namespace has become restrictive, difficult to use, …
Analyzing WiFi P2p In The Context Of A Hangman Game, William L. Honig
Analyzing WiFi P2p In The Context Of A Hangman Game, William L. Honig
William L Honig
WiFi P2P , which complies with the WiFi Alliance's WiFi Direct™ certification
2 3
program, is a relatively new addition to wireless communications systems. It is now
supported in Android operating system (since version 4.0). In theory, WiFi Direct offers
advantages for ad hoc communications between mobile apps. A key goal of this project
was to evaluate the ability of WiFi P2P for interconnecting mobile apps by using a
common game suitable to mobile screens and devices.
The application allows the user to interconnect two devices using WiFi P2P and
play the classic hangman game. The players search for devices …
Design Of A Scalable Path Service For The Internet, Mehmet O. Ascigil
Design Of A Scalable Path Service For The Internet, Mehmet O. Ascigil
Theses and Dissertations--Computer Science
Despite the world-changing success of the Internet, shortcomings in its routing and forwarding system have become increasingly apparent. One symptom is an escalating tension between users and providers over the control of routing and forwarding of packets: providers understandably want to control use of their infrastructure, and users understandably want paths with sufficient quality-of-service (QoS) to improve the performance of their applications. As a result, users resort to various “hacks” such as sending traffic through intermediate end-systems, and the providers fight back with mechanisms to inspect and block such traffic.
To enable users and providers to jointly control routing and …
A Network Path Advising Service, Xiongqi Wu
A Network Path Advising Service, Xiongqi Wu
Theses and Dissertations--Computer Science
A common feature of emerging future Internet architectures is the ability for applications to select the path, or paths, their packets take between a source and destination. Unlike the current Internet architecture where routing protocols find a single (best) path between a source and destination, future Internet routing protocols will present applications with a set of paths and allow them to select the most appropriate path. Although this enables applications to be actively involved in the selection of the paths their packets travel, the huge number of potential paths and the need to know the current network conditions of each …
Enhanced Routing Protocol For Multihop Cognitive Radio Wireless Networks, Rana Asif Rehman, Chan-Min Park, Byung-Seo Kim
Enhanced Routing Protocol For Multihop Cognitive Radio Wireless Networks, Rana Asif Rehman, Chan-Min Park, Byung-Seo Kim
Rana Asif Rehman
Since multihop cognitive radio wireless networks are resource-constraint networks, there is a need of routing scheme that takes into account the parameters like channel information, node’s remaining energies, end-to-end latency etc., while performing routing process. In this paper, we have proposed a reliable and efficient routing scheme for multihop cognitive radio wireless networks. The proposed protocol is on-demand and reactive protocol that considers both delay and energy along the route. By using simulations, it shows that proposed scheme performs better as compared to other ones.