Secondary user transmission protection optimisation in sensing-transmission scheduling under varying channel noise in cognitive radio networks
Secondary user transmission maximisation and primary user contention minimisation are opposing targets with a constantly existing trade-off between them. A design that simultaneously prevents harmful interference caused to license possessing primary ...
Avoidance of the energy hole in wireless sensor networks using a layered-based routing tree
Prolonging the network lifetime is one of the main challenges in wireless sensor networks WSNs. This paper proposes a layered-based routing tree called LBRT that solves the energy holes in WSNs. It uses several layers in a ring network in a way that ...
A fuzzy logic-based clustering algorithm for network optimisation
Rate of occurrence of high-dimensional data is much higher and sad to relate, classical clustering techniques do not hold good for such high-dimensional networks of arbitrary shapes in the underwater wireless sensor network. This is mainly due to the ...
Stability analysis of non-smooth optimisation-based controller design for CSTR using Kharitonov theorem
The paper presents the application of numerical solver H-infinity fixed order optimisation HIFOO, for structured and fixed-order controller design to a feedback linearised continuous stirred tank reactor CSTR. This solver constitutes a practical ...
Design of variable structure control for wind energy system-based permanent magnet synchronous generator and operating under different grid conditions
This paper proposes a nonlinear control approach for an electrical network connected variable speed wind energy system VS-WES based on a permanent magnet synchronous generator PMSG. The proposed configuration consists of a wind turbine WT, a direct ...
Efficient key mechanism and reduced cipher text technique for secured data communication
According to the worldwide integration, when it is preferred to broadcast superfluous data over a bandwidth controlled channel then dimension of data transmitted becomes as imperative as security of that data. Keeping this view we have tailored the ...