American Journal of Networks and Communications

Volume 2, Issue 3, June 2013

  • Performance Evaluation of Cooperative ML-IDMA Communications with DF Protocols

    Basma A. Mahmoud, Esam A. A. Hagras, Mohamed A. Abo El-Dhab

    Issue: Volume 2, Issue 3, June 2013
    Pages: 56-61
    Received: Apr. 23, 2013
    Accepted:
    Published: Jun. 10, 2013
    Downloads:
    Views:
    Abstract: Relaying and cooperative diversity allow multiple wireless radios to effectively share their antennas and create a virtual antenna array, thereby leveraging the spatial diversity benefits of multiple-input multiple-output antenna systems. In this paper, we consider the bit error rate performance analysis of a cooperative relay communication system ... Show More
  • Textual Based Retrieval System with Bloom in Unstructured Peer-to-Peer Networks

    E. Mohan, S. Uvaraj, S. Suresh, U. Helen Monisha, N. Kannaiya Raja

    Issue: Volume 2, Issue 3, June 2013
    Pages: 62-66
    Received: May 11, 2013
    Accepted:
    Published: Jun. 20, 2013
    Downloads:
    Views:
    Abstract: P2P network is the best and popular network sharing of contents by the user through internet. Bloom Cast is an efficient technique used for full-text retrieval scheme in unstructured P2P networks. By using the fullest of a hybrid P2P protocol, Bloom Cast makes copies of the contents in the network uniformly at a random across the P2P networks in or... Show More
  • Authority System to Prevent Privacy Protection in Peer-to-Peer Network System

    S. Uvaraj, N. Kannaiya Raja

    Issue: Volume 2, Issue 3, June 2013
    Pages: 67-72
    Received: Jun. 04, 2013
    Accepted:
    Published: Jun. 20, 2013
    Downloads:
    Views:
    Abstract: Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. We proposed a proactive content poisoning sc... Show More
  • Simulation and Evaluation of WIMAX Handover over Homogeneous and Heterogeneous Networks

    Anmar Hamid Hameed, Salama A. Mostafa, Mazin Abed Mohammed

    Issue: Volume 2, Issue 3, June 2013
    Pages: 73-80
    Received: May 11, 2013
    Accepted:
    Published: Jun. 30, 2013
    Downloads:
    Views:
    Abstract: Different aspects of wireless networks are changing as a result of the continuous needs in terms of speed, data rates and quality of service. Such aspects are required to be adaptable within the same network or among networks of different technologies and service providers. Consequently, Worldwide Interoperability for Microwave Access (WiMAX) is on... Show More
  • AquaMesh - Design and Implementation of Smart Wireless Mesh Sensor Networks for Aquaculture

    Adinya John Odey, Li Daoliang

    Issue: Volume 2, Issue 3, June 2013
    Pages: 81-87
    Received: May 28, 2013
    Accepted:
    Published: Jul. 10, 2013
    Downloads:
    Views:
    Abstract: In this paper we design and implemented a dynamic and smart wireless mesh sensor network for aquaculture and water quality management applications. This system utilizes the Waspmote embedded systems platform developed by Libelium, mesh networking transceivers from Digi International and smart sensors from UNISM to implement a novel smart Wireless ... Show More