... slots before issuing a DSC packet. Once again, it
Table 1: Relevant simulation parameters.
CSMA/CA PHY layer and 2C-WSN
Parameter Value Parameter Value
macMinBE 3 Radio
datarate
250 kbps
macMaxBE ... ends
before attempting channel access. Thus, the 2C algorithm is
able to provide guarantees for fair channel access.
Each station participating in a CRI maintains a counter
that control...
... carried out by mobile agent
(MA) computing paradigm. Mobile agent methods have
been widely researched for data fusion and aggregation in
sensor networks’ applications such as target classification
or ... Wesley-Pearson, Reading, Mass, USA, 2nd
edition, 2004.
[30] M. S. Arulampalam, S. Maskell, N. Gordon, and T. Clapp, A
tutorial on particle filters for online nonlinear/non-Gaussian
Bayes...
... (15)
as another performance evaluating parameter. The equal
weightage to maximize PD and minimize PF suggests its
suitability for the applications where false alarms are equally
intolerable as ... W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan,
“An application-specific protocol architecture for wireless
microsensor networks,” IEEE Transactions on Wireless Com-
munications,...
... technologies.
Heterogeneous networks based on Wireless Local Area Networks (WLANs) and Wireless Wide Area Networks (WWANs) can
combine their respective advantages on coverage and data rates, offering a high Quality ... management for vertical handoff between WWAN and
WLAN,” IEEE Communications Magazine, vol. 41, no. 11, pp.
102–108, 2003.
[10] A. Calvagna and G. Modica, A cost-based a...
... receiving data to obtain some statistical
information such as cyclostationarity induced by the cyclic
prefix. Therefore, blind channel estimation methods are not
suitable for applications with fast varying ... Spectral Properties of Banded
Toe plitz Mat r ic es, SIAM, Philadelphia, Pa, USA, 2005.
EURASIP Journal on Wireless Communications and Networking 13
[21] H. Minn and V. K. Bhargava...
... both real and imaginary parts as in CMA
and MMA, only one dimension, the real or imaginary part,
is considered in SCMA, which makes it very attractive for
practical implementation especially when ... 1343–1348,
1997.
[16] C. B. Papadias and A. J. Paulraj, A constant modulus al-
gorithm for multiuser signal separation in presence of delay
spread using antenna arrays,” IEEE Signal Process...
... information to the gateway in each cluster, an
appropriate routing algorithm is required. It defines the path
that the packets can be forw arded to the gateway. Therefore,
a minimum cost path algorithm ... to a sensor node n
i
. The transmission ranges of all
sensor nodes and all the g a teways are noted by r and R,
respectively, where R>r. Therefore, a sensor node and a...
... International Conference on Mobile
Computing and Networking (MOBICOM ’99), Seattle, Wash,
USA, 1999.
[2] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci,
Wireless sensor networks: a ... Communications Societies (INFOCOM ’06), Barcelona,
Spain, April 2006.
[19] T. Vu, R. Safavi-Naini, and C. Williamson, “Securing wireless
sensor networks against large-scale node capture...
... nonlinear operator equations in
Banach spaces,” PanAmerican Mathematical Journal, vol. 4, no. 2, pp. 39–54, 1994.
4 S. Kamimura and W. Takahashi, “Strong convergence of a proximal-type algorithm ... Ya. I. Alber, “Metric and generalized projection operators in Banach spaces: properties and applica-
tions,” in Theory and Applications of Nonlinear Operators of Accretive and Monotone Type...
... nonlinear operator equations in
Banach spaces,” PanAmerican Mathematical Journal, vol. 4, no. 2, pp. 39–54, 1994.
4 S. Kamimura and W. Takahashi, “Strong convergence of a proximal-type algorithm ... 1140–1152, 2006.
10 K. Nakajo and W. Takahashi, “Strong convergence theorems for nonexpansive mappings and non-
expansive semigroups,” Journal of Mathematical Analysis and Applications,...