<?xml version='1.0' encoding='utf-8'?>
<doi_batch xmlns="http://www.crossref.org/schema/5.4.0" xmlns:ai="http://www.crossref.org/AccessIndicators.xsd" xmlns:jats="http://www.ncbi.nlm.nih.gov/JATS1" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/5.4.0 http://data.crossref.org/schemas/crossref5.4.0.xsd" version="5.4.0"><head><doi_batch_id>137e2892-14fd-4865-a661-67b5814979fe</doi_batch_id><timestamp>20260429143357</timestamp><depositor><depositor_name>Depositor Name</depositor_name><email_address>depositor_email@address.com</email_address></depositor><registrant>RUA Metadata Exporter</registrant></head><body><book book_type="edited_book"><book_metadata language="en"><contributors><person_name sequence="first" contributor_role="editor"><given_name>Kumbesan</given_name><surname>Sandrasegaran</surname></person_name></contributors><titles><title>Advances in Real-time Information Networks</title></titles><jats:abstract abstract-type="long"><jats:p>Our scholarly peer reviewed workshop papers publish the latest, high quality research work from UTS researchers. They cover all aspects of communication, computing and ICT. Our editorial boards and reviewers are from researchers and experts in these fields.</jats:p></jats:abstract><jats:abstract abstract-type="short"><jats:p>Our scholarly peer reviewed workshop papers publish the latest, high quality research work from UTS researchers. They cover all aspects of communication, computing and ICT. Our editorial boards and reviewers are from researchers and experts in these fields.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2013</year></publication_date><noisbn reason="monograph" /><publisher><publisher_name>UTS ePRESS</publisher_name><publisher_place>Sydney</publisher_place></publisher><ai:program name="AccessIndicators"><ai:free_to_read /><ai:license_ref>http://creativecommons.org/licenses/by/4.0/</ai:license_ref></ai:program><doi_data><doi>10.5130/aaa</doi><resource>https://utsepress.lib.uts.edu.au/books/e/10.5130/aaa</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://utsepress.lib.uts.edu.au/books/7/files/fa92f5ec-acac-41c3-a39f-83051863a10d.pdf</resource></item></collection><collection property="text-mining"><item crawler="iParadigms"><resource mime_type="application/pdf">https://utsepress.lib.uts.edu.au/books/7/files/fa92f5ec-acac-41c3-a39f-83051863a10d.pdf</resource></item></collection></doi_data></book_metadata><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Shahrzad</given_name><surname>Aslanzadeh</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Computing and Communication</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Zenon</given_name><surname>Chaczko</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Computing and Communication</institution_department></institution></affiliations></person_name></contributors><titles><title>Addressing Load balancing Issues Related to Elastic Cloud Using Biomimetic Algorithms</title></titles><jats:abstract abstract-type="long"><jats:p>In business world, competitors use  innovative approaches to improve their  performance and profits. Cloud computing is one of these  innovative approaches that have allowed many companies to further  take advantage of their potential. Cloud computing is  assisting companies to execute their business plans more  efficiently, thus providing them  with an advantage over their competitors.</jats:p><jats:p>Despite the benefits that cloud  could offer, various challenges exist in this field. Load  balancing and cloud performance  are two examples of such challenges. This  paper aims to discuss some of these challenges and how  biomimetic algorithm could be employed to address them. Our  approach is inspired by load regulation occurring in nature;  more precisely, in human body.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2013</year></publication_date><doi_data><doi>10.5130/aaa.a</doi><resource>https://utsepress.lib.uts.edu.au/chapters/e/10.5130/aaa.a</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://utsepress.lib.uts.edu.au/books/7/files/09888513-920b-494d-8882-c9cc51f041f2.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Samaneh</given_name><surname>Movassaghi</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Computing and Communication</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mehran</given_name><surname>Abolhasan</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>School of Computing and Communication</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>David</given_name><surname>Smith</surname><affiliations><institution><institution_name>National ICT Australia (NICTA)</institution_name></institution></affiliations></person_name></contributors><titles><title>Interference Mitigation in WBANS: Challenges and Existing Solutions</title></titles><jats:abstract abstract-type="long"><jats:p>Wireless Body Area Networks (WBANs) 
 are an
 exciting new networking technology 
 developed in the recent years
 with advancements in wireless 
 communication, integrated circuits
 and Micro-Electro- Mechanical 
 Systems (MEMs). They consist
 of a number of sensor nodes that 
 are placed in or around
 the human body. However, their 
 practical deployment requires
 addressing numerous challenges. 
 WBANs face many stringent
 requirements in power, bandwidth, 
 and network lifetime which
 need to be taken into serious 
 consideration in the design of
 different protocols. In this 
 paper, we investigate the 
 importance
 of interference mitigation amongst 
 coexisting Wireless Body Area
 Networks (WBANs). Since, a WBAN is 
 most likely to encounter
 other WBANs, inter-WBAN 
 interference and scheduling is of
 utmost importance.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2013</year></publication_date><doi_data><doi>10.5130/aaa.b</doi><resource>https://utsepress.lib.uts.edu.au/chapters/e/10.5130/aaa.b</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://utsepress.lib.uts.edu.au/books/7/files/072ed1ff-bfaf-4fbc-a372-60632319a06a.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>A.</given_name><surname>Daeinabi</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>K.</given_name><surname>Sandrasegaran</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name></contributors><titles><title>A Proposal for an Enhanced Inter-Cell Interference Coordination Scheme with Cell Range Expansion in LTE-A Heterogeneous Networks</title></titles><jats:abstract abstract-type="long"><jats:p>In heterogeneous network, the 
 interference situations
 may be changed in different 
 locations because of nodes with
 different powers as well as 
 traffic loads. The Inter-Cell 
 Interference
 (ICI) problem can occur for both 
 data and control channels. To
 mitigate ICI problem, enhanced 
 Inter-Cell Interference
 Coordination (eICIC) techniques 
 are proposed in the Long Term
 Evolution-Advanced (LTE-A) 
 networks particularly picocells.
 Moreover, the coverage areas of 
 picocell are usually narrow
 because of difference between 
 transmission power of macro
 eNodeB (eNB) and pico eNB. 
 Therefore, traffic load is 
 distributed
 unequally which can lead to 
 macrocells overloading. To address
 the coverage problems resulted by 
 nodes with different powers,
 Cell Range expansion (CRE) 
 technique has been recently
 proposed. In this paper, the CRE 
 approach is combined with
 eICIC-time domain scheme to 
 improve system performance using
 features of both two techniques.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2013</year></publication_date><doi_data><doi>10.5130/aaa.c</doi><resource>https://utsepress.lib.uts.edu.au/chapters/e/10.5130/aaa.c</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://utsepress.lib.uts.edu.au/books/7/files/4d304aff-3e98-4af9-bcfc-445d0c6243c0.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Ali</given_name><surname>Rafiei</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Mehran</given_name><surname>Abolhasan</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Daniel</given_name><surname>Franklin</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Stephen</given_name><surname>Smith</surname><affiliations><institution><institution_name>Macquarie University, Sydney</institution_name><institution_id type="ror">https://ror.org/01sf06y89</institution_id><institution_department>Faculty of Science, Department of Computing</institution_department></institution></affiliations></person_name></contributors><titles><title>A Case Study for Choosing Proper Relocation Algorithms to Recover Large Scale Coverage Hole(s) in Wireless Sensor Networks</title></titles><jats:abstract abstract-type="long"><jats:p>Coverage holes as large scale en  mass and correlated node failures in wireless sensor  networks, not only disturb the normal operation and  functionality  of networks, but also may endanger network’s integrity. Recent trends  to use relocation of currently deployed nodes have attracted  attention especially where manual addition of nodes are  neither feasible nor economical  in many applications. The transition  from centralized to distributed node relocation algorithm  gradually paves away for  applications in which nodes are deployed in  harsh and hostile environments in absence of central supervision  and control. Although, many different relocation algorithms  have been devised to address  their given applications’ challenges  and  requirements and they are efficient in reaching their  design  goals, they may not be similarly responsive to unpredicted and  different circumstances may occur in the network. This paper,  demonstrates one of such case,  DSSA (Distributed Self-Spreading  Algorithm) that is mainly applied for balancing node deployments  and recovery of small coverage holes. It is shown here that DSSA  is not able to fully recover large scale coverage holes even  if all nodes participate in  recovery process and relocate with  sufficient number of iterations.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2013</year></publication_date><doi_data><doi>10.5130/aaa.d</doi><resource>https://utsepress.lib.uts.edu.au/chapters/e/10.5130/aaa.d</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://utsepress.lib.uts.edu.au/books/7/files/0c1e5ce5-4696-418c-9bbf-fd6bcef9ee2f.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Cheng-Chung</given_name><surname>Lin</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Kumbesan</given_name><surname>Sandrasegaran</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Zhuliang</given_name><surname>Xu</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name></contributors><titles><title>Performance Testing of CoMP Handover Algorithms in LTE-Advanced</title></titles><jats:abstract abstract-type="long"><jats:p>Coordinated Multiple (CoMP) 
 Transmission
 and Reception technology is 
 expected to enhance the
 Long Term Evolution – Advanced 
 (LTE-A) system
 throughput and reduce the packet 
 loss ratio (PLR)
 compared to the LTE system. 
 However, this could lead
 to system capacity overload and 
 saturated system
 throughput issues within a highly 
 congested network.
 To address this situation, this 
 paper describes three
 proposed CoMP handover algorithms 
 for the LTE-A
 system. These algorithms take one 
 or more decision
 criteria into consideration to 
 increase system capacity.
 System performance of each 
 proposed CoMP handover
 algorithm is evaluated and 
 compared with open
 literature via computer 
 simulation. Simulation results
 are provided with a handover 
 parameters optimization
 and a discussion of the 
 performance testing.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2013</year></publication_date><doi_data><doi>10.5130/aaa.e</doi><resource>https://utsepress.lib.uts.edu.au/chapters/e/10.5130/aaa.e</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://utsepress.lib.uts.edu.au/books/7/files/105d0871-aec4-49c2-b675-d4a2878dab3d.pdf</resource></item></collection></doi_data></content_item><content_item component_type="chapter" publication_type="full_text" language="en"><contributors><person_name sequence="first" contributor_role="author"><given_name>Zhuliang</given_name><surname>Xu</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Kumbesan</given_name><surname>Sandrasegaran</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name><person_name sequence="additional" contributor_role="author"><given_name>Cheng-Chung</given_name><surname>Lin</surname><affiliations><institution><institution_name>University of Technology, Sydney</institution_name><institution_id type="ror">https://ror.org/03f0f6041</institution_id><institution_department>Faculty of Engineering and Information Technology</institution_department></institution></affiliations></person_name></contributors><titles><title>Modelling and Simulation of Wi-Fi  Positioning System Deployment for Pedestrian Monitoring</title></titles><jats:abstract abstract-type="long"><jats:p>Wi-Fi Positioning System (WPS) is a localization technology based on WLAN infrastructure and used the signal strength to implement position determination. With the widely used of Wi-Fi integrated smartphone, WPS has been introduced to monitor pedestrian movement such as movement trend and pedestrian traffic load. The information of pedestrian in a a street can be used to improve the services provides to people, for instance, a better bus time schedule and more friendly pavement design. Although there are lots of paper relate to WPS, but very little works has been published to discuss the system deployment. This paper provides modelling and simulation of WPS deployment in a street environment using MATLAB simulation tool. The results of the simulation ca be used to optimizing WPS device deployment to achieve better system coverage and efficiency.</jats:p></jats:abstract><publication_date><month>01</month><day>01</day><year>2013</year></publication_date><doi_data><doi>10.5130/aaa.f</doi><resource>https://utsepress.lib.uts.edu.au/chapters/e/10.5130/aaa.f</resource><collection property="crawler-based"><item crawler="iParadigms"><resource mime_type="application/pdf">https://utsepress.lib.uts.edu.au/books/7/files/958eafae-e54f-47c8-9212-8424043aa4db.pdf</resource></item></collection></doi_data></content_item></book></body></doi_batch>