International Journal of Wireless and Microwave Technologies @ijwmt
Статьи журнала - International Journal of Wireless and Microwave Technologies
Все статьи: 544

Crash Recovery for Embedded Main Memory Database
Статья научная
In the last years, the deployment of embedded real-time communication systems has increased dramatically. At the same time, the amount of data that needs to be managed by embedded real-time main memory databases is increasing, thus requiring an efficient data management. However, system crash will cause data loss in main memory, which will seriously affect the normal operation of the entire communication system. This paper introduces an algorithm of system crash recovery applied in main memory database of embedded real-time communication system. This paper expatiates the software architecture of SDR base station, the cause of crash occurring, and proposes the flash recovery algorithm using for system recovery. A main memory database using this algorithm has been applied in a real communication system——multimode SDR base station communication system.
Бесплатно

Critical Analysis of Distributed Localization Algorithms for Wireless Sensor Networks
Статья научная
In the past decade, Wireless sensor networks (WSNs) have attracted very much attention from the research and industrial community. Various WSN based projects produced fruitful and interesting results. In various applications, the location information of node is vital for the service. The reason is that users usually need to know what happens, but also where the concerned events happen. For example, in battlefield surveillance, the knowledge of where the enemy comes from can be much more important than only knowing the appearance of the enemy, it is much important that sensors reports the information along with their location. Localization is one of the primary and widely useful middle-ware services in sensor networks, mostly allows every node to obtain its location information. The localization schemes can be categorized on the basis of various parameters like availability of GPS, presence of anchors, range measurements, model of computation etc. On the basis of computation model, the localization approaches can be categorized into: centralized and distributed localization techniques. Due to certain advantages, distributed localization is flattering as an active stem in sensor localization. In this paper, we have been reported a detailed analysis on distributed localization techniques and outline the merits and limitations of distributed localization schemes in WSNs. Finally, we conclude the paper with some open issues.
Бесплатно

Cross Layer Design and Performance Analysis of HARQ Schemes in Multi-Relay Networks
Статья научная
We propose a cross-layer design combining adaptive modulation and coding (AMC) at the physical layer with a hybrid automatic repeat request (HARQ) protocol at the data link layer in multi-relay networks with imperfect channel state information (CSI). Based on a simple and distributed relay selection strategy, we derive the closed-form expressions for performance metrics such as average packet loss rate (PER) and spectral efficiency; and further formulate an optimization model to maximize the spectral efficiency under the target PER constraint. The numerical results show that the average PER is lower and the spectral efficiency is higher with the number of the relay increasing.
Бесплатно

Статья научная
In the dynamic realm of Smart Healthcare Systems (SHS), the integration of IoT devices has revolutionized conventional practices, ushering in an era of real-time data collection and seamless communication across the healthcare ecosystem. Amidst this technological shift, the paramount concern remains the security of sensitive healthcare data within intricate networks. Several cryptographic algorithms have been proposed for smart healthcare systems for the protection of critical and sensitive data in SHS, however, the majority of newly proposed algorithms have shortcomings in terms of resource utilization and the level of security that they provide. Our research delves into the existing highly secure cryptographic algorithms and provides a comparative analysis of two popular and secure cryptographic algorithms viz N-th Degree Truncated Polynomial Ring (NTRU) and Elliptic Curve Cryptography (ECC) and verifies their applicability in SHS. Recognizing ECC's compact key sizes and its vulnerability to quantum computing threats, our study finds NTRU as a resilient and quantum-resistant alternative, providing a robust defense mechanism in the evolving landscape of healthcare cybersecurity. Key findings underscore the efficacy of NTRU in safeguarding healthcare data, emphasizing its superior performance compared to ECC, especially in the face of emerging quantum computing challenges. The comparative analysis depicts that ECC excels in key generation speed, delivering efficient and swift key creation. However, it requires larger keys to withstand potential quantum computing vulnerabilities. On the other hand, the key generation time in NTRU is slightly more than ECC but being quantum-resistant, it provides high security.
Бесплатно