International Journal of Wireless and Microwave Technologies @ijwmt
Статьи журнала - International Journal of Wireless and Microwave Technologies
Все статьи: 556

Design of an IoT-Enabled Solar Tracking System For Smart Farms
Статья научная
This paper presents a novel IoT system to eliminate the need for human intervention for solar panel maintenance purposes in smart farms. For the convenience of the consumer, a wireless sensing system could be implemented to automate these functions. This would eliminate the cost of any additional labor charges for panel maintenance as the system implemented would automatically calculate the position as per the current time of the day and adjust the panel's position accordingly to harvest the most amount of sun rays into the PV panel. Unlike the conventional tracking method where the panel is rotated hourly, we propose a fixed set of Sun Altitude and Azimuth angle ranges that are hardcoded to each panel position so that throughout the year whenever these angles fall out of range it jumps to the next position. The system results in a straightforward method by retrieving the current date/time from the RTC module and calculating the respective Sun Altitude and Azimuth angle to determine the position to adjust the position of the panel accordingly, thus producing effective power outputs and strong sun tracking results.
Бесплатно

Design of an UWB bandpass filter using dual MMR with highly attenuated upper stopband using DGS
Статья научная
A miniature sized microstrip UWB (ultra wideband) BPF (bandpass filter) having highly attenuated upper stop band performance using a dual MMR (multimode resonator) and the DGS (defected ground structure) is proposed. Combining these two topologies, a prototype of the proposed UWB BPF is fabricated using FR-4 substrate of 1.6 mm thickness with dielectric constant of 4.4. This BPF is modelled and simulated using Ansoft high frequency structure simulator (HFSS) Software. The simulated and measured results show a wide FBW (fractional bandwidth) of 119% .The insertion loss is less than -1.0 dB throughout the pass band of 2.78 to 10.95 GHz. All the ripples of return loss are lower than -14 dB in the passband. The BPF has a high rejection of more than -30 dB in the upper stop band up to 16.8 GHz. The simulated and measured group delays variation in the passband are found to be less than 0.2 ns. The overall length of the resonator is 7 mm.
Бесплатно

Design of effective security architecture for mobile cloud computing to prevent DDoS attacks
Статья научная
A DOS (Denial of Service) attack, as its name suggests, denies or blocks access to certain services by flooding either the bandwidth of a specified network or by targeting its connectivity. There are much security challenges in mobile cloud computing. Cloud indicates a period of the computing where the services, which are an application, are made available by the internet. Cloud based computing is very adjustable and cheap as to providing a platform for various IT services. The mobile systems can hinge on the cloud based computing with mobile agents and can undertake various processes such as the searching or storing, etc. While it’s very economic, it has many challenges such as the security. Various researches have been carried out to build a secure mobile cloud based computing. In this paper, we have viewed and analyzed the DDOS (Distributed Denial of Service) attacks in depth to prevent it in the mobile cloud computing.
Бесплатно

Design of the E-Patch Dual-Band Microstrip Antenna with Low Reflections for WLAN Application
Статья научная
Antennas are either massive or miniaturized structures useful for the transmission and reception of signals associated with Electromagnetic (EM) radiation. Although Microstrip Patch Antennas (MSA) are advantageous they exhibit several drawbacks which may impair a faster communication throughput. They mostly display narrow impedance bandwidth amidst other grave issues. This study presents some approaches such as transmission line analysis and modeling for investigating the complexities associated with the MSA configurations given the shortcomings of narrow impedance bandwidth. in other to achieve the associated input impedance for the dual-band E-patch microstrip antenna. It also investigated the fabrication of the E-patch MSA which targeted the operating frequencies of 2.4 GHz and 5.8 GHz for possible range and speed. The fabricated prototype was tested using a high-frequency communication instrument known as the Vector Network Analyzer (VNA) to obtain the return loss and Voltage Standing Wave Ratio (VSWR). This method was done to quantify the reduction of reflections for enhanced Radio Frequency (RF) network output. This work helps to mitigate the challenges encountered when designing and developing microstrip patch antennas having a relatively small size in different configurations.
Бесплатно

Design on open-loop bandpass filter with multiple harmonics suppression
Статья научная
In this paper, a simple method based on coupling control theory to suppress multiple harmonics in open-loop bandpass filters is proposed. Coupled feeding is utilizing in this paper, and by choosing proper coupling length and position of the input/output port, multiple harmonics could be suppressed. The input impedance of microstrip line with its end open-circuited is firstly showed and the theory on harmonics suppression is then analyzed to choose a proper coupling position. A second-order open-loop bandpass filter is designed and manufactured, measured and manufactured results both have a stopband to 5f0 with rejection more than 20dB. On the base of the filter proposed, the stopband can be broaden to 10f0 by adding two stubs. It well validates the proposed solution.
Бесплатно

Design truncated rectangular patch microstrip antenna for telecommunication base stations
Статья научная
In this paper a truncated rectangular patch microstrip antenna with multiple slots has been proposed, to provide a wide impedance bandwidth, in addition to acceptable antenna performance parameters such as (gain and radiation pattern). FR-4 substrate is used to design the antenna structure, the substrate has thickness of 1.6 mm and relative permittivity of 4.3. By utilizing CST Microwave Studio Simulation softwer, the simulation procedure has been done. This antenna covers broadband from (0.94GHz to 3.4GHz), therefor it is suitable for operation in telecommunication base stations, and the antenna covers the GSM900, GSM1800, GSM1900, and IMT applications.
Бесплатно

Detecting Polymorphic Buffer Overflow Exploits with a Static Analysis Approach
Статья научная
Remote exploit attacks are the most serious threats in network security area. Polymorphism is a kind of code-modifying technique used to evade detection. A novel approach using static analysis methods is proposed to discover the polymorphic exploit codes hiding in network data flows. The idea of abstract execution is firstly adopted to construct control flow graph, then both symbolic execution and taint analysis are used to detect exploit payloads, at last predefined length of NOOP instruction sequence is recognized to help detection. Experimental results show that the approach is capable of correctly distinguishing the exploit codes from regular network flows.
Бесплатно

Detection and Prevention of Phishing Short URLs Using Machine Learning and Blacklist Approaches
Статья научная
Phishing attacks are a common and serious issue in our digital age, short uniform resource locators are frequently used in these attacks to trick unwary visitors into visiting malicious websites. Short uniform resource locators are often used to hide a link's true destination, making it harder for visitors to establish whether a link is legitimate or phishing. Due to this, individuals and organizations attempting to protect themselves from phishing attempts have a significant problem. This research introduces a novel system that integrates machine learning algorithms with a blacklist approach to enhance phishing detection. The system's objective is to support transparency protect user privacy, and increase the precision and efficiency of identifying phishing attacks hidden behind Short URLs, thereby granting users real-time protection against phishing attacks. The findings demonstrate that the proposed system is highly effective. Many machine learning algorithms were used and compared, Gradient Boosting emerged as the best algorithm among those tested, with an excellent accuracy rate of 97.1%. This algorithm outperformed other algorithms in distinguishing between legitimate and phishing uniform resource locators, demonstrating its strong capabilities in the face of the growing threat landscape of phishing attacks via short uniform resource locators. By addressing gaps in prior research, particularly in detecting phishing using short URLs, this study provides a valuable contribution to cybersecurity.
Бесплатно

Detection and extraction of OFDM parameters using difference of gaussians
Статья научная
Signals type detection is very important in telecommunication. Telecommunication signals can be divided into two major groups: single-carrier signals and multi-carrier signals. The first step in extracting data in multi-carrier communication signals is to detect signals and their subcarriers. OFDM signals are one of the most popular multi-carrier signals that are used widely. This paper will introduce a blind detection method for OFDM signals, subcarriers, and the central frequency of them based on the Difference of Gaussians (DoG) technique which is applied for blob detection in machine vision. Performance of our method is compared with high-resolution spectral estimation such as Capon, Borgiotti-Lagunas, and MUSIC. Results showed that it has less computational complexity than the others. Also, there is no need to learn parameters, so the response time of the system is appropriate. Furthermore, many tests have been done on real and artificial signals corrupted with noise and fading and the results showed our proposed method has better performance and cause the lower error in the severe condition like SNR=0.
Бесплатно

Detection of Anomalies Based on User Behavioral Information: A Survey
Статья научная
User and entity behaviour analytics (UEBA) solutions are becoming more and more popular for detecting anomalies since they establish baseline models of typical user behaviour and highlight deviations from them. Modelling normal user behavior and identifying any new behavior that deviates from the normal model user i.e., an attack, which is the main concept of Anomaly Detection (AD) techniques. In this work, a comprehensive review of various AD techniques based on user behavior is presented. Accordingly, this survey is concerted on various techniques employed for AD based on user behavior. Among various research articles, 50 research articles based on AD are considered and categorized based on different parameters, like techniques, publication year, performance metrics, utilized tools, and so on. At last, the research gaps and challenges of this method are illustrated in such a way that a goal for emerging an efficient technique for allowing the effective AD technique is defined.
Бесплатно

Detection of Threats in Wireless Sensor Network Based on Optics Clustering With DE-BiLSTM Classifier
Статья научная
An intelligent distributed network system is the Wireless Sensor Network (WSN), which is a strategy required to address security threats as well as energy consumption that has a direct impact on a network’s lifetime. Thus, attempting to identify malicious attacks with a low consumption of data transmission makes a lot of sense. The high energy consumption of nodes due to the transmission of data shortens the lifetime of the network. To overcome these issues, the proposed method is based on the Ordering Points to Identify Cluster Structure (OPTICS) with Bi-directional Long Short Term Memory using Differential evolution (DE-BiLSTM) classifier to detect the threats in WSN for smart building. Initial deployment of the sensor nodes (SN) and formation of the cluster nodes (CN) by employing the OPTICS density-based clustering approach that partitions clusters with different densities. In order to transport data to the base station, the cluster head (CH) nodes are chosen from the CN according to their more energy as well as shorter distance. Then, in order to forecast the threats, the size of the batch and hidden layers are set using the differential evolution method (DE) and the classification of the data is performed using BiLSTM to detect as attack or non-attack. Performance for predicting an attack is measured by network and classification parameters such as Packet Delivery Ratio (PDR), Average Residual Energy (ARE), Throughput, Accuracy and Precision. The results of the performance obtained are 91.78% for PDR, 8.56J for ARE, 2.52mbps for throughput with 100 nodes, then 93.78% for accuracy and 93.04% for precision. Thus, the designed detection of threats in WSN based on OPTICS clustering with DE-BILSTM classifier performs better for malicious attack prediction with low energy consumption sensor nodes.
Бесплатно

Development of Android Controlled Arduino based Intelligent Car Parking System
Статья научная
The automobile industry is currently looking at the technology needed to move from today's original autonomous autos to a self-contained and safe driving solution. The automobile industry has been remarkably successful in producing reliable, safe, and affordable cars over the past century. Due to the significant progress made in computers and telecommunications, an autonomous car became a reality. In this regard, an android driver-less car is a vehicle that uses a combination of motors, software, and sensors to park cars between destinations without a human operator. To be fully autonomous, vehicles must be able to travel unmanned to a pre-determined destination on roads that are not fit for use. In this paper, the android controlled Arduino based intelligent car parking development stages and functionalities has been discussed. The motor system will be composed of the dc motors that run the car as well as the wheels and body of the car. The DC motor controls the circuit and a software driver. The android application will drive the car forward, reverse, left, and right (stopping will be the absence of a forward or backward command). It will do this by means of the software driver. There is also one motor which holds the brake and release. The significance of this system is that it has a distinctiveness to control real cars in real-time with android applications including steering control, gear shifting, horn control, and engine on/off. It has a self-parking system in a narrow crowded system through the sensors reading the environment and with actuators, a car could be park itself. Finally, on enabling effective automobile safety and efficient automotive cars, some of the challenges are needed to be addressed (and to provide) useful suggestions for approval by car manufacturers, designers, policymakers, and regulatory bodies.
Бесплатно

Статья научная
This paper presents an improved hybrid Equal Gain Combiner-Maximal Ratio Combiner (EGC-MRC) diversity scheme in 5G millimeter wave (mm-wave) frequency. The term 5G mm-wave refers to the radio frequency spectrum between 24 GHz and 100 GHz. The signal interference is a challenging task in 5G mm-wave frequency, and radio network suffer from co-channel and adjacent channel interference. 5G network deployment depends on large number of antennas, which resulted in signal interference. The conventional receiver’s diversity techniques have high hardware complexity and are characterized by low performance. A new hybrid EGC-MRC diversity scheme was proposed as an improvement on the performance of existing MRC scheme. In achieving this, Probability Density Function (PDF) of the hybrid model was derived using the instantaneous Signal-to- Noise Ratio (SNR) obtained from the output of MRC and EGC diversity schemes. The performance of the developed model was evaluated using Outage Probability 〖(P〗_out) and Processing time (P_t) at different SNR with L number of paths. Simulation of the MRC, EGC and hybrid EGC-MRC models were carried out using MATLAB 2018a and the results compared. The output results showed that hybrid EGC-MRC performed better than EGC and MRC by having a lower P_out and〖 P〗_t. This new model has the potential to mitigate network interference, multipath propagation, and hardware complexity in 5G mm-wave frequency. Therefore, the developed model can be deployed by network operators to solve signal interference in 5G network.
Бесплатно

Development of a Path-loss Prediction Model Using Adaptive Neuro-fuzzy Inference System
Статья научная
The prediction of wireless communication signals is of paramount importance for proper network planning. The existing prediction models such as Okumura-Hata, Co-operative for Scientific and Technical Research (COST-231) and free space are less accurate for predicting path-loss values of wireless signals due to differences in propagation environments. Hence, this paper develops a path-loss model using Adaptive Neuro-Fuzzy Inference System (ANFIS) for accurate prediction of wireless High Speed Packet Access (HSPA) network signal in Ibadan, Nigeria. This is achieved by measuring the Received Signal Strength (RSS) from three Base Transmitting Stations (BTS) operating at 2100 MHz frequency in Ojo (longitude E 3’ 53.1060’, latitude N 7’27.2558’), Dugbe (longitude E 3’50.4361’, latitude N 7’ 23.0678’) and Challenge (longitude E 3’ 53.1060’, latitude N 7’ 21.258’) areas of Ibadan using the Drive Test. Ericson Test Equipment for Mobile System (TEMS) phone, Global Positioning System (GPS) and Computer System are used to obtain RSS data at different distances. Base station parameters such as the transmitting antenna height, receiving antenna height, carrier frequency and distance are used as input variables to train ANFIS to develop a model. These base station parameters are also used to investigate the suitability of Okumura-Hata, COST-231 and free space model. A five layer ANFIS structure is developed and trained using Least Square Error (LSE) and Gradient Descent (GD) method to adjust the consequent and premise parameters. The performance of the developed ANFIS model is evaluated using Mean Square Error (MSE) and Root Mean Square Error (RMSE) and compared with Okumura-Hata, COST 231 and free space. The results obtained for ANFIS give lower RMSE and MSE indicating the suitability of ANFIS model for path-loss prediction. The developed ANFIS model can be used for network planning and budgeting in these environments.
Бесплатно

Development of a Phishing Website Detection Model Using Classification Algorithm
Статья научная
In the contemporary digital landscape, the proliferation of malware presents a significant threat to the security and integrity of computer systems and networks. Traditional signature-based detection methods are increasingly ineffective against the evolving landscape of sophisticated malware variants. Consequently, there is a pressing need for innovative approaches to malware detection that can adapt to emerging threats in real-time. This research aims to develop a malware detection system using machine learning algorithms. Random Forest classifier and Logistic regression were deployed for the classification of malware based on the features extracted from the CIC-MalMem-2022 dataset. The Malware detection system model was implemented using the Python programming language and evaluated using major performance metrics like F1-score, precision, recall, and accuracy to assess the model’s performance. A comparison between the logistic regression model and the random forest model showed that the Random Forest model approach performed better than the logistic model in detecting malware, achieving accuracies of 98% and 94% respectively. In summary, the report concludes that the developed Malware Detection System using Machine Learning, specifically the Random Forest and Logistic regression models, shows promise in effectively detecting malware and highlights the importance of leveraging Artificial Intelligence for combating malware threats in the computing community.
Бесплатно

Статья научная
With the rapid development of Internet of Things (IoT) technology, researches in IoT and Wireless Sensor Networks (WSNs) has led to a very heavy reliance on Software Defined Networking (SDN). WSNs have some resource scarcities that affect their performance, such as power supply, processing units, memory, and communication capacity. This paper suggests an optimized routing protocol, named Future Search Algorithm-Temperature Routing protocol (FSA-TR) that is based on the temperature and recent technologies to find the optimal set of clusters. The SDN and Cloud technologies have been used in the architecture of the proposed protocol. A Multi-objective FSA that considers resource restrictions of the sensors, such as energy and communication capability, has been presented to identify the best solution. The temperature of the IoT sensors according to their distribution in the geographical has been considered. Accordingly, a Cluster Head (CH) is selected depending on the remaining energy, the distance between nodes, and environmental temperature. Finally, the experimental results showed an enhanced system performance of many features, such as energy dissipation, network lifetime and the number of packets sent to the sink. For instance, the network lifetime of the proposed protocol has been increased by approximately 36%, 27% and 20% compared to LEACH, SEP and optimized protocol PSO-C, consecutively.
Бесплатно

Статья научная
As the world is getting digital there are few things which are used as it is for a long time. The most important thing which we do in our daily life is the transaction of money. Money transaction is a process which should be digitized for more security and the ease of the individual. So, by making a digital wallet the money transaction can be made much simpler and effortless. Using digital wallet we can keep all our important cards such as health card, driving license and other important papers in only one place with much more security. The digital wallet can be our transaction medium which can be used anywhere such as shops, malls or for giving money to someone else. And with such high security such as finger print scanning our money and all the information which the wallet is carrying will be safe. In case, if the wallet is lost GPS will help to detect the location of our device and that what makes the wallet a digital safe.
Бесплатно

Discussion on IGMP Snooping and Its Sequence in Industrial Applicaiton
Статья научная
This paper has an introduction on a new intelligent controller for industrial Ethernet with IGMP: ICIE (Intelligent Controller for Industrial Ethernet). It proposed a new mechanism to minimize the congestion which is based on the taking an adaptive decision during transferring multicast messages. It also focuses on the sequences analysis on IGMP snooping. It has a further discussion on the steps: receiving IGMP loin message, receiving IGMP leave message, receiving IGMP query message, sending IGMP join message, sending IGMP leave message and network topology change. According to the requirement of end device ring topology, we add a DSA tagged BPDU to indict the target of packet. It is through the external devices solicitation of join messages that allow the IGMP Snooping component to correctly decipher on which ports the downstream listeners are connected.
Бесплатно

Doppler Simulation and Analysis of SCME Channel Model
Статья научная
In this contribution, the Doppler spectral properties are simulated and analyzed based on 3GPP Spatial Channel Model extension (SCME). SCME standard channel model is applied to the system evaluation and optimization in LTE and other future communication networks. Since future mobile communication systems demand for high moving speed, the simulation and analysis of Doppler characteristics become so significant. Therefore, we focus on the simulation of Doppler spectral properties in different scenarios of SCME channel model. The simulated Doppler power spectrum and Doppler delay spectrum are applicable to characterize Doppler properties of time-varying channels.
Бесплатно

Статья научная
A suspended dual band planar antenna based on a stepped-impedance structure modified to an array, loaded with Complementary Split-Ring Resonators (CSRRs), possessing good directivity pertaining point to point backhaul communication is acquainted. The presented antenna radiates at 2.4-2.5 GHz (4.4%) and 5.3-5.9 GHz (12%) with |S11| < −10 dB, accompanying directivity of 11.6 dBi and 11.3 dBi respectively. The antenna is loaded with CSRRs which works as a L-C tank resonator, to obtain better coupling, and to lower the frequency of radiation in 2.4 GHz band along with decreasing the return loss for both the bands of WLAN. The Suspended antenna, symmetrical across vertical axis, has four branches, each of which are obtained from Maximally Stepped-Impedance filter. A stable radiation pattern with high directivity in both the WLAN bands is achieved.
Бесплатно