Статьи журнала - International Journal of Wireless and Microwave Technologies

Все статьи: 532

Exploring an Effectiveness & Pitfalls of Correlational-based Data Aggregation Approaches in Sensor Network

Exploring an Effectiveness & Pitfalls of Correlational-based Data Aggregation Approaches in Sensor Network

Anand Gudnavar, Rajashekhara

Статья научная

Data aggregation is one of the core processing in wireless sensor network which ensures that environmental data being captured reaches the user via base station. In order to ensure proper data aggregation, there are many underlying principles that need more attention as compared to more frequently visited routing and energy problems. We reviewed existing data aggregation schemes with special focus on data correlation scheme and found that there is still a large scope of investigation in this area. We find that there are only less number of research publications towards existing techniques of data aggregation using correlational-based approach. It was also explored that such techniques still does not focus much on data quality, computational complexity, inappropriate benchmarking, etc. This paper elaborates about all the unsolved issues which require dedicate focus of investigation towards enhancing the data reliability and data quality in aggregation process in wireless sensor network.

Бесплатно

Extension of refinement algorithm for manually built Bayesian networks created by domain experts

Extension of refinement algorithm for manually built Bayesian networks created by domain experts

Naveen kumar bhimagavni, P.V. Kumar

Статья научная

Generally, Bayesian networks are constructed either from the available information or starting from a naïve Bayes. In the medical domain, some systems refine Bayesian network manually created by domain experts. However, existing techniques verify the relation of a node with every other node in the network. In our previous work, we define a Refinement algorithm that verifies the relation of a node only with the set of its independent nodes using Markov Assumption. In this work, we did propose Extension of Refinement Algorithm that uses both Markov Blanket and Markov Assumption to find the list of independent nodes and adhere to the property of considering minimal updates to the original network and proves that less number of comparisons is needed to find the best network structure.

Бесплатно

Fast Matching Algorithm Based on Fingerprint Classification Information

Fast Matching Algorithm Based on Fingerprint Classification Information

Na Li, Wenbi Rao, Tiecheng Xu

Статья научная

This paper focuses on fingerprint minutia matching algorithm. A special minutia neighbor structure is proposed during the matching process in this algorithm. It can locate fingerprints using the singular from classification information. In addition, minutia structure can be used to save the time of matching minutia in a simple but effective way. Then, the matching of minutia is based on the changeable sized boundary box. At the same time, possible reference position is computed to make sure the algorithm more robust to nonlinear deformation from fingerprint images. Experimental results on Fingerprint verification competition FVC2004 databases show that this algorithm can speed up the matching of fingerprint database with a preferable performance.

Бесплатно

Feature Dimension Reduction Algorithm Based Prediction Method for Protein Quaternary Structure

Feature Dimension Reduction Algorithm Based Prediction Method for Protein Quaternary Structure

Tong Wang, Tian Xia, Xiaoxia Cao

Статья научная

Knowing the quaternary structure of an uncharacterized protein often provides useful clues for finding its biological function and interaction process with other molecules in a biological system. Here, dimensionality reduction algorithm is introduced to predict the quaternary structure of proteins. Our jackknife test results indicate that it is very promising to use the dimensionality reduction approaches to cope with complicated problems in biological systems, such as predicting the quaternary structure of proteins.

Бесплатно

Feature Engineering for Cyber-attack detection in Internet of Things

Feature Engineering for Cyber-attack detection in Internet of Things

Maheshi B. Dissanayake

Статья научная

Internet of Things (IoT) consists of group of devices which communicates information over private networks. One of the key challenges faced by IoT networks is the security breaches. With the objective of automating the detection of possible security breaches in five categories, IoT traffic created with Message Queue Telemetry Transport (MQTT) protocol is analyzed. The five categories of cyber-attacks considered are brute force, denial of service (DoS), flooding, malformed data, and SlowITe attacks along with legitimate traffic. The popular five machine learning (ML) models, LightGBM, Random Forest, MLP, AdaBoost, and Decision Tree Classifiers are trained to predict cyber-attacks. In traditional traffic analysis all the available features of MQTT traffic were utilized for the ML modeling and in this work, we challenge the practice by showing that automated feature selection improves the performance of the overall ML models. The average accuracy, precision, recall and the F1 score are used as performance evaluation metrics. It is observed that all models in average are able to achieve 90% of accuracy in classification, while MLP model is trained 10 times faster than the other models. Further the optimal number of features for correct classification is identified as 10 features through Monte Carlo analysis. With the reduced features, it is possible to detect DoS, flooding, and SlowITe attacks with more than 90% accuracy and precision. Yet, it is difficult to tell apart brute force and malformed data attacks.

Бесплатно

Fixed Cluster Formations with Nearest Cluster Heads in Wsns

Fixed Cluster Formations with Nearest Cluster Heads in Wsns

Korhan Cengiz

Статья научная

The limited battery usage of a sensor node is one of the significant issues in WSNs. Therefore, extending the lifetime of WSNs through energy efficient mechanisms has become a challenging research area. Previous studies have shown that clustering can decrease the transmission distance of the sensor nodes thus, prolongs the lifetime of the network. In literature, most of the LEACH variants aim to set-up clusters in each round by changing CHs randomly. These formations cause to spend high amount of energy and induce additional network costs. In this paper, an energy-efficient nearest constant clustering approach is proposed to solve the problems of LEACH based protocols. The proposed approach uses constant clusters which are formed only once when algorithm starts. The cluster formation remains fixed until the energies of the all sensors are finished. Proposed approach aims to select nearest CHs in each cluster randomly without changing the cluster formations.

Бесплатно

Format-Compliant Encryption of JPEG2000 Codestreams

Format-Compliant Encryption of JPEG2000 Codestreams

Zhiguo Chang, Jian Xu

Статья научная

In this paper, we propose two format-compliant encryption schemes for JPEG2000, which preserve the syntax of the original codestream and do not introduce superfluous markers into the encrypted bitstream. The proposed efficient scheme randomly encrypts either low or upper half bytes of those randomly selected bytes in Codeblock Contribution to Packets (CCPs). The secure scheme encrypts both low and upper half bytes and can protect the nearly whole codestream except for the header information. The proposed schemes can provide efficient, secure, scalable and completely format-compliant protection of JPEG2000, which is proved by lots of experiments.

Бесплатно

Fractal Peano Antenna Covered by Two Layers of Modified Ring Resonator

Fractal Peano Antenna Covered by Two Layers of Modified Ring Resonator

Ammar Nadal Shareef, Amer Basim Shaalan

Статья научная

Negative index of refraction has attracted a great attention in literatures. These materials are artificial structures named metamaterials has characteristics not found in nature. Microstrip antennas covered by metamaterial are very interesting areas of study. In this paper fractal Peano shape antenna is proposed and covered by two layers of modified ring resonator. The results show an enhancement in Reflection Coefficients, gain, and directivity.

Бесплатно

Fractal multiband microstrip patch antenna for wireless applications

Fractal multiband microstrip patch antenna for wireless applications

Nilima Arun Bodhaye, P.L.Zade

Статья научная

This paper proposes a design of fractal multi-band microstrip patch antenna dedicated for wireless applications. The proposed antenna uses a FR-4 epoxy substrate having permittivity 4.4 and tangent loss to be 0.02.The microstrip antenna proposed is designed by incorporating double I-shape slot on the surface of rectangular patch and simulated by using HFSS software. Further the antenna is modified by inserting fractal shape and obtained the three frequency bands located at 2.4Ghz , 3.5Ghz and 5.50Ghz respectively and antenna parameter like VSWR, return loss, antenna gain, directivity of an antenna and bandwidth has been analyzed. The designing of proposed antenna is to be followed by fabrication by using A FR-4 substrate of thickness 1.60mm. Further, this paper discusses, the simulated and measured results comparison and analysis of the same. For designing and simulating of antennae simulation software HFSS has been used. The simulated and measured results represented are in permissible range.

Бесплатно

Frameproof Codes Based on The Generalized Difference Function Families

Frameproof Codes Based on The Generalized Difference Function Families

Qingjun CAI, Yuli ZHANG

Статья научная

The frameproof codes are used in copyright protecting. Motivated by the method of constructing frameproof codes coined by D.Tonien etal, in this paper, we introduced a new combinatorial designs which in fact generalized the difference function family introduced by D.Tonien. The new designs can be constructed from difference matrix efficiently. By using the new designs we construct more larger number of frameproof codes .

Бесплатно

Free Space Optics (FSO): A Promising Solution to First and Last Mile Connectivity (FLMC) in the Communication Networks

Free Space Optics (FSO): A Promising Solution to First and Last Mile Connectivity (FLMC) in the Communication Networks

M. Mubasher Hassan, G. M. Rather

Статья научная

We are running in the communication era demanding a very large bandwidth for high speed applications. Among the available bandwidth technologies, the optical fiber seems the most appropriate and best fit. The optical fiber technology laid down at the backbone networks has almost replaced the preexisting coax cables. To extend fiber connectivity to the end user, especially in congested and remote areas is quite a difficult task in the context to cost and installation time. Therefore, the first and last mile connectivity (FLMC) is still a bottleneck in extending the beauty of optical fiber to the edge of the network. In most of the applications, the connectivity from backbone to the end user is carried out with the radio or copper links having a much lesser capacity than optical fiber. Keeping in view the nature and size of emerging applications, the FLMC needs to be addressed with the appropriate technology. To address this issue, the emerging solution is optical wireless communication like free space optics (FSO). The FSO is coming as a more promising alternative due to its properties like huge bandwidth and less cost. In this paper, we discuss the possible solution to first and last mile connectivity by FSO links and hence the gap between the optical core and the edge of network can be bridged by FSO communication in reliable and cost effective manner. The significance of the proposed work gives an everlasting impression of using FSO communication in FLMC over the existing ones. The ever increasing demand of high bandwidth can be meticulously met with the FSO communication. The simulation results show that the desirable performance is achieved and is analyzed with performance indicators like Q-factor and BER.

Бесплатно

Full-Wave Numerical Analysis of Dual-Band E-Patch Antenna and Reactive Loading Technique to Ascertain the Impedance Driving Point Function

Full-Wave Numerical Analysis of Dual-Band E-Patch Antenna and Reactive Loading Technique to Ascertain the Impedance Driving Point Function

Fubara Edmund Alfred-Abam, Pam Paul Gyang, Fiyinfoluwa P. Olubodun

Статья научная

This paper encompasses the numerical analysis involved with the Electromagnetic (EM) full-wave simulation tool Advanced Design System (ADS) which uses the Method of Moment (MOM) and Finite Element Method (FEM). MOM is utilized to solve Maxwell’s equations which are transformed into integral equations before discretization and boundary conditions are applied while FEM computes the electrical behavior of the high frequency EM wave distribution, and then analyze the antenna parameters. The main objective is to investigate the effect of reactive loading on the microstrip patch surface which is used to control the behavior of the impedance bandwidth and obtain dual-band frequency operation. The study further examines how the perturbed patch antenna design targets the operating frequencies of 2.4 GHz and 5.8 GHz for possible range and speed. The proposed method provides insight into the analysis of the mathematical model employed in attaining the Driving Point Impedance Function (DPF) of the E-patch microstrip patch antenna. This approach was done to quantify the reduction in reflections for improved Radio Frequency (RF) network output.

Бесплатно

GSM based Monitoring and Control of Systems

GSM based Monitoring and Control of Systems

Saima Maqbool, Sajaad Ahmed Lone

Статья научная

In this paper we have proposed a method to make a base for the monitoring and Control of systems. The monitoring and Control of systems could be from monitoring of movements in any particular area to the monitoring of any external electrical, mechanical device. Every person is pocketed with the cell. So, taking the advantage of the same we developed the system for the monitoring and Control system using GSM technology. This will provide the owner, manager of the system to know about the working or any kind of default in the system. Also the system is controlled which is needed in special circumstances and is be implemented with the help of complete circuitry which is a different module (DTMF module) has a specific code as input through GSM encoder that is processed by decoder circuitry of our system. The goal is to find an improvement over the previous surveillance systems .The maintainability of the new and improved is quite efficient as it is easy to handle it by simple software demo. The facilities provided by it such as easy handling, a secrecy support, an immediate action are granted. A prototype is built in the Windows platform using C# to demonstrate the functioning of the entire system.

Бесплатно

Geometric Invariant Robust Image Hashing Via Zernike Moment

Geometric Invariant Robust Image Hashing Via Zernike Moment

Rui Sun, Xiaoxing Yan, Wenjun Zeng

Статья научная

Robust image hashing methods require the robustness to content preserving processing and geometric transform. Zernike moment is a local image feature descriptor whose magnitude components are rotationally invariant and most suitable for image hashing application. In this paper, we proposed Geometric invariant robust image hashing via zernike momment. Normalized zernike moments of an image are used as the intermediate hash. Rotation invariance is achieved by taking the magnitude of the zernike moments. Image normalization method is used for scale and translation invariance. A randomization diffusion processing enhance hashing security. The test results show that our method is robust with respect to the geometrical distortions and content preserving processing.

Бесплатно

Geospatial Cloud-Based Model for Mitigating Impact of Natural Disaster and Security Threats using Smart Digital Devices

Geospatial Cloud-Based Model for Mitigating Impact of Natural Disaster and Security Threats using Smart Digital Devices

Akinwale O. Akinwunmi, Halleluyah O. Aworinde, Segun Adebayo, Jacob A. Akinpelu

Статья научная

Human beings live in a world that is vulnerable to disasters and huge security threats. The common occurrence of global natural disasters and security threats call for major attention by the government of nations and the International community. Man continues to live under perpetual fear of the unknown because of these events. Notably, the human being is at the receiving end of these events either as a victim or at times as a perpetrator. Locating and rescuing victims or perpetrators of these events can be effectively achieved using smart digital devices that are configured with their unique identities and this will aid in achieving sustainable peace and stability in society. Equally, the global proliferation of digital devices is always on the rise; hardly today is there anyone on the planet earth without a form of one digital device or the other. This study is exploring the use of smart mobile digital devices, geospatial, cloud, communication, and technologies in mitigating the impact of natural and security threats with the significance of promoting peaceful human co-existence in the society. A Google App for finding a device, clock- timer app, an Internet speed check app and an online weather app were used for the experiments conducted for the proof of concept of the model. A test of model robustness was evaluated using response time and visibility. The model consistently showed good attributes of robustness in its behavior. Furthermore, the following parameters: latency, upload speed, download speed, air quality index, visibility, humidity, wind gust and temperature were observed against the response time in the experiments. A single sample (one-tail) t-test for the response time with a mean population of 0.9 gave a t-test value of 1. The value of p is 0.162791 and the result is not significant at p<.05. This indicates that there was no significant difference in the response time of the model irrespective of the time of the day, weather conditions, and the communication parameters. The result showed that the response time of the conceptual model was fast and consistent with the experiments indicating that the model can be leveraged, to address the problem identified in an affordable manner. The study is highly significant due to the fact that exploring the technologies that support location-based systems has greater potential in addressing the problem occasioned by natural disasters and security threats to humans. Future consideration is focused on enhancing the model by scaling up the biometrics features of the victim or perpetrator for speedy location.

Бесплатно

HACCP and the Risk Assessment of Cold-chain

HACCP and the Risk Assessment of Cold-chain

Zhang QingYing, Chen Zhimin

Статья научная

Considering that cold-chain involves lots of complicated operations which suffer from various uncertain factors during the process of implementing, it is inevitable to establish a sound and detailed risk assessment principle or means to guarantee the safety of cold-chain. HACCP, Hazard Analysis and Critical Control Point, is chosen to be a useful tool to analyze the processes of cold-chain, assess the potential risks for each operation link, and then identify the critical control points and give the appropriate risk weights, so as to ensure the safety, quality and reliability of the cold-chain.

Бесплатно

Heuristic – Driven Disjoint Alternate Path Switching – Based Fault Resilient Multi- Constraints Routing Protocol for SDN-mIOT

Heuristic – Driven Disjoint Alternate Path Switching – Based Fault Resilient Multi- Constraints Routing Protocol for SDN-mIOT

Suprith Kumar K.S., Eesha D., Pooja A.P., Monika Sharma D.

Статья научная

The last few years have witnessed exponential rise in internet-of-things (IoT) systems for communication; yet, ensuring quality-of-service (QoS) and transmission reliability over mobile topology has remained challenge. Despite the fact that the use of software defined networks (SDN) have enabled IoTs to achieve resource efficiency and reliability; it doesn’t guarantee optimality of the solution over the network with high dynamism and non-linearity. Moreover, the major at hand SDN-IoT protocols have applied standalone node parameters to perform routing and allied transmission decision that confine its robustness over dynamic network topologies. Interestingly, none of the state-of-art SDN-IoT protocols could address the problem of iterative link-outage and corresponding network discovery cost. Furthermore, even multi-path selection strategies too failed in addressing the problem of joined shortest path selection and allied iterative link-outage due to the common node failure. Considering it as motivation, in this paper a novel and robust Heuristic-Driven Disjoint Alternate Path Switching -based Fault-Resilient Multi-Constraints Routing Protocol for SDN-mIOT system (HDAP-SDNIoT) is proposed. HDAP-SDNIoT exploits multiple dynamic parameters like medium access control information, flooding and congestion probability information. HDAP-SDNIoT exploits aforesaid node parameters to perform node profiling that serves multi-constraints best forwarding path selection. The proposed model retrieves multiple best alternating paths which are fed as input to the Adaptive Genetic Algorithm (AGA) that retains three disjoint best forwarding paths. HDAP-SDNIoT protocol at first avoids any malicious node(s) to become forwarding node, while it provides auto-switching capability to the forwarding node to select a disjoint forwarding alternate path in case of any link-outage in current forwarding path. _Simulation results confirm robustness of the proposed model in terms of high packet delivery rate of 96.5%, low packet loss rate 3.5% and low delay of 211 ms that affirms its suitability towards real-time SDN-mIoT applications.

Бесплатно

High-reliability vehicle detection and lane collision warning system

High-reliability vehicle detection and lane collision warning system

Yassin Kortli, Mehrez Marzougui, Mohamed Atri

Статья научная

In the last two decades, developing Driving Assistance Systems for security has been one of the most active research fields in order to minimize traffic accidents. Vehicle detection is a vital operation in most of these applications. In this paper, we present a high reliable and real-time lighting-invariant lane collision warning system. We implement a novel real-time vehicles detection using Histogram of Oriented Gradient and Support Vector Machine which could be used for collision prediction. Thus, in order to meet the conditions of real-time systems and to reduce the searching region, Otsu’s threshold method play a critical role to extract the Region of Interest using the gradient information firstly. Secondly, we use Histogram of Oriented Gradient (HOG) descriptor to get the features vector, and these features are classified using a Support Vector Machine (SVM) classifier to get training base. Finally, we use this base to detect the vehicles in the road. Two sets generated the training data of our system a set of negative images (non-vehicles) a set of positive images (vehicles), and the test is performed on video sequences on the road. The proposed methodology is tested in different conditions. Our experimental results and accuracy evaluation indicates the efficiency of your system proposed for vehicles detection.

Бесплатно

ILBEECP for data aggregation in wireless sensor networks: a new technique

ILBEECP for data aggregation in wireless sensor networks: a new technique

Manpreet Kaur, Sandeep Kaur Dhanda

Статья научная

To design a load balanced energy efficient network has been a major concern in Wireless Sensor Networks (WSNs) since last many years. The load balancing energy-efficient clustering protocols are developed to attain the energy efficient network. But there was an issue related to the Cluster Head (CH) selection process. As the selected CH has to transmit the data to the sink node whether the node is located at a farther distance and this leads to the extra consumption of the energy by the current CH node. In order to overcome this, the novel approach is developed which is based on the multilayer architecture. The proposed method elects the CH and then a Leader node is elected from the volunteer nodes to gather the data from respective CH and then to transmit it to the base station. The simulation results depict that ILBEECP (Improved Load balanced energy Efficient Clustering protocol) outperforms the LBEECP (Load balanced energy Efficient Clustering protocol) in the terms of the dead node, alive nodes, residual energy, and energy consumption.

Бесплатно

IP Packet Filtering using Hash Table for Dedicated Real Time IP Filter

IP Packet Filtering using Hash Table for Dedicated Real Time IP Filter

Rohit G Bal

Статья научная

IP filtering is a technique used to control IP packets flow in and out of a network where Filter engine inspects at source and destination IP of incoming and outgoing packets. Here Filter engine is designed to improve the performance of the filter, i.e. to reduce the processing time of the filtering mechanism. The data structure used in the IP filter is hashing, for larger number of hosts and variety ranges IP network of hosts hashing provides much better performance than link list. Here hash function for the hash table is valid IP classes with host capacities i.e. class A, class B, class C. The IP filter engine have to compare the source and destination IP of each IP packet. In hash table technique the comparison can be done with minimum number of comparisons.

Бесплатно

Журнал