International Journal of Wireless and Microwave Technologies @ijwmt
Статьи журнала - International Journal of Wireless and Microwave Technologies
Все статьи: 568

Evaluation of Performance for Wireless Sensor Networks Based on Gray Theory
Статья научная
A performance evaluation method of wireless sensor networks based on gray theory is proposed. Firstly the influence factors of performance are analyzed, and the index set in evaluation of wireless sensor networks' performance is built which include index of key performance and reliable characteristics. Based on AHP and gray theory, a model of evaluation of wireless sensor networks performance is given. Finally the results of example show that the evaluation model is rationality and feasibility.
Бесплатно

Evaluation the performance of DMZ
Статья научная
Local area networks are built mainly for two essential goals, the first one is to support the framework’s business functionality such as email, file transferring, procurement systems, internet browsing, and so forth. Second, these common networks should be built using secure strategies to protect their components. Recent developments in network communication have heightened the need for both secure and high performance network. However, the performance of network sometime is effected by applying security rules. Actually, network security is an essential priority for protecting applications, data, and network resources. Applying resources isolation rules are very important to prevent any possible attack. This isolation can be achieved by applying DMZ (Demilitarized Zone) design. A DMZ extremely enhance the security of a network. A DMZ is used to add an extra layer of protection to the network. It is also used to protect a private information. A DMZ should be properly configured to increase the network’s security. This work reviewed DMZ with regard to its importance, its design, and its effect on the network performance. The main focus of this work was to explore a means of assessing DMZ effectiveness related to network performance with simulation under OpNet simulator.
Бесплатно

Статья научная
The demand for cloud computing systems has increased tremendously in the IT sector and various business applications due to their high computation and cost-effective solutions to various computing problems. This increased demand has raised several challenges such as load balancing and security in cloud systems. Numerous approaches have been presented for load balancing but providing security and maintaining integrity and privacy remains a less explored research area. Intrusion detection systems have emerged as a promising solution to predict attacks. In this work, we develop a deep learning-based scheme that contains data pre-processing, convolution operations, BiLSTM model, attention layer, and CRF modeling. The current study employs a machine learning-based approach to detect intrusions based on the attackers' historical behavior. Deep learning algorithms were used to extract features from the image and determine the significance of dense packets to generate the salient fine-grained feature that can be used to detect malicious traffic and presents the final classification using fused features.
Бесплатно

Статья научная
Data aggregation is one of the core processing in wireless sensor network which ensures that environmental data being captured reaches the user via base station. In order to ensure proper data aggregation, there are many underlying principles that need more attention as compared to more frequently visited routing and energy problems. We reviewed existing data aggregation schemes with special focus on data correlation scheme and found that there is still a large scope of investigation in this area. We find that there are only less number of research publications towards existing techniques of data aggregation using correlational-based approach. It was also explored that such techniques still does not focus much on data quality, computational complexity, inappropriate benchmarking, etc. This paper elaborates about all the unsolved issues which require dedicate focus of investigation towards enhancing the data reliability and data quality in aggregation process in wireless sensor network.
Бесплатно

Extension of refinement algorithm for manually built Bayesian networks created by domain experts
Статья научная
Generally, Bayesian networks are constructed either from the available information or starting from a naïve Bayes. In the medical domain, some systems refine Bayesian network manually created by domain experts. However, existing techniques verify the relation of a node with every other node in the network. In our previous work, we define a Refinement algorithm that verifies the relation of a node only with the set of its independent nodes using Markov Assumption. In this work, we did propose Extension of Refinement Algorithm that uses both Markov Blanket and Markov Assumption to find the list of independent nodes and adhere to the property of considering minimal updates to the original network and proves that less number of comparisons is needed to find the best network structure.
Бесплатно

Fast Matching Algorithm Based on Fingerprint Classification Information
Статья научная
This paper focuses on fingerprint minutia matching algorithm. A special minutia neighbor structure is proposed during the matching process in this algorithm. It can locate fingerprints using the singular from classification information. In addition, minutia structure can be used to save the time of matching minutia in a simple but effective way. Then, the matching of minutia is based on the changeable sized boundary box. At the same time, possible reference position is computed to make sure the algorithm more robust to nonlinear deformation from fingerprint images. Experimental results on Fingerprint verification competition FVC2004 databases show that this algorithm can speed up the matching of fingerprint database with a preferable performance.
Бесплатно

Feature Dimension Reduction Algorithm Based Prediction Method for Protein Quaternary Structure
Статья научная
Knowing the quaternary structure of an uncharacterized protein often provides useful clues for finding its biological function and interaction process with other molecules in a biological system. Here, dimensionality reduction algorithm is introduced to predict the quaternary structure of proteins. Our jackknife test results indicate that it is very promising to use the dimensionality reduction approaches to cope with complicated problems in biological systems, such as predicting the quaternary structure of proteins.
Бесплатно

Feature Engineering for Cyber-attack detection in Internet of Things
Статья научная
Internet of Things (IoT) consists of group of devices which communicates information over private networks. One of the key challenges faced by IoT networks is the security breaches. With the objective of automating the detection of possible security breaches in five categories, IoT traffic created with Message Queue Telemetry Transport (MQTT) protocol is analyzed. The five categories of cyber-attacks considered are brute force, denial of service (DoS), flooding, malformed data, and SlowITe attacks along with legitimate traffic. The popular five machine learning (ML) models, LightGBM, Random Forest, MLP, AdaBoost, and Decision Tree Classifiers are trained to predict cyber-attacks. In traditional traffic analysis all the available features of MQTT traffic were utilized for the ML modeling and in this work, we challenge the practice by showing that automated feature selection improves the performance of the overall ML models. The average accuracy, precision, recall and the F1 score are used as performance evaluation metrics. It is observed that all models in average are able to achieve 90% of accuracy in classification, while MLP model is trained 10 times faster than the other models. Further the optimal number of features for correct classification is identified as 10 features through Monte Carlo analysis. With the reduced features, it is possible to detect DoS, flooding, and SlowITe attacks with more than 90% accuracy and precision. Yet, it is difficult to tell apart brute force and malformed data attacks.
Бесплатно

Fixed Cluster Formations with Nearest Cluster Heads in Wsns
Статья научная
The limited battery usage of a sensor node is one of the significant issues in WSNs. Therefore, extending the lifetime of WSNs through energy efficient mechanisms has become a challenging research area. Previous studies have shown that clustering can decrease the transmission distance of the sensor nodes thus, prolongs the lifetime of the network. In literature, most of the LEACH variants aim to set-up clusters in each round by changing CHs randomly. These formations cause to spend high amount of energy and induce additional network costs. In this paper, an energy-efficient nearest constant clustering approach is proposed to solve the problems of LEACH based protocols. The proposed approach uses constant clusters which are formed only once when algorithm starts. The cluster formation remains fixed until the energies of the all sensors are finished. Proposed approach aims to select nearest CHs in each cluster randomly without changing the cluster formations.
Бесплатно

Format-Compliant Encryption of JPEG2000 Codestreams
Статья научная
In this paper, we propose two format-compliant encryption schemes for JPEG2000, which preserve the syntax of the original codestream and do not introduce superfluous markers into the encrypted bitstream. The proposed efficient scheme randomly encrypts either low or upper half bytes of those randomly selected bytes in Codeblock Contribution to Packets (CCPs). The secure scheme encrypts both low and upper half bytes and can protect the nearly whole codestream except for the header information. The proposed schemes can provide efficient, secure, scalable and completely format-compliant protection of JPEG2000, which is proved by lots of experiments.
Бесплатно

Fractal Peano Antenna Covered by Two Layers of Modified Ring Resonator
Статья научная
Negative index of refraction has attracted a great attention in literatures. These materials are artificial structures named metamaterials has characteristics not found in nature. Microstrip antennas covered by metamaterial are very interesting areas of study. In this paper fractal Peano shape antenna is proposed and covered by two layers of modified ring resonator. The results show an enhancement in Reflection Coefficients, gain, and directivity.
Бесплатно

Fractal multiband microstrip patch antenna for wireless applications
Статья научная
This paper proposes a design of fractal multi-band microstrip patch antenna dedicated for wireless applications. The proposed antenna uses a FR-4 epoxy substrate having permittivity 4.4 and tangent loss to be 0.02.The microstrip antenna proposed is designed by incorporating double I-shape slot on the surface of rectangular patch and simulated by using HFSS software. Further the antenna is modified by inserting fractal shape and obtained the three frequency bands located at 2.4Ghz , 3.5Ghz and 5.50Ghz respectively and antenna parameter like VSWR, return loss, antenna gain, directivity of an antenna and bandwidth has been analyzed. The designing of proposed antenna is to be followed by fabrication by using A FR-4 substrate of thickness 1.60mm. Further, this paper discusses, the simulated and measured results comparison and analysis of the same. For designing and simulating of antennae simulation software HFSS has been used. The simulated and measured results represented are in permissible range.
Бесплатно

Frameproof Codes Based on The Generalized Difference Function Families
Статья научная
The frameproof codes are used in copyright protecting. Motivated by the method of constructing frameproof codes coined by D.Tonien etal, in this paper, we introduced a new combinatorial designs which in fact generalized the difference function family introduced by D.Tonien. The new designs can be constructed from difference matrix efficiently. By using the new designs we construct more larger number of frameproof codes .
Бесплатно

Статья научная
We are running in the communication era demanding a very large bandwidth for high speed applications. Among the available bandwidth technologies, the optical fiber seems the most appropriate and best fit. The optical fiber technology laid down at the backbone networks has almost replaced the preexisting coax cables. To extend fiber connectivity to the end user, especially in congested and remote areas is quite a difficult task in the context to cost and installation time. Therefore, the first and last mile connectivity (FLMC) is still a bottleneck in extending the beauty of optical fiber to the edge of the network. In most of the applications, the connectivity from backbone to the end user is carried out with the radio or copper links having a much lesser capacity than optical fiber. Keeping in view the nature and size of emerging applications, the FLMC needs to be addressed with the appropriate technology. To address this issue, the emerging solution is optical wireless communication like free space optics (FSO). The FSO is coming as a more promising alternative due to its properties like huge bandwidth and less cost. In this paper, we discuss the possible solution to first and last mile connectivity by FSO links and hence the gap between the optical core and the edge of network can be bridged by FSO communication in reliable and cost effective manner. The significance of the proposed work gives an everlasting impression of using FSO communication in FLMC over the existing ones. The ever increasing demand of high bandwidth can be meticulously met with the FSO communication. The simulation results show that the desirable performance is achieved and is analyzed with performance indicators like Q-factor and BER.
Бесплатно

Статья научная
This paper encompasses the numerical analysis involved with the Electromagnetic (EM) full-wave simulation tool Advanced Design System (ADS) which uses the Method of Moment (MOM) and Finite Element Method (FEM). MOM is utilized to solve Maxwell’s equations which are transformed into integral equations before discretization and boundary conditions are applied while FEM computes the electrical behavior of the high frequency EM wave distribution, and then analyze the antenna parameters. The main objective is to investigate the effect of reactive loading on the microstrip patch surface which is used to control the behavior of the impedance bandwidth and obtain dual-band frequency operation. The study further examines how the perturbed patch antenna design targets the operating frequencies of 2.4 GHz and 5.8 GHz for possible range and speed. The proposed method provides insight into the analysis of the mathematical model employed in attaining the Driving Point Impedance Function (DPF) of the E-patch microstrip patch antenna. This approach was done to quantify the reduction in reflections for improved Radio Frequency (RF) network output.
Бесплатно

GSM based Monitoring and Control of Systems
Статья научная
In this paper we have proposed a method to make a base for the monitoring and Control of systems. The monitoring and Control of systems could be from monitoring of movements in any particular area to the monitoring of any external electrical, mechanical device. Every person is pocketed with the cell. So, taking the advantage of the same we developed the system for the monitoring and Control system using GSM technology. This will provide the owner, manager of the system to know about the working or any kind of default in the system. Also the system is controlled which is needed in special circumstances and is be implemented with the help of complete circuitry which is a different module (DTMF module) has a specific code as input through GSM encoder that is processed by decoder circuitry of our system. The goal is to find an improvement over the previous surveillance systems .The maintainability of the new and improved is quite efficient as it is easy to handle it by simple software demo. The facilities provided by it such as easy handling, a secrecy support, an immediate action are granted. A prototype is built in the Windows platform using C# to demonstrate the functioning of the entire system.
Бесплатно

Geometric Invariant Robust Image Hashing Via Zernike Moment
Статья научная
Robust image hashing methods require the robustness to content preserving processing and geometric transform. Zernike moment is a local image feature descriptor whose magnitude components are rotationally invariant and most suitable for image hashing application. In this paper, we proposed Geometric invariant robust image hashing via zernike momment. Normalized zernike moments of an image are used as the intermediate hash. Rotation invariance is achieved by taking the magnitude of the zernike moments. Image normalization method is used for scale and translation invariance. A randomization diffusion processing enhance hashing security. The test results show that our method is robust with respect to the geometrical distortions and content preserving processing.
Бесплатно

Статья научная
Human beings live in a world that is vulnerable to disasters and huge security threats. The common occurrence of global natural disasters and security threats call for major attention by the government of nations and the International community. Man continues to live under perpetual fear of the unknown because of these events. Notably, the human being is at the receiving end of these events either as a victim or at times as a perpetrator. Locating and rescuing victims or perpetrators of these events can be effectively achieved using smart digital devices that are configured with their unique identities and this will aid in achieving sustainable peace and stability in society. Equally, the global proliferation of digital devices is always on the rise; hardly today is there anyone on the planet earth without a form of one digital device or the other. This study is exploring the use of smart mobile digital devices, geospatial, cloud, communication, and technologies in mitigating the impact of natural and security threats with the significance of promoting peaceful human co-existence in the society. A Google App for finding a device, clock- timer app, an Internet speed check app and an online weather app were used for the experiments conducted for the proof of concept of the model. A test of model robustness was evaluated using response time and visibility. The model consistently showed good attributes of robustness in its behavior. Furthermore, the following parameters: latency, upload speed, download speed, air quality index, visibility, humidity, wind gust and temperature were observed against the response time in the experiments. A single sample (one-tail) t-test for the response time with a mean population of 0.9 gave a t-test value of 1. The value of p is 0.162791 and the result is not significant at p<.05. This indicates that there was no significant difference in the response time of the model irrespective of the time of the day, weather conditions, and the communication parameters. The result showed that the response time of the conceptual model was fast and consistent with the experiments indicating that the model can be leveraged, to address the problem identified in an affordable manner. The study is highly significant due to the fact that exploring the technologies that support location-based systems has greater potential in addressing the problem occasioned by natural disasters and security threats to humans. Future consideration is focused on enhancing the model by scaling up the biometrics features of the victim or perpetrator for speedy location.
Бесплатно

HACCP and the Risk Assessment of Cold-chain
Статья научная
Considering that cold-chain involves lots of complicated operations which suffer from various uncertain factors during the process of implementing, it is inevitable to establish a sound and detailed risk assessment principle or means to guarantee the safety of cold-chain. HACCP, Hazard Analysis and Critical Control Point, is chosen to be a useful tool to analyze the processes of cold-chain, assess the potential risks for each operation link, and then identify the critical control points and give the appropriate risk weights, so as to ensure the safety, quality and reliability of the cold-chain.
Бесплатно

Статья научная
The last few years have witnessed exponential rise in internet-of-things (IoT) systems for communication; yet, ensuring quality-of-service (QoS) and transmission reliability over mobile topology has remained challenge. Despite the fact that the use of software defined networks (SDN) have enabled IoTs to achieve resource efficiency and reliability; it doesn’t guarantee optimality of the solution over the network with high dynamism and non-linearity. Moreover, the major at hand SDN-IoT protocols have applied standalone node parameters to perform routing and allied transmission decision that confine its robustness over dynamic network topologies. Interestingly, none of the state-of-art SDN-IoT protocols could address the problem of iterative link-outage and corresponding network discovery cost. Furthermore, even multi-path selection strategies too failed in addressing the problem of joined shortest path selection and allied iterative link-outage due to the common node failure. Considering it as motivation, in this paper a novel and robust Heuristic-Driven Disjoint Alternate Path Switching -based Fault-Resilient Multi-Constraints Routing Protocol for SDN-mIOT system (HDAP-SDNIoT) is proposed. HDAP-SDNIoT exploits multiple dynamic parameters like medium access control information, flooding and congestion probability information. HDAP-SDNIoT exploits aforesaid node parameters to perform node profiling that serves multi-constraints best forwarding path selection. The proposed model retrieves multiple best alternating paths which are fed as input to the Adaptive Genetic Algorithm (AGA) that retains three disjoint best forwarding paths. HDAP-SDNIoT protocol at first avoids any malicious node(s) to become forwarding node, while it provides auto-switching capability to the forwarding node to select a disjoint forwarding alternate path in case of any link-outage in current forwarding path. _Simulation results confirm robustness of the proposed model in terms of high packet delivery rate of 96.5%, low packet loss rate 3.5% and low delay of 211 ms that affirms its suitability towards real-time SDN-mIoT applications.
Бесплатно