Статьи журнала - International Journal of Wireless and Microwave Technologies

Все статьи: 532

Introducing a Novel Algorithm for Energy Consumption Management for M2M Network Expandability Through Topology Control within Nodes

Introducing a Novel Algorithm for Energy Consumption Management for M2M Network Expandability Through Topology Control within Nodes

Akbar Majidi, Mohamad Amini

Статья научная

The wireless sensor networks are most important developers of machine-to-machine communication (M2M) networks. In each node of sensor, transmission power is the most important energy consumption factor, which is considered as the most important challenge for expansibility of M2M network. One strategy to cope with this problem is topology control algorithm. This algorithm consists of two topology design and topology maintenance phases. The focus of most works conducted in this field is on design topography. However, topology maintenance should be also considered during the topology control design. To prolong network life through the energy consumption management in the nodes, in this paper an algorithm is proposed which considers both topology design and maintenance. The simulation results obtained using NS-2 simulator prove innovation and higher performance of the proposed model.

Бесплатно

Investigating Coupling Interactions in Split-Ring Resonator Dimers

Investigating Coupling Interactions in Split-Ring Resonator Dimers

Akaa Agbaeze Eteng, Ngozi Peggy Udeze

Статья научная

Topological wireless power transfer (TWPT) arrays provide directional power transfer, which are robust to external disturbances. Often realized as a chains of dimers, the ability to adjust the coupling between constituent resonator elements is an important means of establishing necessary conditions for power transfer. This paper explores the coupling interactions that are possible within dimers consisting of paired split-ring resonators (SRRs) in close proximity. Transfer efficiencies and through impedances are computationally studied for various rotational orientations of edge-and broadside-coupled SRRs. The obtained results reveal that relative rotational orientation can be employed as a sensitive design parameter to provide a variety of high- and low-coupling options within and between SRR dimers, with different power transfer efficiency implications.

Бесплатно

Investigating the relationship between coverage area and propagation profile

Investigating the relationship between coverage area and propagation profile

Adenodi Raphael Adewale

Статья научная

This study investigates the relationship between coverage area and propagation profile. Most studies on propagation profile do not link the profile with the coverage area of the transmitter and vice versa. Using both coverage area and propagation profile to describe the variations of electric field intensity of propagating wave makes a vivid description of the transmitter performance. This study creates propagation profile from the contour of coverage area of Benue Radio transmitter. Data for the study were collected during a measurement campaign carried out around the transmitter. The data were interpolated to produce a contour of the coverage area. A cross sectional profile elicits from the contour of coverage area at equally spaced eight different vertical plains provides the propagation profiles of the transmitter. This was achieved by transforming the coordinates of the contour of coverage area into distance thus producing a two dimensional plain from a three dimensional contour. Values of coordinates and electric field intensity were taken from some points on the contour and were compared with the equivalent positions on the propagation profile yields the same value of electric field intensity and equivalent position in distance. Similar procedure was carried out on the propagation profile provides the same value of electric field intensity and equivalent positions in terms of coordinates. The study concludes that propagation profiles are cross sectional parts of coverage area.

Бесплатно

Investigation of application layer DDoS attacks using clustering techniques

Investigation of application layer DDoS attacks using clustering techniques

T. Raja Sree, S. Mary Saira Bhanu

Статья научная

The exponential usage of internet attracts cyber criminals to commit crimes and attacks in the network. The forensic investigator investigates the crimes by determining the series of actions performed by an attacker. Digital forensic investigation can be performed by isolating the hard disk, RAM images, log files etc. It is hard to identify the trace of an attack by collecting the evidences from network since the attacker deletes all possible traces. Therefore, the possible way to identify the attack is from the access log traces located in the server. Clustering plays a vital role in identifying attack patterns from the network traffic. In this paper, the performance of clustering techniques such as k-means, GA k-means and Self Organizing Map (SOM) are compared to identify the source of an application layer DDoS attack. These methods are evaluated using web server log files of an apache server and the results demonstrate that the SOM based method achieves high detection rate than k-means and GA k-means with less false positives.

Бесплатно

Investigations with All Optical Binary Subtractor Network at 100Gbps

Investigations with All Optical Binary Subtractor Network at 100Gbps

Devendra Kr. Tripathi

Статья научная

This article demonstrates for the proposed all optical binary subtractor network. Performance explored by exploiting nonlinear attribute the cross gain modulation with semiconductor optical amplifier which otherwise considered as cons if used as an amplifying tool. Numerical simulations have been executed, accordingly accustomed data inputs at 100Gbps data rate employed, generated aspired difference and the borrow outputs concurrently. The design’s performance for the non return to zero, return to zero and Manchester modulation formats have been analyzed, according to it is key performance parameter the extinction ratio. Investigations inferred optimum performance for the non return to zero modulation format outcome extinction ratio of 13.5dB,together with difference and borrow output have been successfully confirmed. Further designs execution with non return to zero modulation format for the key parameters range of data rates, laser peak power, the normalizer power, pump current, the current injection efficiency and the modulator bias voltage have been evaluated. Evaluation inferred that optimum performance is subject to the pertinent election of the vital design parameters. The proposed design is simpler by virtue of key attributes low power consumption and stability altogether with higher integration capability as well provides output generation simultaneously at higher data rate. It was lacking with preceding elucidations. Accordingly, this illustration could be an assistance towards novel contemporary complex digital optical computing combinational networks.

Бесплатно

Joint Beam-Power Coordinative Scheduling of Neighboring Sectors in Cellular Systems

Joint Beam-Power Coordinative Scheduling of Neighboring Sectors in Cellular Systems

Fei Ji, Ying Liu, Fangjiong Chen, Xiaodong Chen, Shangkun Xiong

Статья научная

Beam cooperative scheduling of downlink transmission is an important technique to improve the spectrum efficiency in next generation mobile networks. This paper focuses on switched beams (the emission angles of the beams are fixed) and proposes a joint beam-power coordinative scheduling algorithm among neighbor sectors in the downlink of mobile systems. Each sector coordinates the applied order and transmitted power of the beams with adjacent interfering sector, so as to reduce inter-sector interference and maximize throughputs. This scheduling problem is modeled as a constrained optimization problem and solved by our proposed iterative approach. Computer simulation shows that the proposed approach significantly outperform the existing round robin beam servicing approach and the approach that applies only beam cooperative scheduling.

Бесплатно

Keywords Review of IT Security Literature in Recent 20 Years

Keywords Review of IT Security Literature in Recent 20 Years

QIAN Liping, LIN Yan, WANG Lidong

Статья научная

The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have been funded aiming to online scientific literature mining, especially in biomedical research. Scientific literature covers most of the hot topics in the research field and has a very large domain-specific vocabulary. The exploitation of domain knowledge and specialized vocabulary can dramatically improve the result of literature text processing. The purpose of this paper is to identify the frequently used keywords in IT security literatures. The result then can be utilized to improve the performance of automatic IT security document retrieval, identification and classification. Our method is to query CiteseeX to retrieve source data of paper description information and build an artificially annotated corpus. Over the corpus, we perform words frequency statistics, word co-occurrence analysis, discrimination index computation, retrieval efficiency analysis and thus build a lexicon of IT security based on our experimental result. The lexicon can further be used in improving retrieval performance and assisting new words discovering and document classification.

Бесплатно

Lattice-reduction-aided equalization for V2V communication channel

Lattice-reduction-aided equalization for V2V communication channel

Samarendra Nath Sur, Rabindranath Bera, Bansibadan Maji

Статья научная

World is moving towards the implementation of massive MIMO based communication system and that forces the researchers to design low complexity receiver architecture. MIMO system performance in Vehicular ad hoc networks (VANETs) is a popular research topic. And to support Vehicle-to-vehicle (V2V) communication in high speed mobility condition, it required to have reliable and secure of com-munication. This paper deals with the performance evaluation of the low complex LLR-MMSE receiver in terms of the channel capacity and bit error rate improvement. In this paper we have considered V2V Spatial Channel Model (SCM) and Nakagami-m chaneel model for the performance evaluation. The performance has been evaluated based on the mathematical calculation and simulated results. And also performance comparison between the conventional linear MIMO receivers with the lattics reduction aided MIMO receivers have been presented.

Бесплатно

Lecture Time Table Reminder System on Android Platform (Case Study: Final Year Students, Computer Science Department)

Lecture Time Table Reminder System on Android Platform (Case Study: Final Year Students, Computer Science Department)

Ayeni Olaniyi Abiodun, Dada Olabisi, Talabi Olanrewaju

Статья научная

Forgetting the stipulated schedule or time of lectures due to one reason or the other has always been a major concern for students resulting in the students missing classes and thereby lagging behind in what the lecturer has taught the other students. The main purpose of developing the Lecture time table reminder system is to minimize this problem to an acceptable level. Lecture Timetable Reminder System is a mobile application developed on the Android platform for the students of Computer Science, 500level, Federal University of Technology, Akure, with the service of reminding them about their lectures. The major tools used in developing this application are Java, Eclipse, Android Software Development Kit (SDK), PHP and MySQL. Java is the programming language that was used and Eclipse is the Integrated Development Environment (IDE) and Android SDK is a virtual device emulator. Then PHP was used to produce a response customized for each user's request to the application, MySQL is the database.

Бесплатно

Load Balancing Mechanism for Edge-Cloud-Based Priorities Containers

Load Balancing Mechanism for Edge-Cloud-Based Priorities Containers

Wael Hadeed, Dhuha Basheer Abdullah

Статья научная

Considering edge devices have limited resources, it's critical to keep track of their current resource usage and device resource allocation algorithms that send containers to edge and cloud nodes according to their priority. To minimize the strain on edge devices and enable the running of mission-critical applications, edge containers may need to be transferred to a cloud platform. In this paper, we suggested a mechanism for prioritizing container balance between the edge and cloud while attempting to assign delay-sensitive containers to edge nodes. We assess the performance of Docker container management systems on resource-constrained computers and offer ways for reducing administration and migration overhead based on the workload type, to bring load balance to the systems. The proposed algorithm gives flexibility to get the best possible ways to achieve load balancing. The Tensorflow’s object discovery API was used, accessed with Flask, Python's micro-web framework. Docker container management technology was used in the implementation of this application.

Бесплатно

Load Balancing in Cloud Computing Using Hungarian Algorithm

Load Balancing in Cloud Computing Using Hungarian Algorithm

Mohammad Irfan Bala, Mohammad Ahsan Chishti

Статья научная

Cloud computing is a highly popular computing paradigm providing on-demand resources with high reliability and availability. The user requests are fulfilled by providing a virtual machine with the requested configuration. However, with the ever-increasing load on the cloud resources, the need for optimal resource utilization of the cloud resources has become the need of the hour. Load balancing has been identified as one of the possible ways to improve resource utilization in the cloud and the current state-of-the-art algorithms indicate the numerous attempts made to find the approximate solution for this NP-hard problem. In this work, we have focused on evaluating the efficiency of the Hungarian algorithm for load distribution in the cloud and compared its performance with First-come-first-serve (FCFS). The simulations were carried out in CloudSim and show remarkable improvement in various performance parameters. Finish time of a given task schedule was reduced by 41% and average execution time was reduced by 13% in the Hungarian algorithm when compared with FCFS. The simulations were carried out under different workload conditions to validate our results.

Бесплатно

Location based Energy Efficient Scheme for Maximizing Routing Capability of AODV Protocol in MANET

Location based Energy Efficient Scheme for Maximizing Routing Capability of AODV Protocol in MANET

Sudhir Goswami, Chetan Agrawal, Anurag Jain

Статья научная

Nodes in Mobile Ad hoc Network (MANET) are forming a dynamic topology by that the nodes are continuously change their location and also the nodes functioning is dependent on the limited battery capacity that is called energy. The dynamic behavior of network connection is not maintained for long time. All nodes in network are energy dependent and efficient energy utilization is one of the important criteria in MANET. In this paper we proposed a new location based energy efficient scheme with AODV protocol. In this scheme energy dependent nodes are improving the routing capability of AODV protocol on the basis of location based protocol LAR (Location Aided Routing protocol). In network nodes are not aware about their energy status and also recur flooding of routing packets are consumes more energy in network by that the most of the energy is wasted in connection establishment. LAR protocol reduces that possibility of destination finding by maintain the record of location of each node in network respect to other nodes. It implies that every node in network is maintaining the record of other nodes (participating in routing procedure) with their current location and speed. If the nodes in network are know about the energy status and also about the status of location of receiver that reduces the energy consumption. The main aim of proposed scheme is to enhance the energy utilization in network. The performance of normal AODV, AODV with LAR and AODV with LAR and Energy is illustrate here and observe that the LAR protocol reduces the energy consumption and prolog the network lifetime that completely depend on the energy of mobile nodes.

Бесплатно

Loss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE

Loss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE

T. Kavitha, B. Narendra, K.Thejaswi, P. Nageswara Rao

Статья научная

In the modern era of the computing world, the data producing and using it is becoming large and instant at various places. For availing the data at different locations for processing we need to store it in the global platform. Cloud environment provides a best and easy way for this. Cloud computing is becoming as the essential thing for high-quality data services. However there are some potential problems with respect to data security. Here encryption techniques can be used for providing security, but with restricted efficiency. In this paper we propose a new encryption mechanism for providing data security in cloud environment. We propose a two round searchable encryption which supports multi keyword retrieval. Here we adapted a vector space model for improving search accuracy; the elgamal encryption technique allows users to involve in the ranking, while the essential key part of encryption will be done at the source itself. The proposed improves the data security and reduces data leakage.

Бесплатно

Luminous Intensity Control System Based on ZigBee Wireless Sensor Networks

Luminous Intensity Control System Based on ZigBee Wireless Sensor Networks

PEI Yan-ming, LIU Yun-hong

Статья научная

This paper introduces an energy conservation luminous intensity control system based on ZigBee sensor networks for smart home. The study is conducted to reduce unnecessary energy consumption by changing the luminous intensity of white LED according to the light coming into the room. A detecting circuit connected to the pin of CC2430 is set on the working face to collect the real-time luminous intensity signal. Then the ZigBee module adjusts the PWM signal to drive the white LEDs aiming at keeping a fixed and appropriate luminous intensity (e.g. 500Lux). Meanwhile, it transmits the data to the ZigBee coordinator through ZigBee wireless network. The monitoring PC get the data through the serial communication interface and display the states of the lights. Administrators can turn on or off the lights by clicking on the screen. This system can realize monitoring and controlling all the lights wirelessly so that users can save a lot energy and staff members. The system has been proved to be effective and convenient.

Бесплатно

MANET testbed using raspberry PIs

MANET testbed using raspberry PIs

Salem Sati, Ahmed El-bareg

Статья научная

Mobile ad-hoc networks (MANETs) are without any infrastructure and consists only of equal peers. This paper presents an empirical tests for MANET routing protocols. The testbed based on Linux platform installed in mobile computers. Some parameters are analyzed such as movement speed and the number of hops which impact on routing performance. The testbed consists of several Raspberry Pis (RPis) without the need for any central master device. For making the RPis mobile and independent of any fixed power sockets, each of them is powered by a battery. On the other hand, for the evaluation of the testbed, two routing protocols are chosen. The first protocol is called BABEL, which considered as a distance vector routing algorithm. The other one, the Optimized Link State Routing Protocol (OLSR) which considered as proactive routing protocol. The use case was a multi-hop download of files with different size. The aim is to evaluate how multiple hops influence the bandwidth and delay. The results show that OLSR performs better regarding the throughput. But Babel has less delay and faster regarding convergence.

Бесплатно

MVGDRA: Modified Virtual Grid based Dynamic Routes Adjustment Scheme for Mobile Sink-based Wireless Sensors Networks

MVGDRA: Modified Virtual Grid based Dynamic Routes Adjustment Scheme for Mobile Sink-based Wireless Sensors Networks

Navpreet Kaur, Ashwani Kumar Narula

Статья научная

In the wireless sensor network, various sensor nodes are present that are used for the communication, sensing and computing. An external mobile sink is present which move around the grid that is used for the communication with the nodes directly which are present in the network. As we know that for formation of network we need to find the route between all the nodes coming in the network, for this purpose routing is done. Routing is defined as moving of information from source to destination. For efficient network the routing protocol that is used should consume less energy, and less distance. In the MVGDRA routing algorithm is proposed that use the mobile sink approach. The selection of cluster head is done on the basis of the weight values. By doing this cluster head will be selected on the basis of the energy means which node has highest energy appointed as cluster head that increases the stability of the network. And the event driven based strategy is used for the data transfer, the energy will be only released when it is required. The energy will not be released after each round. By this the energy consumption of the system decrease and the life time the network is increased. So this method is considered to be more efficient and better than the traditional methods of routing as the network performance is enhanced and its life time is increased. Simulation results show the comparison between the VGDRA and the MVGDRA.

Бесплатно

Machine Learning Algorithms for Detecting DDoS Attacks in Intrusion Detection Systems

Machine Learning Algorithms for Detecting DDoS Attacks in Intrusion Detection Systems

Dandugudum Mahesh, T. Sampath Kumar

Статья научная

In today's interconnected world, the threat of intrusion activities continues to rise, making it imperative to deploy effective security measures such as Intrusion Detection Systems (IDS). These systems play a vital role in monitoring network and system activities to identify unauthorised or malicious behaviour. The focus of this research is on evaluating the efficiency of different IDS in detecting anomalies in network traffic, specifically targeting Denial of Service (DDoS) attacks that exploit server vulnerabilities using IP addresses. The study utilises the CIC-DDoS 2019 dataset to analyse the performance of various IDS, particularly Network Intrusion Detection Systems (NIDSs), in predicting DDoS attacks accurately. To combat the diverse range of DDoS threats, a collective classifier is introduced, which combines four top-performing algorithms to enhance detection capabilities. By transforming the problem into a multilabel classification issue, the researchers aim to address the complexity of DDoS attacks effectively. Several machine learning (ML) and artificial intelligence (AI) algorithms are employed in the study, including Random Forest Classifier, Decision Tree Classifier, Support Vector Machine (SVM), Naïve Bayes, Multi-Layer Perceptron, Long Short-Term Memory (LSTM), and XGBoost Classifier. Evaluating the performance and computational efficiency of these algorithms is crucial to determining the most effective approach to detecting DDoS attacks. The results of the research highlight the effectiveness of the Random Forest Classifier and Multi-Layer Perceptron in accurately detecting DDoS attacks, as evidenced by their high accuracy rates on the test dataset. These findings underscore the importance of leveraging advanced ML algorithms to enhance the security of networks and systems against evolving cybersecurity threats. In conclusion, the study emphasises the significance of deploying robust IDS equipped with sophisticated ML algorithms to safeguard against intrusion activities like DDoS attacks. By continuously evaluating and improving the performance of these systems, organisations can enhance their cybersecurity posture and mitigate the risks posed by malicious actors in the digital landscape.

Бесплатно

Machine Learning Based Analysis of Cellular Spectrum

Machine Learning Based Analysis of Cellular Spectrum

Muhammad Yasir, Zafi Sherhan Shah, Sajjad Ali Memon, Zahid Ali

Статья научная

One of the key issues of wireless communication networks is the spectrum crisis, and studies noted that static licensed bands are in the under-utilization stage. Recently Cognitive Radio Network facilitates a solution to minimize the spectrum crisis in which unlicensed users can utilize the licensed spectrum without transmission interference. To achieve this task we used Machine Learning techniques for analyzing spectrum occupancy which is an efficient method to analyze spectrum occupancy and provides high accuracy. Supervised machine learning algorithms namely Logistic regression, K nearest neighbor, and Naive Bayes are used to classify a given frequency band. In this paper we collect spectrum samples of GSM 900, 1800, and 2100 bands using Rohde & Schwarz FSH6 Handheld Spectrum Analyzer for developing a dataset, using that dataset we trained the classifiers and analyze their classification performance accuracy. Results have shown the best performance on the validation and testing partition for various Unweighted Average Recall (UAR) of each classifier. Here the Logistic Regression classifier learns the best representation from their feature vector. This research is helpful to measure the spectrum occupancy of different static allocated licensed bands for 24/7. This will give better ideas about spectrum utilization, future spectrum allocation and comfort to serve more users in the limited spectrum. The occupancy measurements of current allocated spectrums can not only provide a convincing basis for making future spectrum allocation policies, but also provide technical support for the development of new communication technologies.

Бесплатно

Managing Big Data: A Step towards Huge Data Security

Managing Big Data: A Step towards Huge Data Security

PankajDeep Kaur, Awal Adesh Monga

Статья научная

Big data management (BDM) is the administration, management and governance of large volumes of all types of structured, semi-structured and unstructured data. Big data management is a blend of old and new best practices, teams, data types, skills, and home-grown or industrial-built functions and methods. Big Data Management is at the genesis of massive change to technology that will spur massive societal and industrial change. In this paper, different key factors kept in mind while managing big data are discussed along with the process of managing data so that organisations can get secure and accurate data. Further different developers have introduced methods have also been discussed and with it the main tools used in management of Big Data are introduced in this paper. BDM is suffering from many issues in the world are also explained here. Big Data Management deals with the integration, manipulation, quality and governance and management of Big Data including the key factors- Volume, Velocity and Variety of Big Data.

Бесплатно

Matlab Simulink of COST231-WI Model

Matlab Simulink of COST231-WI Model

Yihuai Yang, Dongya Shen, Yonggang Xie, Xiangde Li

Статья научная

Simulink is the integrated environment of system modelling and simulation, which is being widespread used. This paper describes the MATLAB visual simulation of the propagation path loss model for telecommunication systems. We simulated the whole process of COST231-Walfisch-Ikegami model with high accuracy, built a visual simulation frame and the path loss curves are given. This method can be used in studying other propagation path loss models in propagation environments.

Бесплатно

Журнал