Статьи журнала - International Journal of Wireless and Microwave Technologies

Все статьи: 574

Innovative Large Scale Wireless Sensor Network Architecture Using Satellites and High-Altitude Platforms

Innovative Large Scale Wireless Sensor Network Architecture Using Satellites and High-Altitude Platforms

Yasser Albagory, Fahad Al Raddady, Sultan Aljahdali, Omar Said

Статья научная

Wireless sensor network has many applications and very active research area. The coverage span of this network is very important parameter where wide coverage area is a challenge. This paper proposes an architecture for large-scale wireless sensor network (LSWSN) based on satellites and the High-Altitude Platforms (HAP) where the sensor nodes are located on the ground and a wide coverage sink station may be in the form of a satellite or a network of HAPs. A scenario is described for multilayer LSWSN and a study for the system requirements has been established showing the number of Satellites, HAPs and coverage per each sink according to the elevation angle requirements. The Satellite-HAP-Sensor multilayer LSWSN architecture has the feasibility for effective energy and earth coverage and is optimum for covering largely sparse regions.

Бесплатно

Integrated Guard Channel Synthesis in AESA based Airborne Surveillance Radar

Integrated Guard Channel Synthesis in AESA based Airborne Surveillance Radar

R Rajesh, P V Rao, Suma Varughese

Статья научная

The guard channel is very effective in eliminating side-lobe returns, both targets and discrete clutter, in airborne radar's. The ideal design criterion for the guard channel is that all the side lobes of the main antenna are covered by the guard pattern. In this paper a novel design approach of generating the guard using the elements of the main Active Electronically Scanned Array (AESA) antenna, thereby eliminating the need for a separate antenna, is presented. The ground clutter has an angle dependent Doppler and clutter discrete that leak in through the side lobes, especially the inter-cardinal elevation side lobes looking at the near range, needs to be eliminated. Towards this the design of the weighting coefficients for the guard to cover all the side lobes of the main array is discussed. Furthermore a digital threshold scheme is proposed to improve the effectiveness of guard channel in eliminating side-lobe returns. The detection loss and blanking probability are characterized for the design. The measurement results confirm that the design objectives are met.

Бесплатно

Integration of Cyber Threat Hunting and Socio- Political Risk Assessment for a Hybrid Predictive Model for Enhanced Global Security

Integration of Cyber Threat Hunting and Socio- Political Risk Assessment for a Hybrid Predictive Model for Enhanced Global Security

Ananya Das, Azath H., Subhash Chandra Patel, Pushpinder Singh Patheja

Статья научная

The new and emerging challenges posed by the convergence of cyber threats and socio-political tensions have risen as one of the core formidable threats to the present global security landscape. This paper proposes a hybrid predictive model intended to act against these real-world multidimensional attack vectors. The model integrates cyber threat hunting techniques with socio-political risk assessment methodologies to comprehensively forecast consequent cybersecurity threats to social unrest scenarios. Cyber threat data is collected from sources such as the Offensive Defensive-Intrusion Detection System (OD-IDS2022) and the Aegean Wi-Fi Intrusion Dataset (AWID3), and social terror attack information is gathered from the Global Database of Events, Language, and Tone (GDLET) Project and Armed Conflict Location & Event Data (ACLED) to comprise the bidirectional dataset for the model that contains views from both cyber and socio-political risk landscapes. The model adopts a holistic, robust predictive capability through k-fold cross-validation and feature importance evaluation implementation techniques. This multidisciplinary approach offers a synoptic understanding of emerging and future security threats and enables the execution of proactive measures to secure national and transnational borders.

Бесплатно

Intelligent and Distributed Localization of Nodes in Wireless Sensor Networks

Intelligent and Distributed Localization of Nodes in Wireless Sensor Networks

Ibrahim S. I. Abuhaiba, Amina Y. Al-Salluta

Статья научная

In wireless sensor networks, the issue of nodes localization has taken a wide area of research. Most applications need to know the position of sensor nodes for reasons of optimal and fast data routing. In this paper, a new distributed localization algorithm based on Self Organizing Maps (SOMs) is proposed to determine the location of a node in a wireless sensor network. The proposed algorithm is classified as a range-free algorithm which uses only the connectivity information between nodes without the need to measure the time of arrival or signal strength as range-based algorithms require. It utilizes the neighborhood information and the well-known anchors' positions to calculate the estimated locations of nodes. Our algorithm is made up of two main stages. The initial estimated locations of nodes are calculated in the initialization stage, and fed to the learning stage in which a SOM is used to calculate the final estimated locations of nodes. By using the neighborhood information at the first stage, the algorithm has significantly reduced the SOM learning time and the number of iterations to converge. On the other hand, starting with real data rather than random data maximized the accuracy of the resulted locations. Furthermore, the distributed implementation of the algorithm highly alleviated the pressure on the wireless nodes which are characterized with low power and limited capabilities. The proposed algorithm has been implemented using MATLAB software and experimented by deploying different number of nodes in a specific area with different communication radio ranges. Extensive simulations evidently verified the performance of the algorithm and achieved a very good accuracy. Moreover, the algorithm proved its effectiveness with a lower average error and lower number of iterations compared to other related algorithms.

Бесплатно

Intelligent software defined atmospheric effect processing for 5th generation (5G) millimeter wave (MMWave) communication system

Intelligent software defined atmospheric effect processing for 5th generation (5G) millimeter wave (MMWave) communication system

S. K. Agrawal, Kapil Sharma

Статья научная

In this paper, we present atmospheric effect on 5th Generation (5G) millimeter wave (MMWave) communication system. Atmospheric effects for Delhi (India) based 5G communication system is calculated as per Delhi atmospheric conditions. Atmospheric impairments are major cause of degrading mmWave signal power while mmWave propagation in wireless channel. Due to Atmospheric impairments attenuation takes place and major impairments are like water vapour, oxygen, rain and fog for Delhi (India). 5G mmWave attenuation calculations are performed for the mmWave band frequencies 28 GHz, 37 GHz and 39 GHz. In this paper intelligent adaptive transmitter based on trend of the atmospheric conditions tunes to machine learning (ML) based derivation of channel capacity. The ML based transmitter is a supervised ML device and it has provision of self teaching learning machine based on data. Results are graphed for the mentioned frequencies and also intelligently software defined (SD) Shannon channel capacity calculated for Delhi (India) based 5G mmWave communication system under different atmospheric conditions.

Бесплатно

Interference Mitigation Techniques for Spectral Capacity Enhancement in GSM Networks

Interference Mitigation Techniques for Spectral Capacity Enhancement in GSM Networks

Ahmed M. Alaa, Hazim Tawfik

Статья научная

Random Frequency Hopping (FH) is a key feature of GSM networks that allows for capacity enhancement. The increased co-channel interference experienced in networks with tight frequency reuse schemes can be mitigated by adopting frequency hopping. Frequency hopping diversifies the interference signals over sparse transmitted bursts. This effect is called Interference Diversity. Interference Diversity allows the Forward Error Correcting codes (FEC) to easily correct the corrupted bits. Thus, frequency hopping allows the network operator to use a tighter frequency reuse scheme without exhibiting higher levels of co-channel interference. Discontinuous Transmission (DTX) is another interference mitigation method that utilizes the user’s silence frames to reduce the transmitted power, while Power Control (PC) links the transmitted handset power with its relative distance from the Base Station (BTS). In this work, we study the impact of random FH, DTX and PC on the Spectral Capacity of GSM cellular networks by means of combined link level and system level simulation. It is shown that a spectral capacity gain is obtained in a 3/9 reuse scheme that deploys PC, DTX and FH compared to a conventional 4/12 reuse scheme.

Бесплатно

Interference Mitigation in Wireless Communication – A Tutorial on Spread Spectrum Technology

Interference Mitigation in Wireless Communication – A Tutorial on Spread Spectrum Technology

Cosmas Kemdirim Agubor, Akinyinka Olukunle Akande, Reginald Opara

Статья научная

This paper focuses on Spread Spectrum technique and its interference mitigation feature as applied in wireless communication. With spread spectrum technology it is possible to implement the transmission of multiple signals over wider ranges of spectrum without resulting to interference from other signals transmitted over the same frequencies. It does this by rejecting any received signal that does not carry the proper code. Interference rejection, one of the several features of spread spectrum technology is a difficult concept to understand. It is therefore proper to x-ray this topic in a less complex manner so that it can be well understood by those who are not mathematically grounded. In view of this a further simplified approach in presenting this subject is necessary. A tutorial approach is used to simplify this subject for better understanding and how this feature is used in Code Division Multiple Access (CDMA) systems. To show how multipath interference rejection is achieved in CDMA systems simple equations and schematics were used. The discussions cover the method of code recognition at the receiver which serves as a technique for interference mitigation. The paper helps to understand the theory of code recognition in Spread Spectrum, and thus provides answer to the question on how does interference mitigation or rejection in spread spectrum works?

Бесплатно

Interference mitigation and mobility management for D2D communication in LTE-A networks

Interference mitigation and mobility management for D2D communication in LTE-A networks

Ravindra S., Siddesh G. K.

Статья научная

Interference and Mobility management are the main parameters which affect the signal capacity and reduce the transmission efficiency for D2D communication in LTE-A networks. When the users are in the same spectrum, due to the coexistence of D2D pairs and cellular users interference management becomes a critical issue. In this paper, we introduce an interference management algorithm that maximizes the performance of D2D communication in LTE-A networks for both uplink and downlink transmissions. Optimal routing selection techniques reduce the total path distance which helps to minimize the interference and improve the overall network capacity. Mobility management is also a challenging issue in IP-mobile networks. When two DUEs change their locations from one BS to the other, handover delay calculation becomes very important to maintain the communication without interruption. In this paper we show power control techniques which helps to reduce the effect of interference and also we addressed a method for the lower delay under complex mobility issues with uninterrupted D2D communication.

Бесплатно

Internet Rescue Robots for Disaster Management

Internet Rescue Robots for Disaster Management

Punith Kumar M. B., Sumanth S., Manikant Amaresh Savadatti

Статья научная

The prototype development of Rescue Robot can help search and rescue teams with their difficult and life-saving tasks. Unmanned Aerial vehicles (UAVs) and Unmanned Ground vehicles (UGVs) are viewed as two separate entities. However, upon closer examination, we can classify them into a closely-coupled system where both are just seen as separable parts of the body of one robotic entity, whose body parts can separate temporarily and acquire together again later. In this prototype, a mobile robot UGV can be used as transport and landing station for a light-weight quadcopter UAV. UAV has separable long-range vision system which provides the top view of environment for the UGV, separable images are stitched and transformed into maps and utilized for rescue operations. This rescue robot contains a combination of UGV and UAV. It is equipped with a strong manipulator arm, used for debris removal, shoring operations, and delivering medicines/ food on very rough terrain. It has light detection and ranging (lidar) sensors, cameras, enabling it to look for victims and for mapping semi-destroyed buildings. The UGV can send visual feedback to the operator at a remote location. The UAV drone has a camera for an aerial view and mapping of the place. Working in conjunction with one another and thus the human search and rescue workers, these robotic assets form a strong team, increasing the effectiveness of search and rescue operations. This project aims at the realization of a new generation of search and rescue robot which can work in semi-autonomous and wireless modes and can be used in harsh physical environments of disaster regions to hold out the given tasks more effectively by the utilization of advanced and economic sensors. the problem domain of earthquake disasters and search and rescue processes is clarified with introducing an overview of this project. Disasters unsettle the economic and social stability of society. Shortage of skilled rescue work forces, also because the risks involved in search and rescue operations, are getting foremost problems during an emergency situation. In this paper rescue robot were designed, implemented in a real time environment and analyzed the result.

Бесплатно

Interoperability in connected vehicles – a review

Interoperability in connected vehicles – a review

Shaik Mazhar Hussain, Kamaludin Mohamad Yusof, Shaik Ashfaq Hussain

Статья научная

The introduction of automated transportation system and implementation of connected vehicle system has made interoperability even more critical than before in order to ensure effective connectivity , consistency , accuracy and reliable performance.Connected vehicles are employed with in vehicle sensor networks to collect , store , process and communicate with neighbouring vehicles to help drivers making life saving decisions. Connected vehicle systems enable the exchange of communication between a vehicle and world. Some vehicles may only receive communication, other vehicles may only send data and some may receive and send data. Hence it is essential that all systems , devices need to work together in a safe, trusted , efficient manner. Devices/Sensors embedded in vehicles follow different communication protocols as the sensors or devices are manufactured by different vendors. Hence management of coordination between devices is of much importance in Dynamic, Mobile, Heterogeneous environments such as connected vehicles. Hence, there is a need to create seamless interoperability to enable connected vehicles. It is required to enable intelligent transportation system (ITS) system/devices in Vehicles to effectively connect and communicate with other systems/devices. The adaptability of Interoperability when the devices are adhere to dynamics and mobile in nature becomes tedious and cumbersome. Solutions to interoperability is not much explored in literature. Existing interoperability solutions does not guarantee to articulate for high mobile environments such as connected vehicles where vehicles are highly mobile in nature and moving at varying speeds. The paper summarizes connected vehicles issues and challenges, current interoperability solutions, the impact of interoperability in connected vehicle scenario and demonstrates the effect of conversion time delay when exchanging data between source and destination pairs.

Бесплатно

Interpretable Fuzzy System for Malicious Domain Classification Using Projection Neural Network

Interpretable Fuzzy System for Malicious Domain Classification Using Projection Neural Network

Rajan Prasad, Praveen Kumar Shukla

Статья научная

In this study, we suggest an interpretable fuzzy system for the classification of malicious domains. The proposed system is integration of Sugeno type fuzzy system and projection neural network, the main advantage of interpretable fuzzy system is to classify the patterns and self-explainable capability. Whereas the projection network is used to exact mapped fuzzy inference rules to the network's projection layer. On the other hands, the system is able to deal with large amount of real-time data. The proposed model is tested malicious URL datasets collected from Alexa. The experimental results show that the system is able to classify malicious domain with high accuracy and interpretability as compared to existing methods. The proposed model is usefull to classify malicious attacks and explain the couses behind the decision. The evaluation of model based on confusion matrices, ROC and the nauck index is used for the interpretability assessments.

Бесплатно

Introducing a Novel Algorithm for Energy Consumption Management for M2M Network Expandability Through Topology Control within Nodes

Introducing a Novel Algorithm for Energy Consumption Management for M2M Network Expandability Through Topology Control within Nodes

Akbar Majidi, Mohamad Amini

Статья научная

The wireless sensor networks are most important developers of machine-to-machine communication (M2M) networks. In each node of sensor, transmission power is the most important energy consumption factor, which is considered as the most important challenge for expansibility of M2M network. One strategy to cope with this problem is topology control algorithm. This algorithm consists of two topology design and topology maintenance phases. The focus of most works conducted in this field is on design topography. However, topology maintenance should be also considered during the topology control design. To prolong network life through the energy consumption management in the nodes, in this paper an algorithm is proposed which considers both topology design and maintenance. The simulation results obtained using NS-2 simulator prove innovation and higher performance of the proposed model.

Бесплатно

Investigating Coupling Interactions in Split-Ring Resonator Dimers

Investigating Coupling Interactions in Split-Ring Resonator Dimers

Akaa Agbaeze Eteng, Ngozi Peggy Udeze

Статья научная

Topological wireless power transfer (TWPT) arrays provide directional power transfer, which are robust to external disturbances. Often realized as a chains of dimers, the ability to adjust the coupling between constituent resonator elements is an important means of establishing necessary conditions for power transfer. This paper explores the coupling interactions that are possible within dimers consisting of paired split-ring resonators (SRRs) in close proximity. Transfer efficiencies and through impedances are computationally studied for various rotational orientations of edge-and broadside-coupled SRRs. The obtained results reveal that relative rotational orientation can be employed as a sensitive design parameter to provide a variety of high- and low-coupling options within and between SRR dimers, with different power transfer efficiency implications.

Бесплатно

Investigating the relationship between coverage area and propagation profile

Investigating the relationship between coverage area and propagation profile

Adenodi Raphael Adewale

Статья научная

This study investigates the relationship between coverage area and propagation profile. Most studies on propagation profile do not link the profile with the coverage area of the transmitter and vice versa. Using both coverage area and propagation profile to describe the variations of electric field intensity of propagating wave makes a vivid description of the transmitter performance. This study creates propagation profile from the contour of coverage area of Benue Radio transmitter. Data for the study were collected during a measurement campaign carried out around the transmitter. The data were interpolated to produce a contour of the coverage area. A cross sectional profile elicits from the contour of coverage area at equally spaced eight different vertical plains provides the propagation profiles of the transmitter. This was achieved by transforming the coordinates of the contour of coverage area into distance thus producing a two dimensional plain from a three dimensional contour. Values of coordinates and electric field intensity were taken from some points on the contour and were compared with the equivalent positions on the propagation profile yields the same value of electric field intensity and equivalent position in distance. Similar procedure was carried out on the propagation profile provides the same value of electric field intensity and equivalent positions in terms of coordinates. The study concludes that propagation profiles are cross sectional parts of coverage area.

Бесплатно

Investigation of application layer DDoS attacks using clustering techniques

Investigation of application layer DDoS attacks using clustering techniques

T. Raja Sree, S. Mary Saira Bhanu

Статья научная

The exponential usage of internet attracts cyber criminals to commit crimes and attacks in the network. The forensic investigator investigates the crimes by determining the series of actions performed by an attacker. Digital forensic investigation can be performed by isolating the hard disk, RAM images, log files etc. It is hard to identify the trace of an attack by collecting the evidences from network since the attacker deletes all possible traces. Therefore, the possible way to identify the attack is from the access log traces located in the server. Clustering plays a vital role in identifying attack patterns from the network traffic. In this paper, the performance of clustering techniques such as k-means, GA k-means and Self Organizing Map (SOM) are compared to identify the source of an application layer DDoS attack. These methods are evaluated using web server log files of an apache server and the results demonstrate that the SOM based method achieves high detection rate than k-means and GA k-means with less false positives.

Бесплатно

Investigations with All Optical Binary Subtractor Network at 100Gbps

Investigations with All Optical Binary Subtractor Network at 100Gbps

Devendra Kr. Tripathi

Статья научная

This article demonstrates for the proposed all optical binary subtractor network. Performance explored by exploiting nonlinear attribute the cross gain modulation with semiconductor optical amplifier which otherwise considered as cons if used as an amplifying tool. Numerical simulations have been executed, accordingly accustomed data inputs at 100Gbps data rate employed, generated aspired difference and the borrow outputs concurrently. The design’s performance for the non return to zero, return to zero and Manchester modulation formats have been analyzed, according to it is key performance parameter the extinction ratio. Investigations inferred optimum performance for the non return to zero modulation format outcome extinction ratio of 13.5dB,together with difference and borrow output have been successfully confirmed. Further designs execution with non return to zero modulation format for the key parameters range of data rates, laser peak power, the normalizer power, pump current, the current injection efficiency and the modulator bias voltage have been evaluated. Evaluation inferred that optimum performance is subject to the pertinent election of the vital design parameters. The proposed design is simpler by virtue of key attributes low power consumption and stability altogether with higher integration capability as well provides output generation simultaneously at higher data rate. It was lacking with preceding elucidations. Accordingly, this illustration could be an assistance towards novel contemporary complex digital optical computing combinational networks.

Бесплатно

IoMT Survey: Device, Architecture, Communication Protocols, Application and Security

IoMT Survey: Device, Architecture, Communication Protocols, Application and Security

Dina Riyadh Ibrahim, Mohammed Younis Thanoun

Статья научная

The technology-based lifestyle has led to a rise in people suffering from obesity, which in turn has led to the emergence of many chronic diseases such as elevated blood sugar and blood pressure, this give researchers a good reasons to develop Internet of Things networks, as the entry of technical innovations has led to Artificial intelligence in the medical field has revolutionized the provision of medical services and facilitated the lives of patients, from monitoring blood sugar levels to using remote surgery techniques, as it has saved a lot of effort and money for both the doctor and the patient at the same time, but these advantages open a wide scope for many problems as well. This survey studied the medical Internet of Things network in terms of presenting the definition, structure, types of devices used, their applications, and some of the communication protocols used in it. The attacks that the medical Internet of Things network may be exposed to were also classified based on the concerns they cause, and the solutions proposed by the researchers were presented. On the other hand, the previous works of the researchers were classified according to the types of devices used, communication protocols, and network security. In each of the mentioned parts, what the researchers have done and their contributions in this field were discussed, analyzed, and a review of the proposed future works in the used literature was presented.

Бесплатно

Issues of Organizing the Architecture of Processes for Identifying Digital Entities and Services

Issues of Organizing the Architecture of Processes for Identifying Digital Entities and Services

Viktor Vyshnivskyi, Vadym Mukhin, Vitalii Kotelianets, Yuri Kargapolov, Valerii Zavgorodnii, Oleksandr Vyshnivskyi

Статья научная

The article discusses the solution to the issue of information systems architecture, which makes it possible to separate identification flows associated with the processes of managing the identification of digital entities and data flows associated with the processes of managing data describing the properties of digital entities. At the same time, a new architecture of connections between digital entities and services is proposed, which makes it possible to create a flexible system for processing the properties of identifiers that can be described in an irregular and unstructured form. In this case, the nomenclature of the parameters of the properties of a digital entity can be customized and expanded as a separate entity, which always maintaining a connection with the identifier. This allows, within the framework of the information system, on the one hand, to adapt any identification systems and ensure the solution of convergence requirements, to ensure compliance and solution of the requirements of recognition, immutability, stability in conditions of processing large volumes of data without implementing generally accepted principles of a global unique permanent identifier, and on the other hand, build flexible connections between digital entities and services.

Бесплатно

Joint Beam-Power Coordinative Scheduling of Neighboring Sectors in Cellular Systems

Joint Beam-Power Coordinative Scheduling of Neighboring Sectors in Cellular Systems

Fei Ji, Ying Liu, Fangjiong Chen, Xiaodong Chen, Shangkun Xiong

Статья научная

Beam cooperative scheduling of downlink transmission is an important technique to improve the spectrum efficiency in next generation mobile networks. This paper focuses on switched beams (the emission angles of the beams are fixed) and proposes a joint beam-power coordinative scheduling algorithm among neighbor sectors in the downlink of mobile systems. Each sector coordinates the applied order and transmitted power of the beams with adjacent interfering sector, so as to reduce inter-sector interference and maximize throughputs. This scheduling problem is modeled as a constrained optimization problem and solved by our proposed iterative approach. Computer simulation shows that the proposed approach significantly outperform the existing round robin beam servicing approach and the approach that applies only beam cooperative scheduling.

Бесплатно

Keywords Review of IT Security Literature in Recent 20 Years

Keywords Review of IT Security Literature in Recent 20 Years

QIAN Liping, LIN Yan, WANG Lidong

Статья научная

The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have been funded aiming to online scientific literature mining, especially in biomedical research. Scientific literature covers most of the hot topics in the research field and has a very large domain-specific vocabulary. The exploitation of domain knowledge and specialized vocabulary can dramatically improve the result of literature text processing. The purpose of this paper is to identify the frequently used keywords in IT security literatures. The result then can be utilized to improve the performance of automatic IT security document retrieval, identification and classification. Our method is to query CiteseeX to retrieve source data of paper description information and build an artificially annotated corpus. Over the corpus, we perform words frequency statistics, word co-occurrence analysis, discrimination index computation, retrieval efficiency analysis and thus build a lexicon of IT security based on our experimental result. The lexicon can further be used in improving retrieval performance and assisting new words discovering and document classification.

Бесплатно

Журнал