Статьи журнала - International Journal of Wireless and Microwave Technologies
Все статьи: 532
Performance Analysis of FBMC over OFDM for High Data Rate MIMO Configurations
Статья научная
The burgeoning demand of high data rate in next generation wireless communication, the antecedent of the evolution of new multicarrier modulation technique FBMC (Filter Bank Multicarrier) system is OFDM (Orthogonal Frequency Division Multiplexing). Although OFDM has numerous merits but it consumes higher bandwidth due to its cyclic prefix to eliminate ISI (Inter Symbol Interference) in fading channel and shows large PAPR (Peak to Average Power Ratio) in transmission system. To mitigate these problems, FBMC is more suitable candidate in high speed MIMO (multiple input multiple output) system. At first, in this paper, the responses of OFDM and FBMC system have been analyzed with AWGN and Rayleigh fading channel under theoretical and simulation environment. Besides this, Peak to Average Power Ratio (PAPR) with reduction technique, clipping is applied to know the behavior of these systems. Finally, in the area of MIMO scheme, each system is concatenated with MRC, Alamouti STBC and Generalized STBC to find FBMC as superior contender for 5G. Results show that using 16 QAM modulation, BER performance of FBMC significantly achieves 2dB compared to error rate of OFDM in theoretical and empirical analyses under AWGN and Rayleigh channel. Moreover, the clipping technique enhances the response of FBMC in terms of PAPR compared to OFDM approximately 0.5 dB. In MIMO configurations, MRC-FBMC exhibits the improved performance with 2 dB approximately over MRC-OFDM system. Results also show that in the case of Alamouti STBC, at 30dB and 35dB, FBMC (2×1) and (2×2) configurations achieve BER improvement 5×10-4, 3×10-4 respectively than OFDM (2×1) and (2×2) configurations. Generalized STBC investigation reveals that to reach FBMC BER performance, OFDM needs at least 2dB increment at specific error rate. In a nutshell, this paper brings up three distinct types of appealing features of FBMC such as good BER response, reduced PAPR, and suitability in MIMO configuration compared to OFDM. These distinct features make FBMC an ultimate choice in the emerging areas of MIMO networks.
Бесплатно
Performance Analysis of HWMP Protocol in Wireless Mesh Network
Статья научная
Wireless Mesh Networks (WMNs) play a vital role in next-generation wireless networking, with applications ranging from last-mile wireless internet, transportation systems enterprise, enterprise networks, home networking, and wireless community networks are all examples of wireless community networks.Individual vendors created several proprietary mesh systems, but IEEE organized the IEEE 802.11s task force to design a meshed networking exposition to assure interoperability.In this paper, we evaluate the Quality of service parameters such as throughput, delay, PDR and jitter of mesh protocol.We simulated the HWMP protocol's performance,the present work is an attempt to address the problem related to wireless mesh networks by minimizing the delay and maximizing the throughput of the network.
Бесплатно
Performance Analysis of IoT Cloud-based Platforms using Quality of Service Metrics
Статья научная
There are several IoT platforms providing a variety of services for different applications. Finding the optimal fit between application and platform is challenging since it is hard to evaluate the effects of minor platform changes. Several websites offer reviews based on user ratings to guide potential users in their selection. Unfortunately, review data are subjective and sometimes conflicting – indicating that they are not objective enough for a fair judgment. Scientific papers are known to be the reliable sources of authentic information based on evidence-based research. However, literature revealed that though a lot of work has been done on theoretical comparative analysis of IoT platforms based on their features, functions, architectures, security, communication protocols, analytics, scalability, etc., empirical studies based on measurable metrics such as response time, throughput, and technical efficiency, that objectively characterize user experience seem to be lacking. In an attempt to fill this gap, this study used web analytic tools to gather data on the performance of some selected IoT cloud platforms. Descriptive and inferential statistical models were used to analyze the gathered data to provide a technical ground for the performance evaluation of the selected IoT platforms. Results showed that the platforms performed differently in the key performance metrics (KPM) used. No platform emerged best in all the KPMs. Users' choice will therefore be based on metrics that are most relevant to their applications. It is believed that this work will provide companies and other users with quantitative evidence to corroborate social media data and thereby give a better insight into the performance of IoT platforms. It will also help vendors to improve on their quality of service (QoS).
Бесплатно
Performance Comparison Of Beamforming And Multiplexing Techniques Using Smart Antenna Array
Статья научная
Meeting the demands that are expected from future wireless generation networks poses intriguing challenges for today's wireless system designers. The demand for higher data rate and better quality of service (QoS) in wireless communications continue to grow rapidly in current world global community. Obtaining these requirements becomes challenging for wireless communication systems due to the problems of channel fading, higher power and bandwidth limitations. One of the most promising solutions to this problem is the Multiple Input Multiple Output (MIMO) system. This paper compared the performance of spatial multiplexing MIMO scheme with beamforming at a data rate of 100Mb/s. The proposed wireless system was developed with smart antenna arrays at both the transmitter and receiver. The results obtained show that spatial multiplexing technique produced better spectral efficiency than beamforming. The BER performance of beamforming technique outperforms that of spatial multiplexing technique even when enhanced by V-BLAST algorithm under the same simulation environment. The proposed system outperforms the conventional MIMO.
Бесплатно
Статья научная
The fifth generation (5G) wireless technology has a significant impact on individuals' lives and work, and this impact is expected to increase in the future. The Orthogonal Frequency Division Multiplexing (OFDM) method, which is currently used in fourth generation (4G) technology, has limitations in meeting certain criteria such as data rates and speed for the latest technology due to issues such as sideband leakages, high Peak-to-Average Power Ratio (PAPR), and poor spectrum utilization. Additionally, the increasing demand for Internet of Things (IoT) and user-centric processing makes the OFDM method impractical. As a result, alternative technologies are being explored to meet these needs. Filter Bank Multicarrier (FBMC) and Universal Filtered Multicarrier (UFMC) are potential candidates for 5G technology. This paper focuses on the evolution of FBMC from OFDM, and then compares the performance of FBMC and UFMC by analyzing various modulation schemes such as Quadrature Amplitude Modulation (QAM), Phase Shift Keying (PSK), PAPR, and Bit Error Rate (BER) through Additive White Gaussian Noise (AWGN) and Rayleigh fading channels. A theoretical BER model is also established to validate the simulated BER results. In this paper BER is analyzed in terms mathematical and simulation based approaches. To validate this simulation based method, it can be compared with the theoretical BER results to verify the accuracy of this simulation. Result portays that, the theoretical results and the simulated results are quite close through the Additive White Gaussian Noise (AWGN) channel.
Бесплатно
Статья научная
In this paper, we have investigated the performance of IEEE 802.15.3a channel model with different modulation scheme. The performance parameter Average Bit Error Rate (ABER) is selected. We find out the BER performance of UWB system over the 802.15.3a indoor channel model for all channels profile CM1, CM2, CM3 and CM4 with different modulation scheme. In this paper, all modulation scheme used in UWB are included in different main categories. The major categories are synchronous and asynchronous. In synchronous mode, we again divided different modulation scheme e.g. BPSK, PPM, PAM etc into antipodal and orthogonal schemes. In the asynchronous category, we have studied about DPSK. All these modulation categories are comparing on the common platform and finally we got antipodal modulation scheme category is good for UWB in term of ABER.
Бесплатно
Performance Evaluation of Channel Codes for High Data Rate Mobile Wireless System
Статья научная
Mobile wireless system incorporates dual sphere in terms of mobility as well as computing. Such systems have revamped momentously resulting in expedient wireless devices. Current wireless communication requires enormous data rates, streaming audio/video, asymmetric access/multiple access, fully-integrated, low cost, reliable seamless systems with the capability of providing voice, high speed data, and video with minimum latency and long battery life to enhance error free communication. However, there are many obstacles and bottlenecks to achieving this in practice. These bottlenecks include limited spectrum, limited energy, multipath fading and propagation loss, cost, standardization processes. This paper focuses on coding and modulation techniques for wireless communications so as to reduce/overcome many of these obstacles. To put the discussion in perspective, a short background on the coding and modulation approaches of wireless communication systems is provided. The turbo coding is mainly chosen to facilitate the wireless communication. The paper enlightens the impetus behind using turbo codes for high data rate mobile wireless systems. Paper explains how better out-turns can be yielded when approaches like cyclic redundancy check and scrambling are embedded with coding. The BER performance and SNR ratio are observed for illustrating variance between convolution and turbo coding for different rates and modulations. Simulation results are plotted using Matlab software.
Бесплатно
Статья научная
Convergecast communication is used in many sensor applications .The flow of data in convergecast routing is from many to one i.e. many sensory nodes sense the data and send through parent child relation to the root node or sink node. Convergecast routing is always followed by broadcasting. In broadcast communication is from one to many and in convergecast it is from many to one. As sensor nodes have limited battery capacity main focus is to save energy. As compare to wired network wireless network is prone to attacks and it is less reliable than the wired network. This paper investigates the affect of header length of network layer on the BER, SNIR, backoff duration, SNR and latency of convergecast routing with the help of omnet++ simulator.
Бесплатно
Статья научная
The advancement of wireless communication technology is growing very fast. For next-generation communication systems (like 5G mobile services), wider bandwidth, high gain, and small-size antennas are very much needed. Moreover, it is expected that the next-generation mobile system will also support satellite technology. Therefore, this paper proposes a slotted star-shaped dual-band patch antenna that can be used for the integrated services of satellite communication and 5G mobile services whose overall dimension is 15×14×1.6 mm3. The proposed antenna operates from 18.764 GHz to 19.775 GHz for K-band satellite communication and 27.122 GHz to 29.283 GHz for 5G (mmWave) mobile services. The resonance frequencies of the proposed antenna are 19.28 GHz and 28.07 GHz having bandwidths of 1.011 GHz and 2.161 GHz, respectively. Moreover, the proposed dual-band patch antenna has a maximum radiation efficiency of 76.178% and a maximum gain of 7.596 dB.
Бесплатно
Статья научная
This paper presents a microstrip patch antenna incorporated with electromagnetic band gap (EBG) structure on substrate and defected ground structure (DGS) in the ground plane. Electromagnetic Band Gap materials are artificially engineered structures that improve the performance of the patch antennas. It is manifested that applications of both EBG and DGS outcomes in the remarkable improvement of return loss level from -20.2dB to -31.5dB and bandwidth from 155MHz to 202 MHz respectively. The most fascinating characteristic of the proposal is the capability of increasing the gain, directivity and the total efficiency of the antenna without affecting the other essential parameter like bandwidth which makes the designed antenna applicable for Radio Frequency portable devices operating at 6.1 GHz.
Бесплатно
Performance analysis of NLM interleaving scheme for CPM OFDM system
Статья научная
A New Logistic Map interleaving is the most common method for continuous phase modulation based orthogonal frequency division multiplexing (CPM-OFDM) system over a fading channel. The selection of a "good" interleaver having to express in order that the interleavers are weakly correlated. Interleaver doesn’t involve massive memory to reserve it and a massive bandwidth to communicate in the midst of the transmitter and the receiver, and need to be simple to produce. An efficient chaotic maps randomization (CMR) generates scrambled uncorrelated randomized data can greatly improved the performance of CPM-OFDM system and improved symbol error rate (SER) could be attained. In this study, advise a new one-dimensional chaotic map, the "New Logistic Map (NLM)". Encryption is carried out with logistic map even as a chaotic logistic map interleaving process is used to boost the immunity to noise and fading in communication channel. Furthermore, a evaluation between NLM interleaving and random interleaving is performed in terms of bit error rate(BER).Simulation results shows that the data transmission over wireless channel using propose NLM interleaving is more immune to fading and noise and get better the performance of CPM-OFDM system.
Бесплатно
Performance optimization of ad hoc on demand vector routing protocol in cognitive radio network
Статья научная
Mobile Ad Hoc Network has given importance in last few years by researchers. Implementations of Ad Hoc network in cognitive radio environment are emerging kind of wireless network [1, 5]. The communication is done by the secondary user in the free frequency band available in the spectrum of the primary user. In this paper, we have projected proficient routing solution by the maintenance of the link for AOMDV protocol for cognitive radio ad hoc Network. We have used ns2 Simulator for simulations. The link maintenance makes the system more efficient that is evaluated by simulation and comparing it with a classical routing protocol.
Бесплатно
Polynomial Algorithm for Node Deployment in Hybrid Wireless Sensor Networks
Статья научная
When detecting a target or monitoring a physical phenomenon in a region, the deployment problem is fundamental in these applications. Traditionally, stationary sensor networks are deployed to carry out the sensing operations. It is well known that the mobility of sensor nodes can improve the coverage and the probability of the detecting, so we deal with the problem of detecting a target using hybrid sensor networks which contain both stationary sensors and mobile sensors. In this paper, to begin with, we prove that the node deployment problem is NP-complete. Then, one polynomial algorithm for node deployment in hybrid wireless sensor networks is proposed, which aims at minimizing the number of all sensors to reduce the cost. The simulations verify the efficiency of our algorithm.
Бесплатно
Positioning Algorithm for Wireless Sensor Network Based on Adaptive Genetic Algorithm
Статья научная
It is very important for wireless sensor network to position the nodes’ location because location information is favorable for providing network service such as geographic routing, people tracking and so on. After researching the range-based atomic multilateration algorithm carefully, this paper presents a novel positioning algorithm based on adaptive genetic algorithm (AGA). The new positioning algorithm uses adaptive genetic algorithm to search the optimal solution of nonlinear multivariate positioning equations set. Furthermore, the proposed algorithm uses a new model to estimate range error in order to improve the localization accuracy. Simulation results show that the proposed scheme has better robust performance. Compare with general genetic algorithm, adaptive genetic algorithm has better localization accuracy and higher speed of convergence.
Бесплатно
Power Allocation for Balancing Spectrum Efficiency and Power Consumption in Cognitive Relay Networks
Статья научная
In order to guarantee the QoS requirement of secondary users and not to affect the outage probability of primary user in cognitive relay networks, we propose two optimal power allocation models: (1) maximizing the transmission rate of secondary users; (2) minimizing the total power consumption. Theory analysis shows that two optimal power allocation models conflict between spectrum efficiency and power consumption. Furthermore, an optimal power allocation model which joints the transmission rate and the total power consumption in cognitive relay networks is proposed. By using the Lagrangian method, the optimization algorithm for this model is designed. The proposed algorithm can achieve the trade-off between the transmission rate and the total power consumption by varying the weight. Simulation results show that the proposed algorithm can effectively adjust the transmission rate and the total power consumption of secondary users.
Бесплатно
Power Factor Analysis of the Linear Motor in Mines
Статья научная
This paper introduces the structure of linear motor in mines. Analyze the power relation of power-AC -linear motor – vibrant machine, based on this, count the power factor; and make mechanical analysis to the vibrancy, get the power factor, which should be: in the precondition of without collision for the top and bottom magnet, do best to decrease the δ_0 to close to ΔΧ_m (ΔΧ_m depends on the technique of the vibrant load), make Κ_δ close to 1 and λ_e close to critical maximum λ_(em) . It is significantly useful to design linear motor.
Бесплатно
Статья научная
Prediction of location has gained lot of attention in different applications areas like predicting the path or any deviation like taxi-route, bus route, human trajectory, robot navigation. Prediction of the next location or any path deviation in RFID enabled supply chain path followed in the process is quite a novel area for the related techniques. The paper defines the architecture for the outlier detection in RFID enabled Supply Chain Path based on historical datasets .Given the training datasets, different classification models are compared for the accurate prediction of the outlierness of the path followed by the tagged objects read by RFID readers during the supply chain process. Comparison of Hidden Markov Model(HMM), XGBoost(decision tree based boosting),Recurrent Neural Network(RNN) and state of art technique in RNN known as Long Short Term Memory (LSTM) is done .To our knowledge LSTM has never been used for this application area for outlier prediction. For the longer path sequences, LSTM has outperformed over other techniques. The training datasets used here are in the form of the record of the outlier positions in particular path and at particular time and location.
Бесплатно
Preserving privacy in cloud identity management systems using DCM (Dual Certificate Management)
Статья научная
In these days all businesses trying to use global applications on cloud computing infrastructure to reduce their costs and also decentralize their application. This movement also causes more security risks over the unbounded cloud environment. Therefore, accessing enterprise information for an unwanted user will be more than other environments. Thus, the proposed Identity Management System (IDMS) tries to preserve security in communication between clients and server over cloud computing. The proposed method suggested token based Identity Management and also enhanced privacy by adding one. Dual Certificate Manager (DCM) block is a replacement for a combination of symmetric and asymmetric cryptography, which is commonly used for SSL/TLS protocol to immune data transmission, uses asymmetric cryptography in both participants. Furthermore, for more privacy and invulnerability DCM uses Elliptic Curve Cryptography (ECC) as asymmetric cryptography algorithm.
Бесплатно
Prevention of session hijacking attack in VANETs using intrusion detection system
Статья научная
Vehicular Adhoc Networks (VANET) is a type of road network that provides road safety and other infotainment applications to drivers and passengers for an effective and uninterrupted communication. In this network, the communication between the vehicles are equipped with the Road Side Units (RSU). VANET is the major component of Intelligent Transportation System (ITS). Research on Vehicular Adhoc network security presents many challenging issues to the researchers. The security mechanism available for VANETs are not highly effective. Hence it is as on time requirement of new and sophisticated security solutions. This paper mainly focuses on Intrusion Detection System (IDS) for VANETs to prevent Session Hijacking Attack (SHA). The work discusses on the total number of packet generated, sent, received and dropped with varying number of nodes with the help of Network Simulator-2 (NS2) and the inferred results are discussed.
Бесплатно
Статья научная
Pertaining to the rapid usage of cloud computing, cloud based approaches are growing as an fascinating domain for numerous malignant tasks. Security is one of the vital issues faced by the cloud computing environment while sharing resources over the internet. Consumers are facing distinct security hazards while using cloud computing platform. Previous works mainly attempted to mitigate the side channels attacks by altering the infrastructure and the internal procedures of the cloud stack. However, the deployments of these alterations are not so easy and could not resist the attacks. In this paper, the authors attempted to solve the issues by enhancing the VM Placement policies in such a way that, it is complex for the invaders to collocate their object. A secure Dynamic VM placement approach is presented for the VM allocations into different servers in the cloud. The performance comparison of the suggested methodology is shows that the proposed approach has better efficiency evaluations such as hit rate, loss rate and resource loss when compared to other V M placement policies.
Бесплатно