International Journal of Wireless and Microwave Technologies @ijwmt
Статьи журнала - International Journal of Wireless and Microwave Technologies
Все статьи: 562

Polynomial Algorithm for Node Deployment in Hybrid Wireless Sensor Networks
Статья научная
When detecting a target or monitoring a physical phenomenon in a region, the deployment problem is fundamental in these applications. Traditionally, stationary sensor networks are deployed to carry out the sensing operations. It is well known that the mobility of sensor nodes can improve the coverage and the probability of the detecting, so we deal with the problem of detecting a target using hybrid sensor networks which contain both stationary sensors and mobile sensors. In this paper, to begin with, we prove that the node deployment problem is NP-complete. Then, one polynomial algorithm for node deployment in hybrid wireless sensor networks is proposed, which aims at minimizing the number of all sensors to reduce the cost. The simulations verify the efficiency of our algorithm.
Бесплатно

Positioning Algorithm for Wireless Sensor Network Based on Adaptive Genetic Algorithm
Статья научная
It is very important for wireless sensor network to position the nodes’ location because location information is favorable for providing network service such as geographic routing, people tracking and so on. After researching the range-based atomic multilateration algorithm carefully, this paper presents a novel positioning algorithm based on adaptive genetic algorithm (AGA). The new positioning algorithm uses adaptive genetic algorithm to search the optimal solution of nonlinear multivariate positioning equations set. Furthermore, the proposed algorithm uses a new model to estimate range error in order to improve the localization accuracy. Simulation results show that the proposed scheme has better robust performance. Compare with general genetic algorithm, adaptive genetic algorithm has better localization accuracy and higher speed of convergence.
Бесплатно

Power Allocation for Balancing Spectrum Efficiency and Power Consumption in Cognitive Relay Networks
Статья научная
In order to guarantee the QoS requirement of secondary users and not to affect the outage probability of primary user in cognitive relay networks, we propose two optimal power allocation models: (1) maximizing the transmission rate of secondary users; (2) minimizing the total power consumption. Theory analysis shows that two optimal power allocation models conflict between spectrum efficiency and power consumption. Furthermore, an optimal power allocation model which joints the transmission rate and the total power consumption in cognitive relay networks is proposed. By using the Lagrangian method, the optimization algorithm for this model is designed. The proposed algorithm can achieve the trade-off between the transmission rate and the total power consumption by varying the weight. Simulation results show that the proposed algorithm can effectively adjust the transmission rate and the total power consumption of secondary users.
Бесплатно

Power Factor Analysis of the Linear Motor in Mines
Статья научная
This paper introduces the structure of linear motor in mines. Analyze the power relation of power-AC -linear motor – vibrant machine, based on this, count the power factor; and make mechanical analysis to the vibrancy, get the power factor, which should be: in the precondition of without collision for the top and bottom magnet, do best to decrease the δ_0 to close to ΔΧ_m (ΔΧ_m depends on the technique of the vibrant load), make Κ_δ close to 1 and λ_e close to critical maximum λ_(em) . It is significantly useful to design linear motor.
Бесплатно

Статья научная
Prediction of location has gained lot of attention in different applications areas like predicting the path or any deviation like taxi-route, bus route, human trajectory, robot navigation. Prediction of the next location or any path deviation in RFID enabled supply chain path followed in the process is quite a novel area for the related techniques. The paper defines the architecture for the outlier detection in RFID enabled Supply Chain Path based on historical datasets .Given the training datasets, different classification models are compared for the accurate prediction of the outlierness of the path followed by the tagged objects read by RFID readers during the supply chain process. Comparison of Hidden Markov Model(HMM), XGBoost(decision tree based boosting),Recurrent Neural Network(RNN) and state of art technique in RNN known as Long Short Term Memory (LSTM) is done .To our knowledge LSTM has never been used for this application area for outlier prediction. For the longer path sequences, LSTM has outperformed over other techniques. The training datasets used here are in the form of the record of the outlier positions in particular path and at particular time and location.
Бесплатно

Preserving privacy in cloud identity management systems using DCM (Dual Certificate Management)
Статья научная
In these days all businesses trying to use global applications on cloud computing infrastructure to reduce their costs and also decentralize their application. This movement also causes more security risks over the unbounded cloud environment. Therefore, accessing enterprise information for an unwanted user will be more than other environments. Thus, the proposed Identity Management System (IDMS) tries to preserve security in communication between clients and server over cloud computing. The proposed method suggested token based Identity Management and also enhanced privacy by adding one. Dual Certificate Manager (DCM) block is a replacement for a combination of symmetric and asymmetric cryptography, which is commonly used for SSL/TLS protocol to immune data transmission, uses asymmetric cryptography in both participants. Furthermore, for more privacy and invulnerability DCM uses Elliptic Curve Cryptography (ECC) as asymmetric cryptography algorithm.
Бесплатно

Prevention of session hijacking attack in VANETs using intrusion detection system
Статья научная
Vehicular Adhoc Networks (VANET) is a type of road network that provides road safety and other infotainment applications to drivers and passengers for an effective and uninterrupted communication. In this network, the communication between the vehicles are equipped with the Road Side Units (RSU). VANET is the major component of Intelligent Transportation System (ITS). Research on Vehicular Adhoc network security presents many challenging issues to the researchers. The security mechanism available for VANETs are not highly effective. Hence it is as on time requirement of new and sophisticated security solutions. This paper mainly focuses on Intrusion Detection System (IDS) for VANETs to prevent Session Hijacking Attack (SHA). The work discusses on the total number of packet generated, sent, received and dropped with varying number of nodes with the help of Network Simulator-2 (NS2) and the inferred results are discussed.
Бесплатно

Статья научная
Pertaining to the rapid usage of cloud computing, cloud based approaches are growing as an fascinating domain for numerous malignant tasks. Security is one of the vital issues faced by the cloud computing environment while sharing resources over the internet. Consumers are facing distinct security hazards while using cloud computing platform. Previous works mainly attempted to mitigate the side channels attacks by altering the infrastructure and the internal procedures of the cloud stack. However, the deployments of these alterations are not so easy and could not resist the attacks. In this paper, the authors attempted to solve the issues by enhancing the VM Placement policies in such a way that, it is complex for the invaders to collocate their object. A secure Dynamic VM placement approach is presented for the VM allocations into different servers in the cloud. The performance comparison of the suggested methodology is shows that the proposed approach has better efficiency evaluations such as hit rate, loss rate and resource loss when compared to other V M placement policies.
Бесплатно

Privacy Enhancing for Fog Computing based - IoT
Статья научная
With the massive inflation of newly developed technologies, recourse to data has become a necessity in light of the current inflation and excessive need dominating the world and developed societies. According to the control of millions of smart devices and sensors connected to an interconnected and controlled automated system within installed scales due to the services provided by IOT devices through the created fog layer that connects the cloud centers and those devices, in addition, very large amounts of that data including public and private are passed through the connection of Internet of Things devices to each other. Smart and advanced networks as one of the fog computing applications play a prominent and accurate role in the infrastructure for reliable and sound data transmission. Accordingly, the process of data aggregation is an important and common matter in the world of fog-enhancing Internet of Things, so preserving the privacy of that data is a matter of concern, and based on this principle, we propose in this paper a model for data aggregation that maintains privacy using a foggy computing environment called PPFDA (privacy preserving based- fog computing data aggregation). We use in our scheme DF homomorphic cryptosystem as it consider one of the aggregation models that ensures the privacy purpose. The theoretical results and analyzes show that our design is ensuring the privacy of data during collection using an algorithm of DF. The results confirm that the proposed scheme achieves security and privacy purposes in modern network systems for the Internet of things based in fog computing. In addition, it contributes significantly to the efficient performance of storage operations.
Бесплатно

Privacy Preserving Similarity Measurement
Статья научная
Data similarity measurement is an important direction for data mining research. This paper is concentrated on the issue of protecting the underlying attribute values when sharing data for the similarity of objects measurement and proposes a simple data transformation method: Isometric-Based Transformation (IBT). IBT selects the attribute pairs and then distorts them with Isometric Transformation. In the process of transformation, the goal is to find the proper angle ranges to satisfy the least privacy preserving requirement and then randomly choose one angle in this interval. The experiment demonstrates that the method can distort attribute values, preserve privacy information and guarantee valid similarity measurement.
Бесплатно

Probabilistic Constellation Extension Scheme for PAPR Reduction in OFDM Signals
Статья научная
In this paper, a combinational method is proposed to mitigate the peak-to-average power ratio problem in orthogonal frequency division multiplexing signals. The proposed algorithm is an intelligent combination of the constellation extension and probabilistic techniques. It is shown that proposed technique achieves the significant reduction in peak-to-average power on maintaining sufficient bit error rate with a slight increase in computational complexity compared to conventional schemes.
Бесплатно

Статья научная
Beibuwan Economical Zone of Guangxi Province has the necessary basis and conditions to develop the madicine manufacturing industry.It is significant to select products which ficilitate the development of madicine manufacturing industry from the prospective of promoting the development of the industry smoothly. The feature of selection of essential products of medicine manufacturing can be summarized as multi-objectiveness, multi-layer, fuzziness and the interaction and penetration of different objectives. Due to these characteristics, analysis is made through analytic hierarchy process (AHP) by this thesis. The paper put forward the developmental sequence of madicine manufacturing industry in Beibuwan Economical Zone of Guangxi Province by adopting analytic hierarchy process, and pointed out that, among others, the technical competence is the most influnctial factor of a company. The appropriate developmental sequence of the products selected is biological and biochemical products, medicinal chemicals, chemical medicine and preparations. This research is in favor of speeding up the development of competitive products and creating industry competition.
Бесплатно

Programming SDNs: A Compass for SDN Programmer
Статья научная
The modern communication networks have evolved from simple-static systems to highly flexible and adaptive systems facilitating dynamic programmability and reconfiguration. This network evolution has influenced the lowest level of packet processing in data plane to highest level of network control and management functions. It has also influenced the overall network design and architecture which is clearly evident from the emergence of SDN and NFV. With the wide-spread acceptance of SDN, a novel networking paradigm, the network programmability has re-appeared as a top research area in networking and numerous programming languages have been proposed. In this paper, we present a systematic review of various state-of-the-art SDN programming languages used to program different network planes. We follow a top-down approach, starting with the high-level or top-tier programming languages followed by the data plane or bottom-tier programming languages. We have provided an in-depth analysis of various top-tier and bottom-tier programming languages and compared them in terms of most prominent features and supported abstractions. In addition to it, we have elaborated various programming models used in different bottom-tier programming languages which provide necessary abstractions for mapping diverse functionalities of data plane algorithms splendidly onto the specialized hardware like ASICs. Lastly, we have highlighted the research challenges in SDN programming languages like cross platform programming, necessary language libraries, support for network verification, NFV, stateful and inline packet processing, which need to be incorporated into existing programming languages to support diverse functions required in next generation networks.
Бесплатно

Статья научная
One of the important studies in 6G aerial radio access networks is the propagation channel modeling. The high accurate propagation channel model will save cost and time, and is more effective in the design of the air radio access network system. However, existing channel models are limited to 1 THz, while 6G wireless technology is expected to operate up to 3 THz. In this paper, the propagation channel from 275 GHz to 3 THz is modeled by modifying the Friis equation, and each parameter in the model is described and analyzed analytically. The main factors that contribute to wireless signal attenuation at terahertz, such as atmospheric oxygen and water vapor, rainfall, and cloud factors, are also discussed in detail. Furthermore, the propagation channel calculation App for 6G low-altitude platform access networks application has been built using MATLAB GUI.
Бесплатно

Propagation Profile and Signal Strength Variation of VHF Signal in Ekiti State Nigeria
Статья научная
This paper presents the experimental results of a study on radio frequency attenuation path loss conducted in Ekiti State, Nigeria. The objective of the study is to develop a path loss model comparable to the existing path loss models through a real time application of outdoor VHF signal propagation measurements of the Nigeria Television Authority (NTA) Channel 5 and carrier frequency of 175.25 MHz located in Ado-Ekiti, Ekiti State, Nigeria. Experimental measurements were taken in three routes covering the entire state. Analysis of the data collected from the experiments resulted in models which are in agreement with the existing standard models. Root Mean Square Errors were calculated for all the path loss models. Results show that the signal of the station was generally poor along the routes considered as the deviations of the measured path losses from the free space path loss exceed 6 dB in most cases.
Бесплатно

Proposed WiMAX hybrid scheduler with split FTP traffic and its performance evaluation
Статья научная
The most promising broadband wireless access technology, Worldwide interoperability for Microwave Access (WiMAX), is the commercial name of IEEE 802.16. It is popular due to its middle range access mobile, high data rates, high scalability and convenient deployment. WiMAX provides Quality of Service (QoS) to various triple-play services (voice, video and data) through five service classes. QoS provisioning to various service classes in WiMAX is achieved by a scheduler at MAC layer. Selection of appropriate scheduler is based on certain design goals, such as attainment of QoS required for variety of applications, fairness to all services, reduced complexity etc. However, in general, File Transfer Protocol (FTP) traffic starves for bandwidth under the presence of high priority real-time traffic. This paper proposes a WiMAX hybrid scheduler that integrates homogeneous schedulers namely Weighted Fair Queuing (WFQ), strict priority and a Round Robin (RR). The unique feature of the proposed scheduler is that it has a splitter for FTP traffic with varying ratio and two stage priority schedulers for providing proper traffic load distribution for packet scheduling. The analytical modelling of proposed scheduler is achieved by Markov Chain and balance equations are solved to derive performance indicators such as mean queue length of packets, mean queuing delay, throughput and inter-class fairness for various triple-play services. The analytical results show that, as compared to recently reported hybrid WiMAX schedulers, proposed hybrid scheduler fulfils QoS requirements of various services and the splitting of FTP traffic has improved fairness among various services.
Бесплатно

Providing Useful Data Reliably to Mobile Cloud Users from Random Wireless Sensor Network
Статья научная
The integration of mobile cloud computing and wireless sensor network plays an important role in the field of research and industry. Data fetched from Wireless Sensor Network (WSN) are stored in the cloud and provides it to the mobile cloud users. This integration helps in providing data to users in the form of digitalization. To help the applications involving an integration of Mobile Cloud Computing (MCC)–Wireless Sensor Network, this paper finds the crucial things that influence the sensor data and WSN, and then propose a concept called Time based Priority Sleep Scheduling (TPSS). TPSS is divided into three parts 1. Based on the priority and time, wireless sensor network gateway should transmit the sensed data to cloud and 2. The algorithm used to save the battery consumption of mobile users in fetching data from the cloud is Priority Based Sleep Scheduling (PBSS); this provides data to users request based on the time slot. 3. Location Based Sleep Scheduling (LBSS) algorithm used to provide sensed data based on mobile cloud users location.
Бесплатно

Pure-Octet Extraction based Technique for Identifying Malicious URLs based on IP Address Attributes
Статья научная
On the basis of characteristics derived from IPv4 addresses, this paper offers a method for identifying interaction linked with website-based malware and then modelling a machine-learning-based classifier. In this research work, a modified approach is proposed for detecting fraudulent websites and compared with other methods like SVM assessment of IP addresses, octet-based technique, modified extended version of octet-based technique, and bit string-based characteristics. This modified approach is based on the fact that logical addressing is more reliable and consistent than other measures like URLs and DNS. The characteristic sequence which makes up URLs and domain names are more changeable with respect to IP addresses which are less changeable in comparison to URLs or domain names. The IPv4 address length is encoded into 4-byte space. Here, we have evaluated our modified approach with valid IP addresses from Kaggle [11], published on January 16, 2018, have been used to validate the efficacy of their metho.
Бесплатно

Статья научная
This Research focuses on cross layer approach to enhance the User Experience and Quality Of Service of video streaming in Long Term Evolution mobile network. During run time channel quality index is observed. Application layer requirement is fulfilled by changing modulation techniques as well as dynamic allocation of resources. This paper proposes a algorithm which improves the End-to-End Delay,Peak Signal to Noise Ratio of transmitted video over Mobile Network. Experimental results show the improvement in end to end delay by 89% and Peak Signal to Noise Ratio by 8%. Simulation in Network Simulator-3 provide credible evidence that this proposed cross-layer algorithm outperforms between earlier algorithm in providing better Quality Of Experience for real time, adaptive video streaming over Long Term Evolution.
Бесплатно

Quantum Computers’ threat on Current Cryptographic Measures and Possible Solutions
Статья научная
Cryptography is a requirement for confidentiality and authentic communication, and it is an indispensable technology used to protect data security. Quantum computing is a hypothetical model, still in tentative analysis but is rapidly gaining traction among scientific communities. Quantum computers have the potential to become a pre-eminent threat to all secure communication because their performance exceeds that of conventional computers. Consequently, quantum computers are capable of iterating through a large number of keys to search for secret keys or quickly calculate cryptographic keys, thereby endangering cloud security measures. This paper’s main target is to summarize the vulnerability of current cryptographic measures in front of a quantum computer. The paper also aims to cover the fundamental concept of potential quantum-resilient cryptographic techniques and explain how they can be a solution to complete secure key distribution in a post-quantum future.
Бесплатно