Статьи журнала - International Journal of Wireless and Microwave Technologies

Все статьи: 532

Reduction of inter-symbol interference using artifical neural network system in multicarrier OFDM system

Reduction of inter-symbol interference using artifical neural network system in multicarrier OFDM system

Jyoti Makka, Himanshu Monga, Silki Baghla

Статья научная

The work proposes Inter-Symbol Interference (ISI) reduction scheme, ISI being a major problem in Optical systems, which produces various type of non-linear distortions. So the implementation of OFDM system using Artificial Neural Network (ANN) scheme with M-QAM modulation technique is proposed and compared with the conventional OFDM system without using ANN. This proposed scheme is implementation of Back-propagation (BP) algorithm over AWGN channels to achieve an effective ISI reduction in orthogonal frequency division multiplexing (OFDM) systems. Simulation results prove that ANN equalizer can further reduce ISI effectively and provide acceptable BER and better MSE plot compared to conventional OFDM system.

Бесплатно

Relative Distance Based Routing for Delay Tolerant Mobile Sensor Network

Relative Distance Based Routing for Delay Tolerant Mobile Sensor Network

Jieyan Liu, Jiazhi Zeng

Статья научная

Delay Tolerant Mobile Sensor Network (DTMSN) is the network for pervasive information gathering. Traditional static routing approaches may not fit for DTMSN due to its intermittent connectivity. This paper proposes an relative distance based routing (RDBR) strategy for DTMSN, in which nodes delivery probabilities are calculated and updated according to the latest relative distance from themselves to the sink node, and data are delivered according to nodes’ delivery probabilities. RDBR also introduces a redundant copies controlling technique based on the message priority. Simulation results show that RDBR achieves a well tradeoff between the data delivery ratio/delay and the delivery overhead.

Бесплатно

Remote sensing global ranged door lock security system via mobile communication

Remote sensing global ranged door lock security system via mobile communication

Md Mostafizur Rahman Komol, Amit Kumer Podder, Abdullah Arafat, Tanzim Nabeed

Статья научная

In this paper, a door locking system with some remarkable features is proposed which makes the locking or unlocking of a door more reliable to the user than the conventional system. Robust security access with accurate detection system is provided here. It’s a global ranged operation process that can be operated by simple mobile phone through short message service (SMS) transferring operation from any corner of the world where mobile network is available. A smooth and durable locking mechanism is provided and the inscrutable door moving control device is used for the efficient operation of controlling the door. This developed system provides a notification to the user if any person is intended to pass the door. The system also has the ability to provide information about the current condition of the door by sending simple text messages. Also, the user will be able to operate the system with more than one subscriber identity module (SIM) card. Most advantageously, this device is proposed with lowest cost estimation benefit. Finally, the performance of the designed system is analyzed by performing some real-time operation of it and found satisfactory performance.

Бесплатно

Research and Design of The Firewall Penetration Technology Serving to Informati on Sharing Systems

Research and Design of The Firewall Penetration Technology Serving to Informati on Sharing Systems

GAO Shou-ping, WANG Lu-da

Статья научная

In the current information sharing systems, there is a problem of firewall penetration. As for this problem and based on the existing TCP and UDP penetration schemes, we analyze all kinds of possible transmission environments in practical applications, and then present a technique of UDP coordinating with TCP to penetrate firewalls. Finally, we present the realization of this method: a network switch --XIPSwitch, which is independent from various applications. The realization method can further solve the firewall penetration problem of the internal terminals in the existing information sharing systems.

Бесплатно

Research of NCS Real-time Performance with Judging Priority Based on Generalized Stability

Research of NCS Real-time Performance with Judging Priority Based on Generalized Stability

Hengrong LU

Статья научная

The conceptions of generalized stability and priority judgment function of real-time node which guaranteed the generalized stability were put forward aiming at the problem of Networked Control System (NCS) real-time performance based on shared Ethernet. From the perspective of control theory and communication theory, generalized stability and priority judgment function were applied into Real-time ETHERnet (RETHER) by using real-time performance improving method of avoiding collision based on protocol in Ethernet communication protocol. Therefore, token was passed to the real-time node with highest priority and real-time data was sent, NCS real-time performance was improved. Finally, simulation results demonstrate the effectiveness of the proposed method.

Бесплатно

Research of Virtual Channels Scheduling Algorithm Based on Priority in Packet Telemetry System

Research of Virtual Channels Scheduling Algorithm Based on Priority in Packet Telemetry System

TIAN Ye, ZHANG Zi-jing, ZHANG Yan-qin, XIAO Guang-yuan

Статья научная

We make research on the virtual channels scheduling algorithm based on priority in packet telemetry system. Probability of occupying physical channel and packets losing rate of the virtual channel with the highest priority are considered, on condition that the packet arrival rate contribution is Poisson contribution. Theoretical analysis and simulation results show that when the running time of the scheduling module is long enough, probability of occupying physical channel by the virtual channel with the highest priority converge on a fixed value. Formulas of calculating packets losing rate are also given, which can offer reference to engineering design.

Бесплатно

Research on Audience Rating Statistics of Two-way Digital TV Based on OpenSSL

Research on Audience Rating Statistics of Two-way Digital TV Based on OpenSSL

Chen Junhua, Yang Fan

Статья научная

The drawback of the present various forms of digital program audience statistical method is that only the traditional phone questionnaire survey, the diary method or the artificial equipment is applied to counting the situation of watching program. By means of combining the timely recognized operation property of various digital terminals and automatic return viewing program feature, a new scheme is proposed to count audience situation for program in two-way digital television network. The main technologies and functions of the scheme are described by introducing audience information gathering mechanisms, security return protocol stack based on openSSL, fusion and automatic transmission and its appropriate statistical methods. Meanwhile, the development of the audience rating statistical system is provided, which is used by some program providers according to this scheme. The experiment and users’ feedback show that this scheme in the lower hardware configuration digital terminals can promptly and accurately count the subscribers watching program and effectively protect audience view information.

Бесплатно

Research on Diffusion Strategy About Resource Index of MP2P

Research on Diffusion Strategy About Resource Index of MP2P

Fangfang Guo, Jing Xu

Статья научная

The inherent mobility of nodes leads to frequent changes in network structure and resource location delay larger in MP2P network. Existing search algorithms for MP2P is not efficient enough, and is only for single application model. In this paper an epidemic diffusion strategy about index of resource is proposed to implement diffusion resources to solve low efficiency and long latency positioning defects in a large search. Results demonstrate the principle of the proposed algorithm can improve the resource search efficiency.

Бесплатно

Research on Excessive Road Fuel Problem Based on Extension Strategy Generating Method

Research on Excessive Road Fuel Problem Based on Extension Strategy Generating Method

Li Shu fei, Ye Guang zai

Статья научная

The increase of the demand for gasoline in transportation and traffic vehicles results in excessive fuel consumption problem. However, by the extension strategy generating methods, the way of urban transportation changing from bus into metro may be analyzed and evaluated through extension reasoning, extension transformation and optimal calculation in order to solve the problem of excessive fuel consumption of the urban roads.

Бесплатно

Research on Trustworthy Distributed System

Research on Trustworthy Distributed System

LUO Chen, HE Ming, LIU Xiao-Ming, LI Yuan

Статья научная

To arrive at the goal of intensifying the trustworthiness and controllability of distributed systems, the core function of secure algorithms and chips should be fully exerted. Through building the trustworthy model between distributed system and user behaviors, constructing the architecture of trustworthiness distributed systems, intensifying the survivability of services, and strengthening the manageability of distributed systems, the secure problem of distributed systems is to be radically solved. By setting up the trustworthy computing circumstance and supplying the trustworthy validation and the active protection based on identity and behavior for trustworthy distributed system, we will reach the goal of defending the unaware viruses and inbreak. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy distributed system. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed.

Бесплатно

Research on Wireless Network Security Awareness of Average Users

Research on Wireless Network Security Awareness of Average Users

Paschal A. Ochang, Philip J. Irving, Paulinus O. Ofem

Статья научная

Network insecurity has become an increasing problem in the world of computer networks. Technical experts have tried to combat this by improving the technical awareness of the threats and technical solutions involved in Wireless Local Networks (WLAN) through technical reports and policy enforcement. The average users' knowledge and awareness of network security, how they react to the warnings and implement security measures is also very important. Current studies on users' awareness of security policies, whether it has been communicated well enough and how aware WLAN users are to the threats and issues involved are still not fully ascertained. To fill this gap it is important to find out the users basic knowledge of the security measures and policies. In this paper, statistical methods were developed and adopted in other to compare the knowledge of Information Technology (IT) related employees and that of non-technical employees on how aware they are of WLAN security threats and security measures. The techniques the paper has adopted revealed the knowledge gap between non-technical and technical users. This revelation is significant and therefore requiring more efficient methods for creating awareness on WLAN threats and countermeasures among average users.

Бесплатно

Resource Efficient Security Mechanism for Cloud of Things

Resource Efficient Security Mechanism for Cloud of Things

Adil Bashir, Sahil Sholla

Статья научная

Cloud of Things (CoT) relates to the convergence between Cloud Computing (CC) and the Internet of Things (IoT) and has significantly transformed the way services are delivered in the ubiquitous realm of devices. This integration has become essential because of the huge data being generated by IoT devices, requiring an infrastructure for storage and processing. Such infrastructure is provided by Cloud Computing services with massive space for data storage and exceptional platform to process complex data. IoT networks are vulnerable to multiple security breaches because of the growing usage of IoT devices in user personal systems. This leads to security and privacy threats that need to be addressed. IoT consists of resource limited devices which have feeble computing power, battery source and storage capacity. This paper addresses security issue by proposing usage of obfuscation and encryption techniques to scramble the data at IoT devices which is later on stored in encrypted form at the cloud server. The data at IoT devices is classified into highly critical or less critical and accordingly the appropriate technique between encryption and obfuscation is applied. The proposed mechanism is evaluated in terms of processing time for cryptographic operations at IoT devices. Evaluation results depict that the proposed mechanism is 1.17 times faster than [22] in terms of encryption and decryption times.

Бесплатно

Review on Light Fidelity (Li-Fi) - An Advancement of Wireless Network

Review on Light Fidelity (Li-Fi) - An Advancement of Wireless Network

Ramandeep Kaur, Himanshu Walia

Статья научная

Nowadays, Li-Fi is becoming very popular and catching the interest of a number of users with its advanced technology-based features. It brings a new resolution in the wireless communication and people are showing so much curiosity to know about it. Li-Fi is an optical wireless communication-based technology which transmits data over the network through a light source like LED’s instead of radio frequency signals (RF) with very high data rate. The aim of this paper is to give full- fledged knowledge about Li-Fi & its applications. This paper also attempts to clarify the basic difference between wireless technologies and their evolution & how this new technology is leading all over the world with its features like less power consumption, less requirement of maintenance, & bi-directional in nature. Li-Fi eliminates the effect of harmful radiations that occur due radio signals as in Wi-Fi and has less latency rate. This paper gives an overview and the general idea about working on Li-Fi technology and how it will help in the development of bright future as it is beyond the expectations of end users.

Бесплатно

Roadmap from 4G to 6G in Smart Cities Impact and Challenges

Roadmap from 4G to 6G in Smart Cities Impact and Challenges

Dipti Chauhan, Siddhi Sharma, Vishal Singh

Статья научная

The world is now turning towards automation also the use of virtual reality is expanding day by day, the need for faster and reliable communication has been increased. This technology will play a key role towards the development of Smart Cities, where government is majorly focusing. The urge of quicker and more secure communication (wireless) is making us switch towards the 6G or sixth generation communication. To the benefit of its citizens and businesses, a smart city is a location where the traditional networks and services have been enhanced via the use of digital and telecommunication technology. Infrastructure, social capital, which also includes traditional skills and community institutions, and digital technologies are all combined in smart cities to promote sustainable economic growth and provide a desirable environment for all residents. By 2035, the publisher believes that as smart city infrastructure develops, 6G will be a crucial component of communications, applications, content, and commerce in smart cities. We go over the progress of beyond 5G and advanced 5G features in order to forecast important 6G requirements and showcase 6G potential. In comparison to 5G, we will also discuss 6G scenarios, requirements, and technology components. There are lots of challenges associated with 5G’s wireless communication network one of them is limited data speed. We will also be focusing on these challenges associated with technology and also the plans to use this technology towards the development of smart cities. The 5G wireless communication network is currently facing the challenge of limited data speed and billions of data-intensive applications are used. To resolve this problem many developers and researchers are working on advanced technologies so that they can consummate the wireless service demands. So that we can shift ourselves from 5G to 6G and fulfil our expectations towards smart city. In addition, there are varied use cases of the wireless 6G technology in education, media and entertainment, tourism.

Бесплатно

Routing in Hybrid Software Defined Networking using Hop-Count Approach

Routing in Hybrid Software Defined Networking using Hop-Count Approach

Rohitaksha K., A.B. Rajendra, J. Mohan

Статья научная

Software-Defined Networking is a network framework that involves in separating a network’s control functions from its data forwarding functions, centralizing its intelligence, and abstraction its underlying architecture from applications and services. Hybrid Software-Define Networking is a framework which supports both the legacy protocols and the Software Defined Networking protocols to operate in the same environment. In this paper, we present an efficient technique for finding the shortest path between any two nodes in Hybrid SDN by reducing the complicated network topology to a basic topology while taking hop count into account. In the suggested proposal, a subgraph is generated from a complicated network, and the best path is found using a modified Bellman-Ford method, which saves time. The emulation test bed in Mininet was established for various numbers of nodes, and the results were analysed. The modified Bellman-Ford algorithm selects the optimal path between the two nodes. For networks with different numbers of nodes, the proposed approach offered a significant increase in the TCP throughput when compared with that of Spanning Tree Protocol. The number of packets received by the SDN controller is less with the proposed work. This increases TCP throughput by reducing the broadcast packets.

Бесплатно

SDN Interfaces: Protocols, Taxonomy and Challenges

SDN Interfaces: Protocols, Taxonomy and Challenges

Suhail Ahmad, Ajaz Hussain Mir

Статья научная

The ever-increasing demands of Internet services like video on demand, big data applications, IoE and multi-tenant data centers have compelled the network industry to change its conventional non-evolving network architecture. Software Defined Network (SDN) has emerged as a promising network architecture which provides necessary abstractions and novel APIs to facilitate network innovations and simplifies network resource management by breaking the conventional network into multiple planes. All these SDN planes interact through open interfaces or APIs which are commonly categorized into southbound, northbound and west/eastbound interfaces. In this manuscript, we have identified and emphasized various communication protocols used at south and northbound interfaces. We have provided a taxonomy of south and northbound communication protocols based on their dependence, capabilities and properties. The pros and cons associated with each communication mechanism are highlighted and the numerous research challenges and open issues involved at these two interfaces are elucidated. In addition to it, we have proposed the necessary abstractions and extensions required in communication protocols at these two interfaces to simplify real-time monitoring and virtualization in next generation networks.

Бесплатно

SQL Injection Detection Tools Advantages and Drawbacks

SQL Injection Detection Tools Advantages and Drawbacks

Hazem M. Harb, Derar Eleyan, Amna Eleyan

Статья научная

SQL injection attack is a major threat to web application security. It has been rated as one of the most dangerous vulnerabilities for a web-based application. Based on the Open Web Application Security Project (OWASP), it is measured as one of the top ten. Many types of research have been made to face this attack either by preventing the threat or at least detecting it. We aim in this paper to give an overview of the SQL injection (SQLI) attack and classify these attacks and prevention and detection tools. We introduce the most current techniques and tools that are used to prevent and detect SQLI and highlight their strengths and weaknesses.

Бесплатно

Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network

Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network

Shahzad Ashraf, Sehrish Saleem, Tauqeer Ahmed

Статья научная

In underwater environment, the sensor nodes are deployed for collecting information and sending back to the base station. Establishing astute communication link among these sensor nodes in a multi-link routing environment is a key challenge for all underwater routing protocols. A sagacious communication link can only guarantee the maximum data transfer rate. The link selection mechanism of three underwater routing protocol i.e, Energy-aware Opportunistic Routing (EnOR) protocol, Shrewd Underwater Routing Synergy using Porous Energy Shell (SURS-PES) and Underwater Shrewd Packet Flooding Mechanism (USPF) have been investigated. After analyzing performance results of these protocols interms of packet delivery ratio, end-to-end ‎delay, network lifespan and energy consumption using NS2 with AquaSim 2.0 simulator. The protocol existing, with sagacious link selection mechanism in multi-link routing environment has been identified. The identification of this sagacious link selection mechanism is a novel approach which can give specific knowledge for targeted output without wasting resources for irrelevant objectives.

Бесплатно

Scheduling and Queuing Strategies for Energy Efficient Routings in WMSNs

Scheduling and Queuing Strategies for Energy Efficient Routings in WMSNs

Ashok K. Chikaraddi, Meena S. Maralappanavar, Suvarna G. Kanakaraddi, Vishwanath Chikkareddi

Статья научная

The single-path transmission protocols, cause throughput degradation for multimedia applications, considering the limited bandwidth and energy constraint of multimedia sensor nodes. Congestion on the network is a result of the issue of transferring a large amount of data. For multimedia data with low reliability, single path routing necessitates real-time Quality of Service (QoS) parameters and large bandwidth congestions that arise in intermediate nodes due to low memory. Consequently, leading to queuing delays and packet loss. Each chosen path must independently fulfill the corresponding QoS criteria while building the multiple paths for a multimedia application. Finding multiple paths with low path costs and high reliability while achieving application-specific QoS parameters is the aim of the effort.

Бесплатно

Securing DSR for Mobile Ad hoc Network with Message Digest Algorithm

Securing DSR for Mobile Ad hoc Network with Message Digest Algorithm

Pooja Kundu, Neeti Kashyap

Статья научная

Mobile ad hoc networks (MANETs) are very useful in various scenarios where there is need of fast deployment of the network and expensive set up is not required. With these benefits, there are some issues related to these networks. One of these issues is of secure communication. Malicious nodes can easily attack existing routing protocols for MANETs like DSR. In this paper we have proposed a modification of DSR by using message digest. The proposed work produces better results in terms of different metrics when compared with the results of DSR. When a route is set up between the two communicating mobile nodes, the data is sent through a secure key which is not impossible for the intruder nodes to intercept. This halts intrusion in the network. A message digest is created of the data packets.

Бесплатно

Журнал