Статьи журнала - International Journal of Wireless and Microwave Technologies

Все статьи: 532

TreeLoc: An Ensemble Learning-based Approach for Range Based Indoor Localization

TreeLoc: An Ensemble Learning-based Approach for Range Based Indoor Localization

M.W.P Maduranga, Ruvan Abeysekera

Статья научная

Learning-based localization plays a significant role in wireless indoor localization problems over deterministic or probabilistic-based methods. Recent works on machine learning-based indoor localization show the high accuracy of predicting over traditional localization methods existing. This paper presents a Received Signal Strength (RSS) based improved localization method called TreeLoc(Tree-Based Localization). This novel method is based on ensemble learning trees. Popular Decision Tree Regressor (DTR), Random Forest Regression (RFR), and Extra Tree Regressor have been investigated to develop the novel TreeLoc method. Out of the tested algorithm, the TreeLoc algorithm showed better performances in position estimation for indoor environments with RMSE 8.79 for the x coordinate and 8.83 for the y coordinate.

Бесплатно

Trust Modelling and Management for IoT Healthcare

Trust Modelling and Management for IoT Healthcare

Abdul Rauf, Riaz Ahmed Shaikh, Asadullah Shah

Статья научная

The IoT wave is on rise and it is considered as the biggest world changing computing ecosystem after the invention of Internet where the meaning of lifestyle is expected to be changed. IoT is now diffusing pervasively in most areas of life like smart home, smart cities, smart irrigation, smart healthcare etc. The concerned industry is trying to reap maximum benefits from this regime without putting extra efforts or investing much to make the related infrastructure secure and trustworthy. IoT end device, a.k.a smart object, is one component of this ecosystem, responsible to interact with the physical environment and gather the data, along with communication technologies, processing capabilities like fog or cloud computing and applications to interact with the device (s). It is possibility that such devices can be faulty, compromised or misbehaving because of internal or external factors like hardware malfunctioning or cyber-attacks. In this situation the data gathered and transferred by such devices can be disaster and challenging in decision making specifically in an area where the human life is involved like IoT healthcare. We have proposed a mathematical model to estimate the trust of such devices. Trust on IoT devices and gathered data from such trusted devices will boost the confidence of end users on this new computing regime; especially in healthcare environment. The estimated trust status (trusted, uncertain, and untrustworthy) will be saved in a database or CSV file with a timestamp to be used as reputation by healthcare applications. Patients are assigned their SOI based on their specific diagnoses and procedures performed during their medical encounter. Similarly, for a patient with heart diseases or having hypertension can be considered in extreme category with a value of γ = 1 if there is some deviation of readings.

Бесплатно

Trust Models in Cloud Computing: A Review

Trust Models in Cloud Computing: A Review

Ritu, Sukhchandan Randhawa, Sushma Jain

Статья научная

It is common to hear that big or small organizations are moving to cloud computing for its scalability and cost savings. But, how do you decide which cloud provider to trust? Trust is a vital factor, especially for service oriented systems in the area of Information Technology and Security. Several issues have been raised by enterprises and individuals concerning the reliability of the cloud resources. In cloud computing, trust helps the consumer to choose the service of a cloud service provider for storing and processing their sensitive information. In this paper, a methodical literature analysis of trust management and existing trust models is presented to evaluate trust based on various QoS parameters. Key research issues and future research directions in existing literature are also suggested.

Бесплатно

Two Noise Addition Methods For Privacy-Preserving Data Mining

Two Noise Addition Methods For Privacy-Preserving Data Mining

Likun Liu, liang Hu, Di Wang, Yanmei Huo, Lei Yang, Kexin Yang

Статья научная

In the last decade, more and more researches have focused on privacy-preserving data mining(PPDM). The previous work can be divided into two categories: data modification and data encryption. Data encryption is not used as widely as data modification because of its high cost on computing and communications. Data perturbation, including additive noise, multiplicative noise, matrix multiplication, data swapping, data shuffling, k-anonymization, Blocking, is an important technology in data modification method. PPDM has two targets: privacy and accuracy, and they are often at odds with each other. This paper begins with a proposal of two new noise addition methods for perturbing the original data, followed by a discussion of how they meet the two targets. Experiments show that the methods given in this paper have higher accuracy than existing ones under the same condition of privacy strength.

Бесплатно

Two-Layer Encryption based on Paillier and ElGamal Cryptosystem for Privacy Violation

Two-Layer Encryption based on Paillier and ElGamal Cryptosystem for Privacy Violation

Anjan K. Koundinya, Gautham S.K.

Статья научная

Our life nowadays relies much on technologies and online services net banking, e-voting and so on. So, there is a necessity to secure the data that is transmitted through the internet. However, while performing decryption, it sometimes led to privacy violation so there is need to operate on users encrypted data without knowing the original plaintext. This paper represents the implementation of two-layer cryptosystem using paillier and elgamal algorithm both following asymmetric encryption. It is mainly focusing the challenges of privacy protection and secure utilization of information, where homomorphy encryption is gaining attention. Additive homomorphism is used in paillier cryptosystem which is used in fields like secure biometrics and electronic voting. Elgamal ensures that paillier encrypted data is secured that ensures two-layer encryption.

Бесплатно

UWB Circular Fan-Shaped Monopole Patch Antenna

UWB Circular Fan-Shaped Monopole Patch Antenna

P. More, A. Patil, G. Patil, K. Thakur, D. Marathe

Статья научная

In this paper, a fan-shaped ultra- wideband (UWB) microstrip patch antenna is re- ported. The antenna is designed, simulated, fab- ricated, and tested. The antenna operates over a 3.1 GHz – 6 GHz for Wireless Capsule Endoscopy (WCE) applications with VSWR less than 2 and return loss is lower than -10 dB. The antenna is a monopole circular structure with radius of 10.2 mm and ground plane dimension 24 x 16 mm (“Lg x Wg”) is designed on substrate FR4. The impedance matching and radiation characteristics of the designed structure are investigated. The pro- posed antenna with small size and different ground structure is considered to reduce the surface wave and to achieves high impedance bandwidth and good gain performance for ultra-wide band (UWB) range with specific absorption rate (SAR) 1.126 W/kg for 10 g of tissue.

Бесплатно

Variation of surface refractivity with soil permittivity and leaf wetness in a tropical location

Variation of surface refractivity with soil permittivity and leaf wetness in a tropical location

Adedayo Kayode, Ashidi Ayodeji, Oni Samuel, Ajewole Moses

Статья научная

Radio signal transmitting above the ground surface experiences attenuation as a result of absorption by vegetation and hydrometeors, refraction due to turbulence in weather parameters; and reflection from ground surface. In this study, attempt was made to compute surface refractivity from its constituent parameters, and investigate its variation with leaf wetness and soil permittivity, at seven (7) different stations across Ondo state, Nigeria. Data for the research were obtained by in-situ measurement using Davis 3125 Vantage Pro2 weather station having sensors for measuring temperature, pressure, relative humidity, leaf wetness and soil moisture content. Measurement was carried out round the clock at 10 minutes integration time for a period of two weeks at each of the study locations, and for each of rainy and dry seasons. The soil moisture content was obtained at 30cm soil depth while leaf wetness was measured by attaching its sensor directly to a projected leaf-branch; and surface refractivity was computed from pressure, temperature and humidity data. Correlation analysis was employed to measure the strength and direction of the relationship between surface refractivity and each of soil permittivity and leaf wetness. Across the locations, R ranges from 0.38 to 0.9; and 0.04 to 0.7 for rainy and dry season respectively. The value of R is statistically significant at all the stations during the rainy season and majority of the stations during the dry season; signifying that surface refractivity exhibits good spatial and temporal relationship with soil permittivity and leaf wetness across the stations albeit with varying intensities.

Бесплатно

Varying Pause Time Effect on AODV, DSR and DSDV Performance

Varying Pause Time Effect on AODV, DSR and DSDV Performance

Zafar Mahmood, Muhammad Awais Nawaz, Mudassar Iqbal, Saleem Khan, Zia ul Haq

Статья научная

A mobile ad hoc network is a collection of wireless nodes without any fixed structure and connected with each other through wireless links. MANETs have self-organized topology in which mobile nodes are free to move, as a result establishing a stable and reliable network is a difficult and critical task. Nodes in Nobile Ad-hoc network acts as sender, receiver and router for communicating data and control packets. Using NS-2 simulator Performance of AODV, DSDV and DSR is analyzed under varying pause time in this paper. Performance of these routing protocols are analyzed on the base of following performance metrics: packet delivery ratio, average end to end delay, throughput, no of sent packets, no of receive packets, no of routing packets, normalized routing load and no of dropped packets under variant Pause time. Results of Comparison analysis of Routing Protocols are generated with the help of Simulation in the form of graphs. The simulation result shows the significance of each protocol in different situations. We believe that this study will provide comprehensive comparative study of AODV, DSR and DSDV based on varying pause time at one place, which will help the researcher to further investigate any particular metrics value of particular protocol.

Бесплатно

Virobot the Artificial Assistant Nurse for Health Monitoring, Telemedicine and Sterilization through the Internet

Virobot the Artificial Assistant Nurse for Health Monitoring, Telemedicine and Sterilization through the Internet

Punith Kumar M. B., D. Manikant Amaresh Savadatti

Статья научная

We all know that during pandemic like corona or generally in hospitals, the front-line workers such as doctors, nurses, compounder in hospitals are nearest to the patients. They all need to look after the patients without caring about themselves and hence doctors, nurses, workers have a high chance of getting contacted to the disease. And few of the medical personnel fearing for the disease and their health, they are not ready to work in the hospital. Hence to tackle this problem we have come up with a solution i.e., Virobot- The artificial nurse. The result of this project is a robot that is designed to act as a medical assistant robot which can be controlled by nurses or doctors from a distance using their smart phone or it can just use autonomous navigation to reach the patients and give them required medicines, monitor patients health and stream all the patient information wirelessly through the internet to your palm(mobile). And, it has built-in UV sterilizer lights, which sterilizes the hospital wherever it travels. Not only it can carry lightweight packages and sterilize the hospital, It can be used as a telecommunication robot ad establish communication between doctor and patient since it is a built-in FPV camera and a Bluetooth speaker. The best thing is all these features are connected to the internet hence the doctor can get data from the robot from anywhere around the world.

Бесплатно

Wireless Multi-hop Network Scenario Emulation with MinGenMax Error Based on Interval Equivalent Character of Wireless Communication

Wireless Multi-hop Network Scenario Emulation with MinGenMax Error Based on Interval Equivalent Character of Wireless Communication

Huizhou Zhao

Статья научная

This paper proposes a novel approach to emulate an arbitrary wireless multi-hop network scenario in a fixed wireless test-bed, in which every node is equipped with a variable attenuator. We take notice of the interval equivalent character of wireless communication and consider the wireless multi-hop scenario emulation problem as an interval equivalent emulation problem. We define the generalized error, which is an error of a value relative to an interval, formulate the MinGenMax (Minimize Generalized Maximum) error problem and propose an optimum algorithm.

Бесплатно

ZBLE: zone based leader selection energy constrained AOMDV routing protocol

ZBLE: zone based leader selection energy constrained AOMDV routing protocol

Rani Sahu, Sanjay Sharma, M.A. Rizvi

Статья научная

In today's life, wireless networks (WNs) are being used very fast in every area. Wireless networks have been used in various applications, but finding some of its weaknesses, such as mobility, diversity, lack of resources and so on, finding an optimum route is very complex and problematic. By reducing the energy consumption on each node, the quality of the network can be ensured. Need to increase the battery life of the node to increase the network lifecycle. Therefore, reducing the energy consumption can extend the battery life of the node. To find and maintain routes between nodes, multi-path routing is a fundamental research issue for such networks. This paper discusses the zone-based routing protocol, which uses the energy, distance and power of the node to maintain high circulation and accelerate the path search process and maintain high search. The Zone-based Leader Selection Routing Protocol (ZBLE) is one of the new protocols, which is a modified form of the famous Ad Hoc on Demand Distance Vector Routing Protocol (AOMDV). Zone Leader Node and Zone Members are selected using the value of energy, position and power of the node. The performance of the proposed communication protocol is evaluated with other existing protocols such as AODV and AOMDV. The simulation result is that when it receives the best path for data communication with proper energy conservation. Network simulator version 2.35 is used for simulation purpose. To support our ideas, we used the 5 quality of service parameters such as packet distribution ratio, energy consumption, network lifetime, and throughput.

Бесплатно

ZBLE: zone based leader selection protocol

ZBLE: zone based leader selection protocol

Rani Sahu, Sanjay Sharma, M. A. Rizvi

Статья научная

Various wireless mobile nodes are simultaneously a network that does not depend on any central administration system. This kind of network is called Mobile Ad Hoc Network (MANET). Due to the nodes dependent on the battery in MANET, energy consumption has become a major problem. Because of the mobility of the nodes in the network, the nodes rapidly change their positions, causing the battery to end very quickly, thereby reducing the life of such a network. The main objective of this paper is to reduce energy consumption and increase the life of the network by modifying the AOMDV protocol using zone-based technology. Keeping this objective in mind, a zone-based protocol was developed which has been addressed in the name of Zone Based Leader Selection Protocol (ZBLE). This proposed protocol uses zone-based technology to select the path based on high energy and high power. For the data forward, selecting the Leader node in each zone, the best path is chosen based on the energy level of the node and the strength of the probe. The proposed protocol has been evaluated using Network Simulator version 2.35. Comparison of ZBLE, protocols the most popular protocols are from AODV and AOMDV. With the help of simulation results, we have used service parameters such as packet distribution ratio, energy consumption, network lifetime and throughput to tell the quality of the proposed protocol.

Бесплатно

Журнал