Applied sciences

International Journal of Electronics and Telecommunications

Content

International Journal of Electronics and Telecommunications | 2023 | vol. 69 | No 1

Download PDF Download RIS Download Bibtex

Abstract

One of the most recent challenges in communication system and network system is the privacy and security of information and communication session. Blockchain is one of technologies that use in sensing application in different important environments such as healthcare. In healthcare the patient privacy should be protected use high security system. Key agreement protocol based on lattice ensure the authentication and high protection against different types of attack especially impersonation and man in the middle attack where the latticebased protocol is quantum-withstand protocol. Proposed improved framework using lattice based key agreement protocol for application of block chain, with security analysis of many literatures that proposed different protocols has been presented with comparative study. The resultant new framework based on lattice overcome the latency limitation of block chain in the old framework and lowered the computation cost that depend on Elliptic curve Diffie-Hellman. Also, it ensures high privacy and protection of patient’s information.
Go to article

Authors and Affiliations

Zahraa Ch. Oleiwi
1
Rasha Ail Dihin
2
Ali H. Alwan
3

  1. College of Computer Science and InformationTechnology, University Al-Qadisiyah, Iraq
  2. Faculty of Education for Girls, University of Kufa, Najaf, Iraq
  3. Alkafeel University, Najaf, Iraq
Download PDF Download RIS Download Bibtex

Abstract

Customer churn prediction is used to retain customers at the highest risk of churn by proactively engaging with them. Many machine learning-based data mining approaches have been previously used to predict client churn. Although, single model classifiers increase the scattering of prediction with a low model performance which degrades reliability of the model. Hence, Bag of learners based Classification is used in which learners with high performance are selected to estimate wrongly and correctly classified instances thereby increasing the robustness of model performance. Furthermore, loss of interpretability in the model during prediction leads to insufficient prediction accuracy. Hence, an Associative classifier with Apriori Algorithm is introduced as a booster that integrates classification and association rule mining to build a strong classification model in which frequent items are obtained using Apriori Algorithm. Also, accurate prediction is provided by testing wrongly classified instances from the bagging phase using generated rules in an associative classifier. The proposed models are then simulated in Python platform and the results achieved high accuracy, ROC score, precision, specificity, F-measure, and recall.
Go to article

Authors and Affiliations

Anitha M A
1
Sherly K K
2

  1. Faculty of Computer Science and Engineering, College of Engineering Cherthala, Alappuzha, Kerala, India
  2. Information Technology Department, Rajagiri School of Engineering & Technology Kochi-682039, Kerala, India
Download PDF Download RIS Download Bibtex

Abstract

In this covid19 pandemic the number of people gathering at public places and festivals are restricted and maintaining social distancing is practiced throughout the world. Managing the crowd is always a challenging task. It requires monitoring technology. In this paper, we develop a device that detects and provide human count and detects people who are not maintaining social distancing . The work depicted above was finished using a Raspberry Pi 3 board with OpenCV-Python. This method can effectively manage crowds.
Go to article

Authors and Affiliations

Davidson Kamala Dhas Milton
1
Arun Raj Velraj
1

  1. Mepco Schlenk Engineering College (Autonomous), Sivakasi, Tamil Nadu, India
Download PDF Download RIS Download Bibtex

Abstract

Respiratory rate measurement is important under different types of health issues. The need for technological developments for measuring respiratory rate has become imperative for healthcare professionals. The paper presents an approach to respiratory monitoring, with the aim to improve the accuracy and efficacy of the data monitored. We use multiple types of sensors on various locations on the body to continuously transmit real-time data, which is processed to calculate the respiration rate. Variations in the respiration rate will help us identify the current health condition of the patient also for diagnosis and further medical treatment. The software tools such as Keil μVision IDE, Mbed Studio IDE, Energia IDE are used to compile and build the system architecture and display information. EasyEDA is used to provide pin map details and complete architecture information.
Go to article

Authors and Affiliations

Kanthi M
1
Ravilla Dilli
2

  1. Department of Electronics and Communication Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, India
  2. Department of Electronics and Communication Engineering at Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, Karnataka, India
Download PDF Download RIS Download Bibtex

Abstract

A new method of Electrocardiogram (ECG) features extraction is proposed in this paper. The purpose of this study is to detect the main characteristics of the signal: P, Q, R, S, and T, then localize and extract its intervals and segments. To do so we first detect peaks, onsets and offsets of the signal's waveform by calculating the slope change (SC) coefficients and consequently, the peaks of the signal are determined. The SC coefficients are based on the calculation of the integral of two-scale signals with opposite signs. The simulation results of our algorithm applied on recordings of MIT-BIH arrhythmia electrocardiogram database show that the proposed method delineates the electrocardiogram waveforms and segments with high precision.
Go to article

Authors and Affiliations

Skander Bensegueni
1

  1. Department of Electronics, Electrical Engineering and Automatic, Ecole Nationale Polytechnique, Constantine, Algeria
Download PDF Download RIS Download Bibtex

Abstract

In modern conditions in the field of medicine, raster image analysis systems are becoming more widespread, which allow automating the process of establishing a diagnosis based on the results of instrumental monitoring of a patient. One of the most important stages of such an analysis is the detection of the mask of the object to be recognized on the image. It is shown that under the conditions of a multivariate and multifactorial task of analyzing medical images, the most promising are neural network tools for extracting masks. It has also been determined that the known detection tools are highly specialized and not sufficiently adapted to the variability of the conditions of use, which necessitates the construction of an effective neural network model adapted to the definition of a mask on medical images. An approach is proposed to determine the most effective type of neural network model, which provides for expert evaluation of the effectiveness of acceptable types of models and conducting computer experiments to make a final decision. It is shown that to evaluate the effectiveness of a neural network model, it is possible to use the Intersection over Union and Dice Loss metrics. The proposed solutions were verified by isolating the brachial plexus of nerve fibers on grayscale images presented in the public Ultrasound Nerve Segmentation database. The expediency of using neural network models U-Net, YOLOv4 and PSPNet was determined by expert evaluation, and with the help of computer experiments, it was proved that U-Net is the most effective in terms of Intersection over Union and Dice Loss, which provides a detection accuracy of about 0.89. Also, the analysis of the results of the experiments showed the need to improve the mathematical apparatus, which is used to calculate the mask detection indicators.
Go to article

Authors and Affiliations

I. Tereikovskyi
1
Oleksandr Korchenko
S. Bushuyev
2
O. Tereikovskyi
3
Ruslana Ziubina
Olga Veselska

  1. Department of System Programming and Specialised Computer Systems of the National Technical University of Ukraine, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine
  2. Department of Project Management Kyiv National University of Construction and Architecture, Ukraine
  3. Department of Information Technology Security of National Aviation University, Kyiv, Ukraine
Download PDF Download RIS Download Bibtex

Abstract

Health informatics is characterized by the need to securely store, process and transmit large amounts of sensitive medical data while ensuring interoperability with other systems. Among many standards used in such systems there are two which have gained interest in recent years and cover most of those needs: openEHR and HL7 FHIR. In this paper, both standards are discussed and compared with each other. The architecture of both systems, the similarities and differences, methods of data modeling and ensuring interoperability were presented.
Go to article

Authors and Affiliations

Jacek Kryszyn
1
Waldemar T. Smolik
1
Damian Wanta
1
Mateusz Midura
1
Przemysław Wróblewski
1

  1. Faculty of Electronics and Information Technology, Warsaw University of Technology, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

Electromagnetic theoretical concepts, which are represented mathematically, are usually challenging to grasp by students. In this study, we explore an interactive technology-based teaching tool to develop further students’ mastery of electromagnetic concepts through learning development and visualization of electromagnetic problems. This visualization of the problems will help students analyse, evaluate, and draw conclusions of the impact of electromagnetic-related problems in real-life. The simulation tool in this study is based on a MATLAB® toolbox package, in which partial-differential equations (PDE) solver is the core engine. In this paper, we will also provide a step-by-step guide on the use of such an interactive computer-aided tool so that it can be a great self-guide tool for beginners in the field of physics and a first-level introductory course in electromagnetism. This study will focus mainly on one classical electrostatic problem that is a challenge to students to visualize, analyze and evaluate. Based on students feedback by the end of the course, 80% of students’ population are more comfortable with the introduced interactive learning tool.
Go to article

Authors and Affiliations

Mohammed M. Bait-Suwailam
1 2
Joseph Jervase
1
Hassan Al-Lawati
1
Zia Nadir
1

  1. Department of Electrical and Computer Engineering, Sultan Qaboos University, Muscat, Oman
  2. Remote Sensing and GIS Research Center, Sultan Qaboos University
Download PDF Download RIS Download Bibtex

Abstract

A double balanced passive mixer-based receiver operating in the 3-5 GHz UWB for medical applications is described in this paper. The receiver front-end circuit is composed of an inductorless low noise amplifier (LNA) followed by a fully differential voltage-driven double-balanced passive mixer. A duty cycle of 25% was chosen to eliminate overlap between LO signals, thereby improving receiver linearity. The LNA realizes a gain of 25.3 dB and a noise figure of 2.9 dB. The proposed receiver achieves an IIP3 of 3.14 dBm, an IIP2 of 17.5 dBm and an input return loss (S11) below -12.5dB. Designed in 0.18μm CMOS technology, the proposed mixer consumes 0.72pW from a 1.8V power supply. The designed receiver demonstrated a good ports isolation performance with LO_IF isolation of 60dB and RF_IF isolation of 78dB.
Go to article

Authors and Affiliations

Thaar A. Kareem
1
Hatem Trabelsi
1

  1. Systems Integration & Emerging Energies Laboratory, Electrical Engineering Department, National Engineers School of Sfax, University of Sfax, Sfax, Tunisia
Download PDF Download RIS Download Bibtex

Abstract

In this article, a 3D printed rectangular dielectric resonator antenna which is capable of polarization reconfiguration has been designed. Dielectric resonator is composed of environment friendly and biodegradable material, which is Polylactic Acid. In the proposed model, the polarization can be switch from a linear to a circular by changing the state of a switch, electonically. The antenna switch between two different polarizations: Linear polarization during OFF STATE and Lefthand circular polarization during ON STATE. The proposed 3D printed dielectric resonator antenna is designed to operate in Cband of microwave spectrum, with a broad effective bandwidth (overlapped impedance bandwidths of both states) of 14.542% with centre frequency at 5.845GHz and peak gain 5.5dBi. Further, validated simulated results with experiment and both results are in good agreement.
Go to article

Authors and Affiliations

Maganti Apparao
1
Godi Karunakar
1

  1. Department of Electronics and Communication Engineering, Gitam Institute of Technology, GITAM Deemed to be University, Visakhapatnam, India
Download PDF Download RIS Download Bibtex

Abstract

Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the algorithm of the "Event handling" subprocess was detailed. This detailing is a complex, which includes the IS event processing substage. In addition, the proposed detailing of the "Event Handling" subprocess allows for covering the entire life cycle of an IS event. The performed research allows in practice to fill in potential gaps in information when creating a company's ISMS. An additional advantage of the proposed solution is the possibility of using this sub-process as an independent one. The proposed approach makes it possible to simplify the procedure for managing the information security of a company as a whole, as well as potentially reduce the costs of its construction for small companies and enterprises. Also, this subprocess can be considered as an independent information security management process, for example, for a company's CIS. The proposed solutions and additions, in contrast to similar studies, are characterized by invariance with respect to the methods of implementing the company's IS infrastructure solutions, and in particular its CIS. This ultimately allows, without changing the methodological tools, to scale this approach and adapt it to the ISMS of various companies.
Go to article

Authors and Affiliations

Valerii Lakhno
1
Saltanat Adilzhanova
2
Moldir Ydyryshbayeva
2
Aliza Turgynbayeva
2
Olena Kryvoruchko
3
Vitalyi Chubaievskyi
3
Alona Desiatko
3

  1. National University of Life and Environmental Sciences of Ukraine, Kyiv, Ukraine
  2. Al-Farabi Kazakh National University, Almaty, Kazakhstan
  3. Kyiv National University of Trade and Economics, Kyiv, Ukraine
Download PDF Download RIS Download Bibtex

Abstract

In this paper a new security technique aiming to ensure safe and reliable communications between different nodes on an automotive Controller Area Network (CAN) is presented. The proposed method relies on a robust authentication code using Blake-3 as a hash algorithm within an adapted structure that includes a monitor node. A prototype is implemented and run effectively to perform hardware simulations of real case-based security problems of automotive embedded CAN systems. As a result, data transfer can take place on a newly enhanced CAN bus according to the standard protocol without being intercepted nor tampered with by unauthorized parties thereby highlighting the effectiveness of the proposed technique.
Go to article

Authors and Affiliations

Asmae Zniti
1
Nabih EL Ouazzani
1

  1. Faculty of Sciences and Technology (FST), University Sidi Mohamed Ben Abdellah, Signals Systems and Components Laboratory (LSSC), Fez, Morocco
Download PDF Download RIS Download Bibtex

Abstract

In the current smart tech world, there is an immense need of automating tasks and processes to avoid human intervention, save time and energy. Nowadays, mobile phones have become one of the essential things for human beings either to call someone, connect to the internet, while driving people need mobile phones to receive or make a call, use google maps to know the routes and many more. Normally in cars, mobile holders are placed on the dashboard to hold the mobile and the orientation of the phone needs to be changed according to the driver's convenience manually, but the driver may distract from driving while trying to access mobile phone which may lead to accidents. To solve this problem, an auto adjustable mobile holder is designed in such a way that it rotates according to the movement of the driver and also it can even alert the driver when he feels drowsiness. Image Processing is used to detect the movement of the driver which is then processed using LabVIEW software and NI myRIO hardware. NI Vision development module is used to perform face recognition and servo motors are used to rotate the holder in the required position. Simulation results show that the proposed system has achieved maximum accuracy in detecting faces, drowsiness and finding the position coordinates.
Go to article

Authors and Affiliations

Srilatha Madhunala
1
Bhavya Kanneti
1
Priya Anathula
1

  1. Department of ECE, Vardhaman College of Engineering, India
Download PDF Download RIS Download Bibtex

Abstract

Localization is one of the oldest mathematical and technical problems that have been at the forefront of research and development for decades. In a wireless sensor network (WSN), nodes are not able to recognize their position. To solve this problem, studies have been done on algorithms to achieve accurate estimation of nodes in WSNs. In this paper, we present an improvement of a localization algorithm namely Gaussian mixture semi-definite programming (GM-SDP-2). GMSDP is based on the received signal strength (RSS) to achieve a maximum likelihood location estimator. The improvement lies in the placement of anchors through the Fuzzy C-Means clustering method where the cluster centers represent the anchors’ positions. The simulation of the algorithm is done in Matlab and is based on two evaluation metrics, namely normalized root-mean-squared error (RMSE) and cumulative distribution function (CDF). Simulation results show that our improved algorithm achieves better performance compared to those using a predetermined placement of anchors.
Go to article

Authors and Affiliations

Sidi Mohammed Hadj Irid
1
Mourad Hadjila
1
Mohammed Hicham Hachemi
2
Sihem Souiki
3
Reda Mosteghanemi
1
Chaima Mostefai
1

  1. Dept. of Telecommunications, Faculty of Technology, University of Abou Bekr Belkaid, Tlemcen, Algeria
  2. Dept. of Electronics, Faculty of Electrical Engineering, University of Science and Technology of Oran - Mohamed Boudiaf (USTO-MB), Oran, Algeria
  3. Dept. of Telecom, Faculty of Technology, University of Belhadj Bouchaib, Ain Temouchent, Algeria
Download PDF Download RIS Download Bibtex

Abstract

This study expands on prior studies on wireless telecommunication generations by examining the technological differences and evolutional triggers that characterise each Generation (from 1G to 5G). Based on a systematic literature review approach, this study examines fifty (50) articles to enhance our understanding of wireless generation evolution. Specifically, this study analyses i) the triggers that necessitated the evolution of wireless telecommunication generations and ii) makes a case regarding why it is imperative to look beyond the fifth Generation (5G) network technologies. The authors propose areas for future research.
Go to article

Authors and Affiliations

Godfred Yaw Koi-Akrofi
1
Marcellinus Kuuboore
1
Daniel Adjei Odai
2
Albert Neequaye Kotey
3

  1. IT Studies, University of Professional Studies Accra, Ghana
  2. Vodafone Ghana, Ghana
  3. Ericsson BGH, Ghana
Download PDF Download RIS Download Bibtex

Abstract

This research began when observations were made on any-to-any-connection services that require QoS (Quality of Service) and tunnel measurements. Tunnel is a technique to interconnect between local networks that are separated through a public network. Research questions found looping caused by traffic issues when sending data in the MPLS service layer-2 tunneling service. Furthermore, this research hypothesis proposes optimizing QoS performance in the application of the SR-TE (Segment Routing-Traffic Engineering) method in the MPLS (Multi-Protocol Label Switching) network and analyzing traffic based on MAC addresses using the looping-protection method. This research contributes to optimizing the MPLS network and is a recommended solution for simplifying control-plane operation, especially the SR-TE method and looping-protection in the L2- VPN MPLS service. The purpose of this study is to analyze the performance of MPLS networks, as well as analyze the application of L2-VPN (Layer 2 Virtual Private Network) MPLS networks. The targeted TKT (Technology Readiness Level) is 3rd-Level, which is an analytical and experimental proof of the MPLS tunnel network model on Layer-2 VPN services. The results of the research concluded that testing the SR-TE method is a solution to simplify the process of labeling data traffic that is global labelling, then the looping-protection method is a solution to eliminate looping indications. The QoS obtained has also shown an "excellent" category based on TIPHON standards.
Go to article

Authors and Affiliations

Lukman Medriavin Silalahi
1
Setiyo Budiyanto
1
Imelda Uli Vistalina Simanjuntak
1
Rukhi Ali Effendi
1
Fernando
1
Agus Dendi Rochendi
2
Irfan Kampono
2

  1. Universitas Mercu Buana, Indonesia
  2. Badan Riset dan Inovasi Nasional, Republik Indonesia, Indonesia
Download PDF Download RIS Download Bibtex

Abstract

The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the ability to be used in audio steganography techniques. Such methods are a relatively new tool for hiding and transmitting crucial information, also being used by hackers. In the following work, the publicly available software dedicated to audio steganography is examined. The aim was to provide the general operating model of the information processing in the steganographic effort. The embedding method was analyzed for each application, providing interesting insights and allowing classifying the methods. The results prove that it is possible to detect the hidden message within the specific audio file and identify the technique that was used to create it. This may be exploited further during the hacking attack detection and prevention.
Go to article

Authors and Affiliations

Piotr Marszałek
1
Piotr Bilski
2
ORCID: ORCID

  1. Doctoral School, Warsaw University of Technology, Warsaw, Poland
  2. Warsaw University of Technology, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

Automating the tasks that require manpower has been considered as an area of active research in science and technology. Challenges in designing such systems include accuracy in the parameters of performance, minimal hardware, cost-efficiency, and security. The efficiency of drones designed for replacing humans is often evaluated using their weight, flying time, and power consumption. Herein, the prototypebased Drone model has been designed and discussed for horticulture applications. In this model, a horticulture drone has been designed for structuring and cutting of plants in street interstates. This methodology focuses on automation engineering that is utilized for cutting the plants in less time and less power, thereby diminishing the contamination that may happen by utilizing fuels. The epic part of this plan includes the less weight drone predesigned using Computer-Aided Three-Dimensional Interactive Application (CATIA) V5 Software. The throttle for the motors is adjusted at 50% to get the required thrust for the Unmanned Aerial Vehicle (UAV) to fly. Experimental results show that the horticulture drone has comparatively more flying time and less power consumption.
Go to article

Authors and Affiliations

M. Arun Kumar
1
Dioline Sara
1
Nagarjuna Telagam
1
Balwinder Raj
2

  1. Department of EECE, GITAM University Bengaluru, India
  2. Department of Electronics Communication, Engineering, NITTTR, India
Download PDF Download RIS Download Bibtex

Abstract

In a smart city environment, Intelligent Transportation System (ITS) enables the vehicle to generate and communicate messages for safety applications. There exists a challenge where the integrity of the message needs to be verified before passing it on to other vehicles. There should be a provision to motivate the honest vehicles who are reporting the true event messages. To achieve this, traffic regulations and event detections can be linked with blockchain technology. Any vehicle violating traffic rules will be issued with a penalty by executing the smart contract. In case any accident occurs, the vehicle nearby to the spot can immediately send the event message to Unmanned Aerial Vehicle (UAV). It will check for its credibility and proceed with rewards. The authenticity of the vehicle inside the smart city area is verified by registering itself with UAVs deployed near the city entrance. This is enabled to reduce the participation of unauthorized vehicles inside the city zone. The Secure Hash Algorithm (SHA256) and Elliptic Curve Digital Signature Algorithm (ECDSA-192) are used for communication. The result of computation time for certificate generation and vehicles involvement rate is presented.
Go to article

Authors and Affiliations

Suganthi Evangeline
1
Ashmiya Lenin
2
Vinoth Babu Kumaravelu
3

  1. Department of Electronics and Communication Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India
  2. PG Scholar in Communication Systems, Karunya Institute of Technology and Sciences, Coimbatore, India
  3. School of Electronics Engineering, VIT University, Vellore, India
Download PDF Download RIS Download Bibtex

Abstract

In a massive multiple-input multiple-output (MIMO) system, a large number of receiving antennas at the base station can simultaneously serve multiple users. Linear detectors can achieve optimal performance but require large dimensional matrix inversion, which requires a large number of arithmetic operations. Several low complexity solutions are reported in the literature. In this work, we have presented an improved two-dimensional double successive projection (I2D-DSP) algorithm for massive MIMO detection. Simulation results show that the proposed detector performs better than the conventional 2D-DSP algorithm at a lower complexity. The performance under channel correlation also improves with the I2D-DSP scheme. We further developed a soft information generation algorithm to reduce the number of magnitude comparisons. The proposed soft symbol generation method uses real domain operation and can reduce almost 90% flops and magnitude comparisons.
Go to article

Authors and Affiliations

Sourav Chakraborty
1
Nirmalendu Bikas Sinha
2
Monojit Mitra
3

  1. Department of Electronics and Communication Engineering, Cooch Behar Government Engineering College, Coochbehar,India
  2. Principal, Maharaja Nandakumar Mahavidyalaya, Purba Medinipore, India
  3. Department of Electronics and Telecommunication, Engineering, IIEST Shibpur, Howrah, India
Download PDF Download RIS Download Bibtex

Abstract

The cellular users, on high speed railways and highways, travel at a very high speed and follow a nearly straight path, in general. Thus, they typically undergo a maximum frequency of handovers in the cellular environment. This requires a very fast triggering of the handover. In the existing method of handover in 5G cellular communication, for high speed users, neither the decision-making of handover nor the triggering of handover is sufficiently fast. This can lead to poor signal quality and packet losses and in the worst case, radio link failure (RLF) during a handover. This paper proposes a forward handover based method, combined with PN sequence detections, to facilitate a quicker handover for high speed users on railways and highways. The proposed method adds some complexity but can offer a significant improvement in the overall handover delay. A simplistic simulation is used to demonstrate the improvement of the proposed method.
Go to article

Authors and Affiliations

Mohammad T. Kawser
1
Kazi Md. Abir Hassan
1
Md. Atiqul Haque
1
Sakif Ahmed
1
Mohammad Rubbyat Akram
2

  1. Department of Electrical and Electronic Engineering, Islamic University of Technology, Gazipur, Bangladesh
  2. Robi Axiata Ltd., Dhaka, Bangladesh
Download PDF Download RIS Download Bibtex

Abstract

In the era of continuous advancement in wireless technologies, path loss, also known as channel attenuation, is a drop in signal strength from the transmitter to the receiver. Path loss modelling is critical in designing fixed and mobile communication systems for various applications. This paper focuses on the received power (dBm) and free space path loss (FSPL) on various distances and frequencies such as 5240 MHz for wireless local area network (WLAN) and frequency such as 2100 MHz for the mobile network such as Celcom. As a result, able to analyze the correspondence between received power (dBm) and distance of each related frequency and the correspondence between FSPL (dB) and distance of each corresponding frequency and able to analyze the effect of obstacle on received power (dBm) and frequency.
Go to article

Authors and Affiliations

Kavinesh S Radhakrishna
1
Y.S. Lee
2
K.Y. You
3
K.M. Thiruvarasu
1
S.T. Ng
1

  1. Faculty of Electronic Engineering Technology, Universiti Malaysia Perlis (UniMAP), Perlis, Malaysia
  2. Faculty of Electronic Engineering Technology and Advanced Communication Engineering, Centre of Excellence (CoE), Universiti Malaysia Perlis (UniMAP), Perlis, Malaysia
  3. Faculty of Electrical Engineering, Universiti Teknologi Malaysia, 81310 UTM Skudai, Johor, Malaysia
Download PDF Download RIS Download Bibtex

Abstract

Wireless sensor network (WSN) plays a crucial role in many industrial, commercial, and social applications. However, increasing the number of nodes in a WSN increases network complexity, making it harder to acquire all relevant data in a timely way. By assuming the end node as a base station, we devised an Artificial Ant Routing (AAR) method that overcomes such network difficulties and finds an ideal routing that gives an easy way to reach the destination node in our situation. The goal of our research is to establish WSN parameters that are based on the biologically inspired Ant Colony Optimization (ACO) method. The proposed AAR provides the alternating path in case of congestion and high traffic requirement. In the event of node failures in a wireless network, the same algorithm enhances the efficiency of the routing path and acts as a multipath data transmission approach. We simulated network factors including Packet Delivery Ratio (PDR), Throughput, and Energy Consumption to achieve this. The major objective is to extend the network lifespan while data is being transferred by avoiding crowded areas and conserving energy by using a small number of nodes. The result shows that AAR is having improved performance parameters as compared to LEACH, LEACH-C, and FCM-DS-ACO.
Go to article

Authors and Affiliations

Shankar D. Chavan
1
Amruta S. Thorat
1
Monica S. Gunjal
1
Anup S. Vibhute
1
Kamalakar R. Desai
2

  1. Dr. D. Y. Patil Institute of Technology, Pimpri, Pune, (M.S.), India
  2. Bharati Vidyapeeth College of Engineering, Kolhapur (M.S.), India
Download PDF Download RIS Download Bibtex

Abstract

The paper focuses on the optimization of IEEE 802.11ax dense networks. The results were obtained with the use of the NS-3 simulator. Various network topologies were analyzed and compared. The advantage of using MSDU and MPDU aggregations in a dense network environment was shown. The process of improving the network performance for changes in the transmitter power value, CCA Threshold, and antenna gain was presented. The positive influence of BSS coloring mechanism on overal network efficiency was revealed. The influence of receiver sensitivity on network performance was determined.
Go to article

Authors and Affiliations

Marek Natkaniec
1
Mateusz Kras
2

  1. Faculty of Computer Science, Electronics and Telecommunications, Institute of Telecommunications, AGH University of Science and Technology, Poland
  2. AGH University of Science and Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

In the paper, the BTS (Background Traffic Simulator) tool is proposed to capture network traffic and then reproduce it in a simulations using the ns-3 simulator extension module. This new method of generating background traffic allows for repetitive testing of simulation scenarios under real network conditions. The authors described the differences between the previously available methods and the proposed solution. The operation of all the most important elements of the proposed tool has been described. The influence of the generated background traffic on the simulation scenario was presented as well as the results of the operation.
Go to article

Authors and Affiliations

Szymon Stryczek
1
Mikołaj Gwiazdowicz
1
Marek Natkaniec
1

  1. Faculty of Computer Science, Electronics and Telecommunications, Institute of Telecommunications, AGH University of Science and Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

On fifth-generation wireless networks, a potential massive MIMO system is used to meet the ever-increasing request for high-traffic data rates, high-resolution streaming media, and cognitive communication. In order to boost the trade-off between energy efficiency (EE), spectral efficiency (SE), and throughput in wireless 5G networks, massive MIMO systems are essential. This paper proposes a strategy for EE 5G optimization utilizing massive MIMO technology. The massive MIMO system architecture would enhance the trade-off between throughput and EE at the optimum number of working antennas. Moreover, the EE-SE tradeoff is adjusted for downlink and uplink massive MIMO systems employing linear precoding techniques such as Multiple -Minimum Mean Square Error (M-MMSE), Regularized Zero Forcing (RZF), Zero Forcing (ZF), and Maximum Ratio (MR). Throughput is increased by adding more antennas at the optimum EE, according to the analysis of simulation findings. Next, utilizing M MMSE instead of RZF and ZF, the suggested trading strategy is enhanced and optimized. The results indicate that M-MMSE provides the best tradeoff between EE and throughput at the determined optimal ratio between active antennas and active users equipment’s (UE).
Go to article

Authors and Affiliations

Ibrahim Salah
1
Kamel Hussein Rahouma
2 3
Aziza I. Hussein
4
ORCID: ORCID
Mohamed M. Mabrook
5 1
ORCID: ORCID

  1. CCE Department, Faculty of Engineering, Nahda University, Beni-Suef, Egypt
  2. Department of Electrical Engineering, Faculty of Engineering, Minia University, Minia, Egypt
  3. Faculty of Computer Science, Nahda University, Beni-Suef, Egypt
  4. Electrical & Computer Eng. Dept., Effat University, Jeddah, KSA
  5. Faculty of Navigation Science & Space Technology, Beni-Suef University, Beni-Suef, Egypt
Download PDF Download RIS Download Bibtex

Abstract

In this paper, we show that the signal sampling operation considered as a non-ideal one, which incorporates finite time switching and operation of signal blurring, does not lead, as the researchers would expect, to Dirac impulses for the case of their ideal behavior.
Go to article

Authors and Affiliations

Andrzej Borys
1
ORCID: ORCID

  1. Gdynia Maritime University, Poland
Download PDF Download RIS Download Bibtex

Abstract

Europe has to face strong competitive challenges in the field of QIT from other regions of the world. The tools for the effective implementation of the challenges related to the start, we hope, of building a quantum civilization are both common and individual in particular European countries. Joint projects in the field of QIT, usually narrowly focused, are announced by large European Agencies and are related to their activities. Large-scale collaborative projects are of course the domain of the EC. National projects depend heavily on the capabilities of individual countries and vary greatly in size. The most technologically advanced European countries invest hundreds of millions of Euros in national QIT projects annually. The largest European FET class project currently being implemented is the Quantum Flagship. Although the EQF is basically just one of the elements of a large and complicated European scene of development of quantum technologies, it becomes the most important element and, in a sense, a dominant one, also supported from the political level. There are complex connections and feedbacks between the elements of this quantum scene. National projects try to link to the EQF. Here we are interested in such connections and their impact on the effectiveness of QIT development in Europe, and especially in Poland.
Go to article

Authors and Affiliations

Ryszard S. Romaniuk
1

  1. Warsaw University of Technology, Poland

Instructions for authors

Author Guidelines

We recommend the use of LaTeX2e for the preparation of your camera-ready manuscript, together with the corresponding class file.

We do not encourage the use of Microsoft Word, particularly as the layout of the pages (the position of figures and paragraphs or fonts) can change between printouts. If you would like to prepare your manuscript using MS Word please contact Editorial Office.

Please carefully read the information below, and download the relevant files.

To do so, please download JETInfo.pdf

Microsoft Windows or Macintosh LaTeX2e style file:

      Please download IEEEtran.zip

Publication requirement is to prepare no less than 6 pages including references using provided LaTeX2e style. All papers that do not meet this requirement will be rejected before review stage.

 

 

Please submit the following:

  •     All source LaTeX files.
  •     Final PDF file (for reference).
  •     PS/EPS or TIFF files for all figures.
  •     Complete contact information for all authors.
  •     Mailing address, a VAT/CIF/NIF/NIP number (depending on the country) of affiliated company the invoice should be sent.

 

IMORTANT! Before staring submission please prepare a contact information for all co-authors (full names, e-mails and affiliations). A contact information for all authors should be provided during submission process in "Step 2. Entering the Submission's Metadata". Papers submitted without contact information for all co-

This page uses 'cookies'. Learn more