Int. J. Interdiscip. Telecommun. Netw.最新文献

筛选
英文 中文
MMSE Indicator Error Rate Performance on MIMO When Increasing Modulation Order 增加调制阶数时MIMO的MMSE指示器错误率性能
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-07-01 DOI: 10.4018/IJITN.2021070101
E. Some, I. Ayad, B. Boots
{"title":"MMSE Indicator Error Rate Performance on MIMO When Increasing Modulation Order","authors":"E. Some, I. Ayad, B. Boots","doi":"10.4018/IJITN.2021070101","DOIUrl":"https://doi.org/10.4018/IJITN.2021070101","url":null,"abstract":"The internet of things (IoT) is the notion of all devices and products being connected to the internet rather than only computers and mobile devices as has been the case until the recent past. The IoT is already booming, and its adoption will only accelerate in coming years. At the same time, the world continues to go wireless. Wired internet and telephone connections are becoming rarer with each passing year, and consumers expect and demand wireless communications. One critical enabling technology for the IoT is wireless communications: IP-cameras, printers, kitchen appliances, and more deliver greater flexibility in their design when they do not need a wired connection to access the internet. In this paper, a flexible spectrum management framework to enable greater innovation, investment, and flexibility in IoT products, as well as the necessary architecture that will enable a wider deployment of IoT, is proposed. An illustration and analogy from the success of the unlicensed bands used for wi-fi technology and the accompanying supporting organizations that enable wi-fi's success are drawn.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122875264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power Allocation Adaptation With Coherence Time for Nonorthogonal Multiple Access on Downlink Transmission 基于相干时间的非正交多址下行传输功率分配自适应
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-07-01 DOI: 10.4018/IJITN.2021070104
Jia-Chin Lin, Chih-Yen Liu
{"title":"Power Allocation Adaptation With Coherence Time for Nonorthogonal Multiple Access on Downlink Transmission","authors":"Jia-Chin Lin, Chih-Yen Liu","doi":"10.4018/IJITN.2021070104","DOIUrl":"https://doi.org/10.4018/IJITN.2021070104","url":null,"abstract":"Nonorthogonal multiple access (NOMA) methods are expected to improve spectral efficiency or increase sum rate in a recent mobile communication network. The performance of the power-domain NOMA highly relies on the effectiveness of successive interference cancelation (SIC) and power allocation techniques. This paper proposes an adaptive power allocation method according to analytical coherence time of time-varying channels to improve the SIC effectiveness. Simulations show that the proposed technique can improve SIC, therefore reducing error probability without reduction of the sum rate.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129346568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Cost RFID Authentication Protocol Based on Elliptic Curve Algorithm 基于椭圆曲线算法的低成本RFID认证协议
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-04-01 DOI: 10.4018/IJITN.2021040101
Rania Baashirah, Abdelshakour A. Abuzneid, Salah Addine Mellouki, Zeba Siraj, Chen Zhan
{"title":"Low-Cost RFID Authentication Protocol Based on Elliptic Curve Algorithm","authors":"Rania Baashirah, Abdelshakour A. Abuzneid, Salah Addine Mellouki, Zeba Siraj, Chen Zhan","doi":"10.4018/IJITN.2021040101","DOIUrl":"https://doi.org/10.4018/IJITN.2021040101","url":null,"abstract":"Radio frequency identification (RFID) is the fastest growing technology in the world today. Thus, wireless communication between tags and readers became an integral part of retail products, library books, personal identifications, and healthcare. The RFID system can provide security features to the data transferred along the network to maintain data privacy, integrity, and confidentiality. Elliptic curve cryptography (ECC) is widely used in RFID authentication protocols to improve communication security. Zhao proposed an RFID authentication protocol using ECC where a unique access list for tags is generated with the reader identifier to elevate the security level. Although Zhao's protocol can withstand most of the RFID security attacks, it has a very high computation cost. The authors improve Zhao protocol and propose a new RFID authentication protocol by reducing the computation cost almost to the half of that in Zhao. The proposed protocol shows a significant improvement in the computation cost.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124881580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RF-Based Machine Learning Solution for Indoor Person Detection 基于射频的室内人检测机器学习解决方案
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-04-01 DOI: 10.4018/IJITN.2021040104
Pedro Maia De Santana, Thiago A. Scher, J. Bazzo, Álvaro Augusto M. de Medeiros, V. Sousa
{"title":"RF-Based Machine Learning Solution for Indoor Person Detection","authors":"Pedro Maia De Santana, Thiago A. Scher, J. Bazzo, Álvaro Augusto M. de Medeiros, V. Sousa","doi":"10.4018/IJITN.2021040104","DOIUrl":"https://doi.org/10.4018/IJITN.2021040104","url":null,"abstract":"Machine learning techniques applied to radio frequency (RF) signals are used for many applications in addition to data communication. In this paper, the authors propose a machine learning solution for classifying the number of people within an indoor ambient. The main idea is to identify a pattern of received signal characteristics according to the number of people. Experimental measurements are performed using a software-defined radio platform inside a laboratory. The data collected is post-processed by applying a feature mapping technique based on mean, standard deviation, and Shannon information entropy. This feature-space data is then used to train a supervised machine learning network for classifying scenarios with zero, one, two, and three people inside. The proposed solution presents significant accuracy in classification performance.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115870270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Medium Access Control Protocols for Brain Computer Interface Applications 脑机接口应用的介质访问控制协议
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-04-01 DOI: 10.4018/IJITN.2021040103
H. Harikrishnan, Aarjish Sarkar, Shams Al Ajrawi, A. Mihovska, C. Paolini
{"title":"Medium Access Control Protocols for Brain Computer Interface Applications","authors":"H. Harikrishnan, Aarjish Sarkar, Shams Al Ajrawi, A. Mihovska, C. Paolini","doi":"10.4018/IJITN.2021040103","DOIUrl":"https://doi.org/10.4018/IJITN.2021040103","url":null,"abstract":"Noteworthy advancements have occurred in the field of brain computer interfaces (BCI) in the last decade. The transmission of the collected signals to the corresponding organ through a wireless link is still in a nascent stage. This paper investigates the feasibility of having multiple UHF-RFID transmitters inside the skull which communicate to the receiver outside. The purpose of this paper is to design a wireless communication channel and enhance the communication using a MAC protocol. The existing MAC protocols were analyzed to be used in a BCI application. Though the combination of existing protocols seems like a possibility to use in a BCI system, the complexity of such a protocol is high. This drawback is overcome by proposing a novel MAC protocol. The performance of the proposed MAC algorithm is related with the widely used Q algorithm for anti-collision in the RFID tags. Parameters like delay and collisions are analyzed in detail which are essential to build a consistent, energy efficient, and a low power BCI system.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126037121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authenticated and Trusted AODV (ATAODV) Routing Protocol to Detect Blackhole Attack in MANET-Based Military Environments 基于无线网络的军事环境中检测黑洞攻击的认证与可信AODV (ATAODV)路由协议
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-04-01 DOI: 10.4018/IJITN.2021040105
Prathapchandran Kannimuthu
{"title":"Authenticated and Trusted AODV (ATAODV) Routing Protocol to Detect Blackhole Attack in MANET-Based Military Environments","authors":"Prathapchandran Kannimuthu","doi":"10.4018/IJITN.2021040105","DOIUrl":"https://doi.org/10.4018/IJITN.2021040105","url":null,"abstract":"In this paper, an authenticated and trusted AODV (ATAODV) routing protocol is proposed to identify and eliminate the black attack and form the trusted route in MANET-based military environments. The aim is to provide two-level security by mapping the multi-agent system (MAS). The first level focuses on providing authentication by identifying blackhole soldiers/devices, and the second level focuses on forming a trusted path between the origin and the endpoint communication. The authentication is achieved by aggregated trust (AT), which is calculated based on the reputation, closeness, and energy by aggregated trust design agent (ATDA). Then, forming a trusted route between the source and the destination is achieved by combining route aggregated trust (RAT), which is calculated based on AT and hop count (HC). The trusted route is formed by a routing agent (RA). The simulation results demonstrate that the ATAODV routing protocol is performing well and shows improved results compared with the existing routing protocols.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130184225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Performance Evaluation of Resourceful Energy Saving Protocols of Heterogeneous WSN to Maximize Network Stability and Lifetime 基于异构WSN的资源节能协议性能评估
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-04-01 DOI: 10.4018/IJITN.2021040106
Ramkrishna Ghosh, S. Mohanty, P. Pattnaik, S. Pramanik
{"title":"A Novel Performance Evaluation of Resourceful Energy Saving Protocols of Heterogeneous WSN to Maximize Network Stability and Lifetime","authors":"Ramkrishna Ghosh, S. Mohanty, P. Pattnaik, S. Pramanik","doi":"10.4018/IJITN.2021040106","DOIUrl":"https://doi.org/10.4018/IJITN.2021040106","url":null,"abstract":"The wireless sensor network (WSN) is a swiftly growing technological knowledge stage with noteworthy and dynamic implementations in various fields. Due to minute battery power in WSNs, power utilization in WSN is a foremost problem. In this paper, the authors have compared resourceful power consumption protocols using different variants of SEP protocols. The simulation results demonstrate that out of variants of SEP, ZSEP performs better among all these protocols in relation to stability, life span, and throughput of the sensor network fairly.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133107335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving Area Coverage With Mobile Nodes in Wireless Sensor Networks 利用移动节点提高无线传感器网络的区域覆盖
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-01-01 DOI: 10.4018/ijitn.2021010104
Dhruvi Patel, A. Jaekel
{"title":"Improving Area Coverage With Mobile Nodes in Wireless Sensor Networks","authors":"Dhruvi Patel, A. Jaekel","doi":"10.4018/ijitn.2021010104","DOIUrl":"https://doi.org/10.4018/ijitn.2021010104","url":null,"abstract":"Wireless sensor networks (WSN) consist of sensor nodes that detect relevant events in their vicinity and relay this information for further analysis. Considerable work has been done in the area of sensor node placement to ensure adequate coverage of the area of interest. However, in many applications it may not be possible to accurately place individual sensor nodes. In such cases, imprecise placement can result in regions, referred to as coverage holes, that are not monitored by any sensor node. The use of mobile nodes that can ‘visit' such uncovered regions after deployment has been proposed in the literature as an effective way to maintain adequate coverage. In this paper, the authors propose a novel integer linear programming (ILP) formulation that determines the paths the mobile node(s) should take to realize the specified level of coverage in the shortest time. The authors also present a heuristic algorithm that can be used for larger networks.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130825973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Uplink Power-Domain Non-Orthogonal Multiple Access (NOMA): Bit Error Rate Performance With Channel Estimation Errors 上行功率域非正交多址(NOMA):考虑信道估计误差的误码率性能
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2020-10-01 DOI: 10.4018/ijitn.2020100105
Faeik T. Al Rabee, R. Gitlin
{"title":"Uplink Power-Domain Non-Orthogonal Multiple Access (NOMA): Bit Error Rate Performance With Channel Estimation Errors","authors":"Faeik T. Al Rabee, R. Gitlin","doi":"10.4018/ijitn.2020100105","DOIUrl":"https://doi.org/10.4018/ijitn.2020100105","url":null,"abstract":"Non-orthogonal multiple access (NOMA) has been proposed as a promising multiple access (MA) technique in order to meet the requirements for fifth generation (5G) communications and to enhance the performance in internet of things (IoT) networks by enabling massive connectivity, high throughput, and low latency. This paper investigates the bit error rate (BER) performance of two-user uplink power-domain NOMA with a successive interference cancellation (SIC) receiver and taking into account channel estimation errors. The analysis considers two scenarios: perfect (ideal) channel estimation and a channel with estimation errors for various modulations schemes, BPSK, QPSK, and 16-QAM. The simulation results show that, as expected, increasing of the modulation level increases the SIC receiver BER. For example, at a signal-to-noise ratio (SNR) of 5 dB for perfect channel estimation and QPSK modulation, the user that is detected first has a BER of 0.005 compared to 0.14 for the user that is detected with the aid of the SIC receiver. Similarly, the BER of QPSK, assuming 0.25 channel estimation error of user 1, is equal to 0.06 at SNR = 15 dB compared to 0.017 for perfect estimation.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124246921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Exploring Non-Idealities in Real Device Implementations of Bluetooth Mesh 探索蓝牙Mesh在实际设备实现中的非理想性
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2020-10-01 DOI: 10.4018/ijitn.2020100104
Paul Gavrikov, Matthias Lai, T. Wendt
{"title":"Exploring Non-Idealities in Real Device Implementations of Bluetooth Mesh","authors":"Paul Gavrikov, Matthias Lai, T. Wendt","doi":"10.4018/ijitn.2020100104","DOIUrl":"https://doi.org/10.4018/ijitn.2020100104","url":null,"abstract":"This work compares the performance of Bluetooth Mesh implementations on real chipsets against the ideal implementation of the specification. Measurements are taken in experimental settings and reveal non-idealities in the underlying Bluetooth Low Energy specification in real chipsets and in the implementation of Mesh, which introduces an unruly transmission as well as reception behavior. These effects lead to an impact on transmission rate, reception rate, latency, as well as a more significant impact on the average power consumption.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123011472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信