{"title":"High-Accuracy Visualization-Based Grouping of MIMO Multipath Waves","authors":"Emmanuel T. Trinidad, Lawrence Materum","doi":"10.12720/jcm.18.1.68-75","DOIUrl":"https://doi.org/10.12720/jcm.18.1.68-75","url":null,"abstract":"Wireless multipath propagation causes different paths taken by the signal due to interacting objects present in the environment producing multipath components (MPCs). Cluster-based channel models characterize the wireless channel, and different approaches are utilized to cluster the MPCs. Data mining requires different techniques such as visualization to extract important information and find patterns and clusters in the data. A Graphical User Interface (GUI) is developed in this paper to aid the visualization and the manual clustering of MPCs using t-distributed Stochastic Neighborhood Embedding (t-SNE) and Uniform Manifold Approximation and Projection (UMAP). The clustering results of Simultaneous Clustering and Model Selection (SCAMS) are used in this paper. The datasets are embedded into low-dimensional projection and are manually re-clustered. The manual clustering was performed visually and interactively, which achieves a higher Jaccard membership index with a low value of 0.3368, a median of 0.4697, and a high value of 0.8884 for all the datasets.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"27 1","pages":"68-75"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83367245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposed Compact Broadband Meander Antenna for RFID Applications","authors":"A. Al-Ka'bi","doi":"10.12720/jcm.18.3.140-146","DOIUrl":"https://doi.org/10.12720/jcm.18.3.140-146","url":null,"abstract":"Radio Frequency Identification technology aims at identifying and tracking objects labeled with tags. To achieve this goal, the need for antennas with certain characteristics and specifications becomes of great importance. In this research work, a proposed compact broadband meander antenna for Radio Frequency Identification Applications is presented. In the proposed model of the antenna, the inductive strips are bent to generate capacitive effects between them. To achieve an acceptable impedance matching at a frequency of 876MHz between the antenna and the receiving microchip of model “NXP UCODE G2XL”, shorting lines created along the antenna structure together with a T-shaped matching circuit are used. This proposed design of the antenna results in a compact size antenna (75×25×1.6mm3) with a resonance frequency that lies in theEuropean band of 867MHz, and it has an input impedance of Z = 16 - j156 Ω. The antenna is made from copper strip with a thickness of 35 μm and fabricated on an FR4 epoxy substrate with a thickness of 1.6 mm. This paper presents the proposed antenna simulation results performed in various situations and conditions. The antenna performance is investigated in terms of various aspects such as gain, radiation pattern, return loss, and input impedance.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"61 1","pages":"140-146"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89957623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Abdulzahra Ahmed Al-Dulaimi, Husam A. Wahhab, Ahmed Abdulhussein Amer
{"title":"Design and Implementation of Communication Digital FIR Filter for Audio Signals on the FPGA Platform","authors":"Mohammed Abdulzahra Ahmed Al-Dulaimi, Husam A. Wahhab, Ahmed Abdulhussein Amer","doi":"10.12720/jcm.18.2.89-96","DOIUrl":"https://doi.org/10.12720/jcm.18.2.89-96","url":null,"abstract":"Digital Signal Processing (DSP) in telecommunications is widely used for its outstanding performance. Hence, optimal results would be obtained with the sophisticated design and implementation of the digital Finite Impulse Response (FIR) filter. In this paper, the design and implementation of the FIR filter for processing the audio signal are obtained through the Field-Programmable Gate Array (FPGA) platform -Altera DE1 board. The design is divided into three primary blocks, which are the S2P Adapter block, Codec initialization block, as well as FIR filter block, which were then interfaced together; then, every block was compiled and simulated in order to obtain accurate results. The whole system was built to be functional, and finally, the frequency response was obtained. 100% significant accuracy and high quality are examined for implementing the filter in FPGA platform chip board programmed in (VHDL).","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"29 1","pages":"89-96"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85552030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accuracy and Cluster Analysis of 5.3 GHz Indoor and 285 MHz Semi-urban MIMO LOS and NLOS Propagation Multipaths","authors":"Antipas T. Teologo, Lawrence Materum","doi":"10.12720/jcm.18.2.135-139","DOIUrl":"https://doi.org/10.12720/jcm.18.2.135-139","url":null,"abstract":"Over the past decade, several studies have been conducted to discover a better-performing multipath clustering technique. Developing a multipath clustering technique with better accuracy performance is a big challenge considering the varying properties of the multipath propagations that change over time. In this study, several clustering techniques have been investigated and compared to the newly-developed technique for performance analysis. Using the Jaccard score as a metric for the accuracy of grouping correctly the wireless multipaths, the performance of the different clustering techniques has been determined and compared to the newly-developed technique. The proposed clustering algorithm shows improved performance in the indoor channel scenarios but needs further investigation in the semi-urban environment.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"14 1","pages":"135-139"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88333346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing Data Transport Efficiency in Datacenters through Traffic Shaping of BBR Congestion Control","authors":"S. Ahmad, Sadia Khalid","doi":"10.12720/jcm.18.2.97-108","DOIUrl":"https://doi.org/10.12720/jcm.18.2.97-108","url":null,"abstract":"Compared to commonly used loss-based congestion control algorithms predominantly used in Transmission Control Protocol (TCP) implementations, congestion-based congestion control called BBR has shown much better performance in resource-abundant modern communication links. However, for a high influx of TCP sessions on the bottleneck switch, clusters in High-Performance Compute (HPC) nodes and data centers face resource constraints because of the immense workload during orchestration and relocation of workflows across the resource pool. This article discusses how to resolve this problem, commonly known as TCP incast, through efficient queue management of the bottleneck link and adding a shaper function in the standard BBR algorithm. We analyzed TCP incast issue for two efficient versions of congestion control i.e., BBR and CUBIC (named after the cubic function used instead of linear function), in a highly overloaded convergent switch of the cluster. It is noticeable that the queuing delay and buffer build-up are two essential parameters in causing TCP Incast. Hence, we used the M/G/1/B queuing model when multiple TCP sessions generate the network traffic and different buffer build-up scenarios are analyzed in the bottleneck node of HPC clusters. Based on the findings of our queuing analysis, we propose an incast recovery BBR algorithm that introduces additional controls like Incast shaping to deal with queue build-up during TCP incast. The effects of these modifications in BBR implementation are studied in terms of performance parameters like flow completion time, throughput, RTT variations, and fairness to other competing flows are significant compared with standard BBR and CUBIC implementations.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"11 1","pages":"97-108"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87212112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Asvial, Awangga Febian Surya Admaja, Muh Asnoer Laagu
{"title":"Non-cooperative Game Leach for Cluster Distribution Routing Method on Wireless Sensor Network (WSN)","authors":"M. Asvial, Awangga Febian Surya Admaja, Muh Asnoer Laagu","doi":"10.12720/jcm.18.3.198-206","DOIUrl":"https://doi.org/10.12720/jcm.18.3.198-206","url":null,"abstract":"A wireless sensor network (WSN) is a group of sensor nodes that take data with specific measurement parameters and then send the data wirelessly to a central node or server for data processing. WSN nodes are designed to be compact; therefore, the energy of sensor nodes usually depends on the integrated battery. The sensor node must work as efficiently as possible so that energy use can be more efficient and WSN life can be prolonged. The longer the lifespan of the WSN, the higher the throughput. One of the many ways to extend the life of the WSN is to use the concept of grouping nodes or the so-called cluster method. This study proposes the The Division Non-Cooperative Game LEACH (DivNCGL) routing method, a modified method based on Low Energy Adaptive Clustering Hierarchy (LEACH) by distributing cluster heads (CHs). The distribution process is performed by dividing the distribution area of the nodes into subregions. The subregion division process uses the probability value obtained by the non-cooperative game method based on the remaining active nodes, the total remaining energy, and the energy required for transmission. The simulation results, the lifespan of WSN using the DivNCGL method increases up to 30% with stable energy dissipation compared to the LEACH protocol. The increasing lifespan of the WSN also increases the amount of data transmitted, thereby increasing the received throughput. Received data increases up to 70% using the DivNCGL method compared to LEACH.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"20 1","pages":"198-206"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77137780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Traffic Models under Multiple Black hole Attack in Wireless Mesh Network","authors":"Dr. Pushpender Sarao","doi":"10.12720/jcm.18.3.172-179","DOIUrl":"https://doi.org/10.12720/jcm.18.3.172-179","url":null,"abstract":"Wireless networks are the networks in which data communication is done through the wireless channels and wireless nodes. In such type of the networks, cooperation of the all nodes is required. Due to which, chances of security attacks is possible and network performance and security is badly affected. Black hole attack is a security attack comes under the active, internal as well as external attacks. In black hole attack, malicious node presents a suitable, shortest and low cost path. If the above path is selected for data transmission, malicious node drops the received packets and as a result performance of the network is degraded. In this paper, impact of Random Direction (RD) and Reference Point Group Mobility (RPGM) models have been analyzed for wireless mesh network in the presence of multiple black hole attacks. By varying the number of network connections and node density, (Ad hoc on demand distance vector) AODV routing protocol is evaluated. Normalized routing load, average end to end delay, average throughput, and total number of packets received are considered as performance metrics. Bonn-motion tool has been used to create the scenario of mobility models. In the presence of black hole attack, and under RPGM mobility model, AODV routing protocol presents better results in respect of average throughput, normalized routing load. Simulation work has been carried out on network simulator version NS-2.35.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"10 2 1","pages":"172-179"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78316760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Comparison of SOM and ACO for Travelling Salesman Problem-Case Study on the Indonesia Palapa Ring Network","authors":"R. Negara, Ratna Mayasari, Nana R. Syambas","doi":"10.12720/jcm.18.2.109-115","DOIUrl":"https://doi.org/10.12720/jcm.18.2.109-115","url":null,"abstract":"Indonesia is an archipelagic country separated by the sea, so it has unique characteristics. Building a telecommunications network that optimally connects Indonesia's islands is essential. Currently, telecommunications networks in Indonesia are connected using the Palapa Ring Indonesia network. Several adjacent islands must specify the closest point to choose a neighbouring route. This paper uses a travelling salesman problem (TSP) that uses the Self-Organizing Map (SOM) and Ant-Colony Optimization (ACO) algorithms to determine the shortest route and optimal computation time. Paper modification has several parameters: number of iterations, neuron size, and space. The measurement results show that SOM is better at measuring the shortest route length and computational time than ACO. By setting the number of iterations below 500 and the M value as much as the number of neurons, the route obtained by SOM will be shorter with a shorter time.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"31 1","pages":"109-115"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90913755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ntebatseng Mahlake, Topside E. Mathonsi, D. D. Plessis, Tonderai Muchenje
{"title":"A Lightweight Encryption Algorithm to Enhance Wireless Sensor Network Security on the Internet of Things","authors":"Ntebatseng Mahlake, Topside E. Mathonsi, D. D. Plessis, Tonderai Muchenje","doi":"10.12720/jcm.18.1.47-57","DOIUrl":"https://doi.org/10.12720/jcm.18.1.47-57","url":null,"abstract":"The Internet of Things (IoT) is an anticipated future technology that promises to connect a massive number of devices over the internet. Wireless Sensor Networks (WSNs) are regarded as one of the most essential subnetworks of the IoT. Sensor networks are being utilized by IoT to gather, monitor, and send sensitive data across wireless networks. Because the information transferred through WSNs is easily exposed to cyber-attacks, data security is critical. In WSNs, the attacker's adversary aims are to deteriorate and halt the network's effective use, as well as to interrupt network services, rendering them unreachable to the users or providing a user with false feedback. Since the users don’t have control over their data transmitted on the wireless medium or stored in the middleware, anyone with internet access can access it. This puts data confidentiality, authenticity, and integrity at risk since users with unauthorized access can easily access, alter, and manipulate data in transit. The proposed Lightweight Security Algorithm (LSA) is a hybrid algorithm created by combining the Security Protocol for Sensor Networks (SPINS) with the Secure IoT (SIT) encryption technique to improve WSN’s data security while lowering the threshold of attacks and minimize power consumption in WSNs without impacting network performance. Furthermore, the proposed LSA reduces the key generation time by 102mS thus improving the security by 99%. During data transmission, the power consumption is reduced by an average of 411.2uJ and the Packet Drop Ratio (PDR) is between 90 and 99% when comparing it with SPN and Feistel techniques.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"262 1","pages":"47-57"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75770730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}