{"title":"Performance Analysis of Routing Protocol Using Trust-Based Hybrid FCRO-AEPO Optimization Techniques","authors":"S. Mohan, P. Vimala","doi":"10.37394/23204.2023.22.7","DOIUrl":"https://doi.org/10.37394/23204.2023.22.7","url":null,"abstract":"Mobile Ad hoc Networks (MANETs) offer numerous benefits and have been used in different applications. MANETs are dynamic peer-to-peer networks that use multi-hop data transfer without the need forpre-existing infrastructure. Due to their nature, for secure communication of mobile nodes, they need unique security requirements in MANET. In this work, a Hybrid Firefly Cyclic Rider Optimization (FCRO) algorithm is proposed for Cluster Head selection, it efficiently selects the cluster head and improves the network efficiency. The Ridge Regression Classification algorithm is presented in this work to detect the malicious nodes in the network and the data is transmitted using trusted Mobile nodes for the QoS performance metric improvement. A trust-based routing protocol is introduced using the Atom Emperor Penguin Optimization (AEPO) algorithm, it identifies the best-forwarded path to moderate the routing overhead problem in MANET. The proposed method is implemented using Matlab software and the performance metrics are packet delivers ratio, packet loss ratio, routing overhead, throughput, end-to-end delay, transmission delay, network lifetime, and energy consumption. The proposed AEPO algorithm is compared with the existing PSO-GA, TID-CMGR, and MFFA. The AEPO algorithm’s performance is approximately 1.5%, 3.2%, 2%, 3%, and 4% higher than the existing methods for packet delivers ratio, packet loss ratio, end-to-end delay, and throughput and network lifetime. This evaluation enables the sender nodes to improve their data transmission rates and minimizes the delay. Additionally, the suggested technique has a clear benefit in terms of demonstrating the genuine contribution of distinct nodes to trust evaluation.","PeriodicalId":330638,"journal":{"name":"WSEAS TRANSACTIONS ON COMMUNICATIONS","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126104976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Congestion Control and QoS Scheduling Using Novel Rate Aware-Neuro-Fuzzy Algorithm in MANET","authors":"S. Mohan, DR. P. Vimala","doi":"10.37394/23204.2023.22.6","DOIUrl":"https://doi.org/10.37394/23204.2023.22.6","url":null,"abstract":"Mobile Ad Hoc Networks (MANET) provides a vibrant atmosphere wherein data may be substituted deprived of the necessity of human authority or a centralized server, as long as nodes work together for routing. As long as security throughout the multipath routing protocol and data transfer over many routes in a MANET is a difficult problem, this work offers a message security technique. This study presents the congestion control and QoS scheduling mechanism. The goal of this study is to examine standardized MAC protocols on MANET, to measure performance under various node densities and MAC protocols. Initially, this work presents the Centralized Congestion Detection method to detect congestion with baseline parameters. Accordingly, the congestion is avoided using Novel Rate Aware-Neuro-Fuzzy based Congestion Controlling strategy. This method effectively controls the congestion in the Network. This mechanism has been proposed which defines three levels of congestion based on which the data rate, throughput, overhead and delay. However, after controlling the congestion, the optimal routes are given to the packets by proposing an Ambient Intelligence-based Ant colony optimization quality-aware energy routing protocol (AIACOAR). This method finds the most efficient route to a destination and decreases the time and energy required. Accordingly, for securing the network against malicious attacks, an Elliptic Curve Cryptography (ECC) encryption mechanism is presented. Consequently, the multihop scheduler performs QoS-based scheduling in MANET. Schedulers in MANET take into account various QoS parameters such as end-to-end packet delay, packet delivery ratio, flow priority, etc. The proposed method is implemented using Matlab software, and the evaluation metrics are PDR, jitter, congestion detection time, delay, route selection time, and throughput. The performance of the proposed method is compared to the existing AIFSORP and LF-SSO techniques. While compared to these methods, the proposed method’s performance is improved in terms of PDR, delay, throughput, etc. The PDR value of the proposed method reaches approximately 99%, and it produces a very low delay. This produces reliable route discovery, optimized congestion control, and better QoS scheduling, therefore, these improve the system performance. In future, a recent bio-inspired technique is presented to even more minimize energy consumption and further improve the system's performance.","PeriodicalId":330638,"journal":{"name":"WSEAS TRANSACTIONS ON COMMUNICATIONS","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132820021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeanette Mejia Rojas, M. Reyes-Ayala, E. A. Andrade-Gonzalez, Sandra Chavez-Sanchez, H. Terres-Peña, René Rodríguez-Rivera
{"title":"2 x 1 Rectangular-Patch Antenna Array at 2.4 GHz","authors":"Jeanette Mejia Rojas, M. Reyes-Ayala, E. A. Andrade-Gonzalez, Sandra Chavez-Sanchez, H. Terres-Peña, René Rodríguez-Rivera","doi":"10.37394/23204.2023.22.5","DOIUrl":"https://doi.org/10.37394/23204.2023.22.5","url":null,"abstract":"In this paper a microstrip antenna array is carried out. The array has two rectangular patches in a linear 2 x 1 array. This work includes the design, simulation, implementation and evaluation of both, a single radiator and the linear two rectangular microstrip antenna array. The antenna array was designed and built for low-cost and noncomplex manufacturing techniques, because the array is dedicated for educational purposes in under-graduate radiocommunication courses at Metropolitan Autonomous University. The mechanical tolerance in the structure dimensions is around 0.2 mm, that is easy to be obtained by an inexpensive CNC or very well-known optical techniques. The simulation and optimization of the array was computed using HFSS and the results of this stage include antenna patterns and the reflection coefficient (S11). Besides, the experimental evaluation of the array is quite similar to the simulations results in both, radiation patterns and the frequency response using the matching interval, for a single radiator and the 2x1 array.","PeriodicalId":330638,"journal":{"name":"WSEAS TRANSACTIONS ON COMMUNICATIONS","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126222352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Karol Yamel Bautista Ramírez, E. A. Andrade-Gonzalez, M. Reyes-Ayala, J. G. V. Talavera, René Rodríguez Rivera, Sandra Chávez Sánchez, H. Terres-Peña
{"title":"Improving Isolation in MIMO Antenna for WLAN Applications","authors":"Karol Yamel Bautista Ramírez, E. A. Andrade-Gonzalez, M. Reyes-Ayala, J. G. V. Talavera, René Rodríguez Rivera, Sandra Chávez Sánchez, H. Terres-Peña","doi":"10.37394/23204.2023.22.4","DOIUrl":"https://doi.org/10.37394/23204.2023.22.4","url":null,"abstract":"The system Wireless Local Area Network (WLAN) presents minimum bandwidths to provide required transmission data rates, isolation can also be improved using multiple input multiple output (MIMO) scheme increasing their capacity. In this paper, the Decoupling Networks technique is presented to reduce the coupling between the elements of the MIMO antenna and thus improve data rate with a 2x2 MIMO antenna system. The dielectric used was FR4 substrate with dielectric constant εr = 4.4 and thickness of substrate 1.544 mm. The S11 and S12 scattering parameters were obtained as well as ECC at the resonance frequency and bandwidth. The radiation pattern and the current density are simulated by HFSS. The antenna size is 80x65mm^2.","PeriodicalId":330638,"journal":{"name":"WSEAS TRANSACTIONS ON COMMUNICATIONS","volume":"2023 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121201677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Chinese Emotion Classification using BERT-RCNN-ATT","authors":"Feng Li, Yintong Huo, Lingling Wang","doi":"10.37394/23204.2023.22.2","DOIUrl":"https://doi.org/10.37394/23204.2023.22.2","url":null,"abstract":"Emotional classification is the process of analyzing and reasoning subjective texts with emotional color, that is, analyzing whether their emotional tendencies are positive or negative. Aiming at the problems of massive data and nonstandard words in the existing Chinese short text emotion classification algorithm, the traditional BERT model does not distinguish the semantics of words with the same sentence pattern clearly, the multi-level transformer training is slow, time-consuming, and requires high energy consumption, this paper proposes to classify users' emotions based on BERT-RCNN-ATT model, and extract text features in depth using RCNN combined with attention mechanism, Multi task learning is used to improve the accuracy and generalization ability of model classification. The experimental results show that the proposed model can more accurately understand and convey semantic information than the traditional model. The test results show that compared with the traditional CNN, LSTM, GRU models, the accuracy of text emotion recognition is improved by at least 4.558%, the recall rate is increased by more than 5.69%, and the F1 value is increased by more than 5.324%, which is conducive to the sustainable development of emotion intelligence combining Chinese emotion classification with AI technology.","PeriodicalId":330638,"journal":{"name":"WSEAS TRANSACTIONS ON COMMUNICATIONS","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123517441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Detailed Network Systems Configuration Management Automation using Python","authors":"Armando Elezi, Dimitrios Alexios Karras","doi":"10.37394/23204.2023.22.1","DOIUrl":"https://doi.org/10.37394/23204.2023.22.1","url":null,"abstract":"In nowadays, communications are expanding in very high rates. New technologies are being born and some of them are taking so much importance in people’s lives. In a situation where people’s needs are getting more complicated and everybody’s lifestyle is advancing to another level, bigger and better infrastructure is needed. Managing all this process can’t be anymore a step by step process. It is strictly needed to evolve in automated process. Network configuration and reconfiguration may be a repetitive process, time consuming, and error prone process. To address this problem this paper is going to shed light on the benefits of an automated configuration and topology verification process. To this end, a proof of concept system, Netmiko, has been used in a case study. Netmiko scripts are able to read the current network state, can apply predefined configurations loaded from text-files or csv files, and automatically verify the network state. The goals of this paper are to demonstrate the development of Netmiko scripts, to illustrate the simplicity in the implementation, to compare the automated network system reconfiguration to a fully manual one, and, finally, to discuss potential pros and cons in switching to an automated network configuration process in everyday practice. A simple Packet Tracer simulation in joint with a GNS3 simulation are involved to evaluate this proof of concept. In Packet tracer a manual network configuration is performed while in GNS3 an automated network configuration is developed.","PeriodicalId":330638,"journal":{"name":"WSEAS TRANSACTIONS ON COMMUNICATIONS","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Calculation of Data Flow in Local Computer Networks. Combined (Experimental + Computer Simulation) Approach","authors":"N. A. Filimonova, S. I. Rakin","doi":"10.37394/23204.2023.22.3","DOIUrl":"https://doi.org/10.37394/23204.2023.22.3","url":null,"abstract":"In the present paper, we consider a model that can be described as a “users – network applications” in local networks. The characteristic scales of the model are: the number of users up to 1024, time of events from several seconds to hours, the transmitted data volume –10-10000Kb. This scale rise to a new model that appears between the packet-level and the global Internet level models. We introduce the no-tion of the elementary data flow from an Internet service and from a peer. By using these notions, we develop the “metrology” approach to the modeling of data flow in local networks. Examples are present-ed.","PeriodicalId":330638,"journal":{"name":"WSEAS TRANSACTIONS ON COMMUNICATIONS","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122473565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radio Technologies for Environment-Aware Wireless Communications","authors":"T. Javornik, A. Hrovat, Alevs vSvigelj","doi":"10.37394/23204.2022.21.30","DOIUrl":"https://doi.org/10.37394/23204.2022.21.30","url":null,"abstract":"The contemporary wireless transmitter in addition to information symbols transmits also training symbols in order to help the receivers in the estimation of the information symbols by estimating the channel state information (CSI). In this paper, we look at existing wireless communication technologies in light of environment-aware wireless communications, which is a new concept of wireless communications that queries the time-invariant CSI from the local or global database, using information about the transmitter and receiver location. Thus, this study is the first critical review of the potential of today’s terrestrial wireless communication systems including wireless cellular technologies (GSM, UMTS, LTE, NR), wireless local area networks (WLANs), and wireless sensor networks (WSNs), for estimating CSI, the ratio between training and information symbols and the rate of channel variation, and the potential use of time invariable CSI in environment aware wireless communications. The research reveals, that early communication systems provide means for narrowband channel estimation and the CSI is only available as channel attenuation based on signal level measurements. By increasing the frequency bandwidth of communications, the CSI is estimated in some form of channel impulse response (CIR) in almost all currently used radio technologies, but this information is generally not available outside the communication systems. Also, the CSI is estimated only for the channel with active communications. The new radio technology (NR) offers the possibility of estimating the CIR for non-active channels as well, and thus the possibility of initiating environmentally aware wireless communications.","PeriodicalId":330638,"journal":{"name":"WSEAS TRANSACTIONS ON COMMUNICATIONS","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122091868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R.-I. Chang, Ying-Chen Chen, Chi-Cheng Chuang, Chia-Hui Wang
{"title":"Design and Implementation of an IoT Gateway for Zigbee and WiFi","authors":"R.-I. Chang, Ying-Chen Chen, Chi-Cheng Chuang, Chia-Hui Wang","doi":"10.37394/23204.2022.21.27","DOIUrl":"https://doi.org/10.37394/23204.2022.21.27","url":null,"abstract":"This paper proposed a framework called IAPA (Integrated Access Point Architecture) that applied an off-the-shelf AP (Access Point) device on WLAN (Wireless Local Area Network) as an IoT (Internet-of-Things) gateway to integrate Zigbee and Wifi. This Wifi-Zigbee AP (called WiZAP) has the advantages of low cost, small size and low power consumption. However, the coexistence of Wifi and Zigbee in unlicensed bands will introduce a serious data collision problem. In this paper, we propose a linear-time balance-first configuration strategy to adjust Wifi parameters to reduce data collision. A strategy to dynamically configure these parameters for MAC layer communication is also proposed. Experiments test the influence of network transmission in real application scenarios. Results show that our WiZAP can work efficiently with the coexistence of Wifi and Zigbee.","PeriodicalId":330638,"journal":{"name":"WSEAS TRANSACTIONS ON COMMUNICATIONS","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132053029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Chaos-Based Medical Image Cryptosystem","authors":"S. Dib, A. Benchiheb, F. Benmeddour","doi":"10.37394/23204.2022.21.28","DOIUrl":"https://doi.org/10.37394/23204.2022.21.28","url":null,"abstract":"In In this paper, we propose an efficient cryptosystem for medical images. While the confusion stage is ensured by an Arnold's cat map allowing the permutation of pixels; the diffusion stage is alleviated by an improved logistic map used by the chaotic key-based algorithm (CKBA). The simulation results attest that the proposed algorithm has superior security and enables efficient encryption/decryption of medical images. Performances were evaluated by several security analyses: the NPCR and UACI are improved over 99.60% and 33.46% respectively, and entropy is reported close to 7.8. What makes this new cipher much stronger security.","PeriodicalId":330638,"journal":{"name":"WSEAS TRANSACTIONS ON COMMUNICATIONS","volume":"111 3S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131952804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}