{"title":"Geo Location of Mobile Device","authors":"Bashar M. Nema, Ali Nafaa Jaafar","doi":"10.5772/intechopen.92154","DOIUrl":"https://doi.org/10.5772/intechopen.92154","url":null,"abstract":"The proliferation of cellular network enabled users through various positioning tools to track locations; location information is being continuously captured from mobile phones, where a prototype is created that enables to detect locations based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location-sensing run as a background process, and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and Internet. Mobile stores data location information in the database (SQLite) and then transfers it into location API to obtain locations’ result implemented in Google Maps. Track a smartphone with fixed identifiers mostly SSN (SIM (Subscriber Identity Module) Serial Number) and IMEI (International Mobile Equipment Identity) derived from an identifying string unique to the user’s device. The location result is moderately correct according to the cellular networks GSM and UMTS, which are used for obtaining location information.","PeriodicalId":361416,"journal":{"name":"Recent Trends in Communication Networks","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122387411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electromagnetic Eavesdropping","authors":"I. Kubiak","doi":"10.5772/intechopen.86478","DOIUrl":"https://doi.org/10.5772/intechopen.86478","url":null,"abstract":"Protection of information against electromagnetic penetration is a huge challenge. Especially this issue applies to computer station that processes protected information and that is a source of electromagnetic disturbances. These disturbances could be correlated with processed graphic information. Therefore, very often, they are called valuable or unintentional emissions. To protect the information, different methods of engineering of electromagnetic compatibility are used, e.g. electromagnetic gaskets, signal and power filters and electromagnetic shielding. The use of these methods causes a special device to become very heavy, and the looks of such device aren’t nice. A new universal solution based on safe fonts is proposed. Safe fonts protect processed information against electromagnetic penetration in each case of graphic source of valuable emissions. These fonts protect not only Video Graphics Array (VGA) but also Digital Video Interface (DVI) standards. These fonts are also useful from electromagnetic protection’s point of view in the case of the use of laser printers. All analyses are based on images reconstructed from valuable emissions. These emissions are measured in a range of frequencies from 100 MHz to 1.5 GHz. Safe fonts are simple solution that counteract electromagnetic eavesdropping process. They can replace expensive solutions based on shielding, zoning and filtering.","PeriodicalId":361416,"journal":{"name":"Recent Trends in Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114523372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mobile Ad Hoc Network Routing Protocols: A Comparative Study","authors":"A. Rajeswari","doi":"10.5772/intechopen.92550","DOIUrl":"https://doi.org/10.5772/intechopen.92550","url":null,"abstract":"Mobile Ad hoc NETworks (MANET), are complex and distributed networks that are dynamic. Which are infrastructure less and multi-hop in nature. The communication of a node can be either direct or through intermediate nodes without a fixed and dedicated infrastructure. Hence it is necessary to design an efficient routing protocol for ad hoc network which can address the issues of MANET efficiently. In ad hoc, routing algorithms are classified into nine categories namely: sourceinitiated (reactive), table-driven (proactive), hybrid, hierarchical, multipath, multicast, location-aware, geographical-multicast and power-aware. This paper presents a survey and to review a comparative study about various routing protocols under each of these categories. Additionally, brief discussions about major routing issues are addressed. This survey paper focuses on the taxonomy related to ad hoc routing techniques and compares the features of routing protocols.","PeriodicalId":361416,"journal":{"name":"Recent Trends in Communication Networks","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124677723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure and Energy-Efficient Communication in IoT/CPS","authors":"S. Alharthi, P. Johnson, M. Randles","doi":"10.5772/intechopen.92039","DOIUrl":"https://doi.org/10.5772/intechopen.92039","url":null,"abstract":"Secure and energy efficient routing protocol is fairly an open research despite a plethora of routing protocols has been proposed in the literature. However, most routing protocols specifically designed for resource constrained wireless devices, if not all, follow from the same perspective and almost have reached the maximum improvements. This chapter describes the design of cross-layer secure multi-hop zone routing protocol (MZRP) and a hybrid energy-efficient medium access control (MAC) featuring the benefits from both carrier sense multiple access (CSMA) and time-division multiple access (TDMA). MZRP employs the intelligent artificial neural network (ANN) self-organizing map (SOM) algorithm, which is performed at the coordinator or the base station (BS) to divide the area into multi-level zones. Then cluster heads (CHs) are chosen using k-medoids in each zone. The performance of MZRP is better in terms of energy efficiency compared to dual-hop and HT2HL as it extends the network lifetime using hybrid MAC and the security algorithm employed has less message update.","PeriodicalId":361416,"journal":{"name":"Recent Trends in Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125338793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Piracy Protection Techniques in Digital Cinema Watermarking Schemes","authors":"B. Zolfaghari, P. Mitra","doi":"10.5772/intechopen.92412","DOIUrl":"https://doi.org/10.5772/intechopen.92412","url":null,"abstract":"Watermarking is used in several areas such as CDNs (Content Delivery Networks), as part of the rights management system for counterfeit prevention. Watermarking schemes need some additional features in order to be used in digital cinema. In fact, extra watermarks are added to movies by cinema projectors in projection time, which help identify the cinema hall in which the illegal copy has been recorded. But distortions caused by hand vibrations and the point of view angle make it difficult to recover the watermark. This makes it necessary to be distortionresistant for the watermarking schemes used in digital cinema. On the other hand, theatre owners would like to locate the camcorder that has recorded the pirate copy. This requires watermarking schemes to be able to estimate the distance and angle using the distributed pirate copy. In this chapter, we present a review on watermarking techniques specifically designed to attack the aforementioned problems.","PeriodicalId":361416,"journal":{"name":"Recent Trends in Communication Networks","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131882247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Nguyen, Hung H. Nguyen, Tom Freeze, Andy T. Guillen
{"title":"Application of Random Walk Model for Timing Recovery in Modern Mobile SATCOM Systems","authors":"T. Nguyen, Hung H. Nguyen, Tom Freeze, Andy T. Guillen","doi":"10.5772/intechopen.90606","DOIUrl":"https://doi.org/10.5772/intechopen.90606","url":null,"abstract":"In a modern mobile satellite communication (SATCOM) system, a ground terminal receiver receives a radio frequency signal that is demodulated to generate a baseband digital signal waveform containing a self-clocking bit stream of digital data. The received baseband digital signal waveform is recovered and tracked using a timing recovery loop (TRL). The traditional TRLs use early-and-late gates, digital transition tracking, filter-and-square, and delay-and-multiply functions. In bit timing detection, the bit stream is self-clocking and the timing differential dithers about correct bit timing in the TRLs. For mobile satellite communication environments, the traditional TRLs drop lock when the loop signal-to-noise ratio (SNR) is smaller than a threshold value or the residual Doppler frequency is larger than the operating loop bandwidth. After dropping lock, the traditional TRLs experience long hang up time due to the need to reacquire the timing pulses. Recently, random walk filters (RWF) have been adapted to improve the bit clock locking stability and are applied to recover bit timing information of a digital data stream. This chapter describes random walk model for timing jitter and discusses how RWF solution can address the timing recovery challenges in mobile satellite communication environments.","PeriodicalId":361416,"journal":{"name":"Recent Trends in Communication Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114493425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding of On-Chip Power Supply Noise: Suppression Methodologies and Challenges","authors":"Pritam Bhattacharjee, Prerna Rana, A. Majumder","doi":"10.5772/intechopen.90378","DOIUrl":"https://doi.org/10.5772/intechopen.90378","url":null,"abstract":"The on-chip activities of any modern IC are always inhibited due to the occurrence of power supply noise (PSN) in the chip power line. From many decades, researchers are pondering on what are the major issue of this PSN occurrence and how it can be suppressed without interfering the actual chip functioning. In the course of time, it is found that the uncontrolled triggering of the on-chip system clock and the unguarded on-chip power line is instigating the two major factors for the occurrence of PSN i.e., i(t) → instantaneous current and di/dt → current ramp or the rate of change of current over time. Both i(t) and di/dt are also the sub-fac-tors to rise the PSN components like resistive noise and inductive noise respectively. In this chapter, we light upon the occurrence of resistive and inductive noise as well as depict their individual impact on the PSN occurrences. There is also discussion on how PSN is suppressed over the years in spite of facing challenges in the execution of suppression techniques. This chapter even concludes on the suitable ways for mitigating PSN in the contemporary era of delivering complex on-chip features.","PeriodicalId":361416,"journal":{"name":"Recent Trends in Communication Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121435422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cognitive Radio-Modulation and Demodulation","authors":"Madhuri Gummineni, Trinatha Rao Polipalli","doi":"10.5772/intechopen.89774","DOIUrl":"https://doi.org/10.5772/intechopen.89774","url":null,"abstract":"The reconfigurability in Cognitive Radio (CR) facilitates to dynamically change its parameters for the efficient spectrum utilization. The motivation behind the study of cognitive radio is that the number of different radio signals can be handled without using extra circuitry, i.e., reusing identical hardware with the change in the software will reduce time to market, development cost, and upgrade infrastructure. Software Defined Radio (SDR) is an enabling technology for Cognitive Radio (CR); therefore, it emphasizes on SDR unique features, characteristics, and basics concepts that are required to understand operation of SDR. SDR allows service providers to upgrade infrastructure without unreasonable cost. Modulation techniques play a vital role in any communication systems such as cable modems, DSL modems, CDMA, 4G, Wi-Fi, and WIMAX; thus, it emphasizes on implementation of modulation techniques using SDR Generic hardware, which is operated by Open Source software called GNU Radio. Implementation of various analog and digital modulation techniques using the GNU Radio provides a way for developing advanced wireless communication system. GNU Radio software is a highly flexible signal processing platform, which makes it easy and reduces time to implement different modulation techniques with appropriate script.","PeriodicalId":361416,"journal":{"name":"Recent Trends in Communication Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115588896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kunwar Pal, M. C. Govil, Mushtaq Ahmed, Tanvi Chawla
{"title":"A Survey on Adaptive Multimedia Streaming","authors":"Kunwar Pal, M. C. Govil, Mushtaq Ahmed, Tanvi Chawla","doi":"10.5772/intechopen.86125","DOIUrl":"https://doi.org/10.5772/intechopen.86125","url":null,"abstract":"Internet was primarily designed for one to one applications like electronic mail, reliable file transfer etc. However, the technological growth in both hardware and software industry have written in unprecedented success story of the growth of Internet and have paved the paths of modern digital evolution. In today’s world, the internet has become the way of life and has penetrated in its every domain. It is nearly impossible to list the applications which make use of internet in this era however, all these applications are data intensive and data may be textual, audio or visual requiring improved techniques to deal with these. Multimedia applications are one of them and have witnessed unprecedented growth in last few years. A predominance of that is by virtue of different video streaming applications in daily life like games, education, entertainment, security etc. Due to the huge demand of multimedia applications, heterogeneity of demands and limited resource availability there is a dire need of adaptive multimedia streaming. This chapter provides the detail discussion over different adaptive multimedia streaming mechanism over peer to peer network.","PeriodicalId":361416,"journal":{"name":"Recent Trends in Communication Networks","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127259535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Analysis of Analog to Digital Converter System Clock Source Using Direct Digital Synthesizer","authors":"D. Tung, R. Mohd-Mokhtar","doi":"10.5772/intechopen.90243","DOIUrl":"https://doi.org/10.5772/intechopen.90243","url":null,"abstract":"A requirement of multiple format standards by mobile telecommunication (GSM, CDMA, WCDMA, and TD-SCDMA) test set needs to be delivered possibly at lower cost. As to support its capability, phase-locked loop (PLL) frequency synthesizer has been designated as an essential part in most of the design within the box. The old design may be bulky and subject to many issues with the components ’ variation and aging effect. In recent years, the direct digital synthesizer (DDS) has been popularly in used to replace the PLL architecture. This chapter will focus on the DDS selection, architecture topology, prototyping, implementation technique with both hardware and software, and performance as a clock source to a sampled system as referred to receiver interest. The key parameters in the sampled system greatly rely on the jitter and phase noise specification. If they are not properly defined, the overall signal-to-noise ratio (SNR) at the sampled system output will be impacted. Eventually the receiver quality will be degraded and resulted in tremen-dous loss. Thus, a proper reconstruction filter design will be delivered to ensure the jitter and phase noise performance is met without degrading the existing specification by taking accountability into the matching characteristic and signal integrity.","PeriodicalId":361416,"journal":{"name":"Recent Trends in Communication Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132010762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}