{"title":"Performance Enhancement of Chaotic Error Correction Coding Using Consecutive Sequences","authors":"Asaad H. Sahar, H. Abdullah, Thamir R. Saed","doi":"10.26636/jtit.2023.169423","DOIUrl":"https://doi.org/10.26636/jtit.2023.169423","url":null,"abstract":"The use of chaotic dynamics for error correction is the subject of extensive research, as the approach allows to avoid the use of redundant data. This work proposes a new technique for non-coherent chaos communications for modifying error-correction depending on chaotic dynamics. In the proposed system, there are two consecutive sequences created from a comparable chaotic map, with the second series being created as the latest value of the initial one. Generation of a sequential chaotic sequence with a comparable chaotic dynamic delivers additional information to the receiver, allowing it to appropriately recover information and, hence, facilitate the receiver’s bit-error performance. For error correction and for detecting the symbol that is transmitted, a suboptimal technique based on the nearest distance between chaotic map trajectories over the n-dimensional sequence received is utilized. Simulation results show that the proposed error correction approach improves Eb/N0 as the dimension of the trajectory map increases, indicating that the method improves overall error correction performance. With the dimension of 4, a gain of 0.8 dB in Eb/N0 is achieved compared with an approach without any error-correcting schemes, at the bit-error probability of 10−3.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47858902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Consumption in Wireless Systems Equipped with RES, UAVs, and IRSs","authors":"Adam Samorzewski","doi":"10.26636/jtit.2023.170923","DOIUrl":"https://doi.org/10.26636/jtit.2023.170923","url":null,"abstract":"This paper investigates energy budget characteristics of mobile base stations (BSs) having the form of unmanned aerial vehicles (UAVs) equipped with radio frequency (RF) transceivers, intelligent reconfigurable surfaces (IRSs), and renewable energy sources (RES). The results obtained highlight the benefits and challenges related to using the aforementioned mobile BS, from the energy-related point of view. The specific cases researched involved two types of UAV devices, i.e. multirotor and fixed-wing (airplane-like) aircraft.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42992959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rachid Fateh, A. Darif, A. Boumezzough, S. Safi, M. Frikel
{"title":"A Novel Kernel Algorithm for Finite Impulse Response Channel Identification","authors":"Rachid Fateh, A. Darif, A. Boumezzough, S. Safi, M. Frikel","doi":"10.26636/jtit.2023.169823","DOIUrl":"https://doi.org/10.26636/jtit.2023.169823","url":null,"abstract":"\u0000 \u0000 \u0000 \u0000Over the last few years, kernel adaptive filters have gained in importance as the kernel trick started to be used in classic linear adaptive filters in order to address various regression and time-series prediction issues in nonlinear environments.In this paper, we study a recursive method for identifying finite impulse response (FIR) nonlinear systems based on binary-value observation systems. We also apply the kernel trick to the recursive projection (RP) algorithm, yielding a novel recursive algorithm based on a positive definite kernel. For purposes, our approach is compared with the recursive projection (RP) algorithm in the process of identifying the parameters of two channels, with the first of them being a frequency-selective fading channel, called a broadband radio access network (BRAN B) channel, and the other being a a theoretical frequency-selective channel, known as the Macchi channel. Monte Carlo simulation results are presented to show the performance of the proposed algorithm. \u0000 \u0000 \u0000 \u0000","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43659870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview of Mobility Management Mechanisms and the Related Challenges in 5G Networks and Beyond","authors":"Mustafa Mohammed Hasan Alkalsh","doi":"10.26636/jtit.2023.171723","DOIUrl":"https://doi.org/10.26636/jtit.2023.171723","url":null,"abstract":"Ensuring a seamless connection with various types of mobile user equipment (UE) items is one of the more significant challenges facing different generations of wireless systems. However, enabling the high-band spectrum – such as the millimeter wave (mmWave) band – is also one of the important factors of 5G networks, as it enables them to deal with increasing demand and ensures high coverage. Therefore, the deployment of new (small) cells with a short range and operating within the mmWave band is required in order to assist the macro cells which are responsible for operating long-range radio connections. The deployment of small cells results in a new network structure, known as heterogeneous networks (HetNets). As a result, the number of passthrough cells using the handover (HO) process will be dramatically increased. Mobility management (MM) in such a massive network will become crucial, especially when it comes to mobile users traveling at very high speeds. Current MM solutions will be ineffective, as they will not be able to provide the required reliability, flexibility, and scalability.Thus, smart algorithms and techniques are required in future networks. Also, machine learning (ML) techniques are perfectly capable of supporting the latest 5G technologies that are expected to deliver high data rates to upcoming use cases and services, such as massive machine type communications (mMTC), enhanced mobile broadband (eMBB), and ultra-reliable low latency communications (uRLLC). This paper aims to review the MM approaches used in 5G HetNets and describes the deployment of AI mechanisms and techniques in ″connected mode″ MM schemes. Furthermore, this paper addresses the related challenges and suggests potential solutions for 5G networks and beyond.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46171719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Iterative Detection Based on Conjugate Gradient and Successive Over-Relaxation Methods for Uplink Massive MIMO Systems","authors":"Smail Labed, Naceur Aounallah","doi":"10.26636/jtit.2023.169023","DOIUrl":"https://doi.org/10.26636/jtit.2023.169023","url":null,"abstract":"Being a crucial aspect of fifth-generation (5G) mobile communications systems, massively multiple-input multiple-output (mMIMO) architectures are expected to help achieve the highest key performance indicators. However, the huge numbers of antennas used in such systems make it difficult to determine the inversion of the signal channel matrix relied upon by several detection methods, hence posing a problem with accurate estimation of the symbols sent. In this paper, conjugate gradient (CG) and successive over-relaxation (SOR) methods are selected to construct a new iterative approach that avoids the matrix inversion computation issue. This suggested approach for uplink mMIMO detection is based on a joint cascade structure of both iterative methods. The CG method is first applied and adjusted for the initial solution, followed by the SOR method in the final iterations for terminal computations, resulting in an algorithm with robust performance and low computational complexity. Furthermore, the new hybrid scheme operates based on the relaxation parameter, whose value has a great impact on error performance and, whose optimal determination is necessary. Numerical simulations reveal that the proposed scheme is capable of significantly improving signal detection accuracy with minimum complexity. The simulation results indicated that the proposed detector outperforms CG and SOR detectors, achieves close to optimal performance, requires fewer iterations, and reduces complexity.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48270734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving Integrity of Evidence with Blockchain Technology in Cloud Forensics for Immigration Management","authors":"Sahadev Maruti Shinde, Venkateswara Rao Gurrala","doi":"10.26636/jtit.2023.164522","DOIUrl":"https://doi.org/10.26636/jtit.2023.164522","url":null,"abstract":"","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44801053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthesis of Reconfigurable Multiple Shaped Beams of a Concentric Circular Ring Array Antenna Using Evolutionary Algorithms","authors":"S. K. Dubey, D. Mandal","doi":"10.26636/jtit.2023.168022","DOIUrl":"https://doi.org/10.26636/jtit.2023.168022","url":null,"abstract":"","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41566219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Class of Fractional Cumulative Residual Entropy - Some Theoretical Results","authors":"S. Benmahmoud","doi":"10.26636/jtit.2023.166622","DOIUrl":"https://doi.org/10.26636/jtit.2023.166622","url":null,"abstract":"","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42371765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Rider Feedback Artificial Tree Optimization-Based Deep Neuro-Fuzzy Network for Classification of Sentiment Grade","authors":"Sireesha Jasti, G. R. Raj Kumar","doi":"10.26636/jtit.2023.165222","DOIUrl":"https://doi.org/10.26636/jtit.2023.165222","url":null,"abstract":"","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43377760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Abdulqader, J. Mohammed, Yessar E. Mohammad Ali
{"title":"Beam Pattern Optimization Via Unequal Ascending Clusters","authors":"A. Abdulqader, J. Mohammed, Yessar E. Mohammad Ali","doi":"10.26636/jtit.2023.168523","DOIUrl":"https://doi.org/10.26636/jtit.2023.168523","url":null,"abstract":"","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41664127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}