{"title":"Evaluation of RF-EMF Exposure for sub-6GHz 5G NR Massive MIMO Base Station","authors":"A. Sali, Sangin Qahtan Wali, Anwar Faizd Osman","doi":"10.1109/ISTT56288.2022.9966552","DOIUrl":"https://doi.org/10.1109/ISTT56288.2022.9966552","url":null,"abstract":"The 5G network is intended to accommodate a significant quantity of mobile data traffic and a great number of wireless connections. It improves cost and power consumption; it offers ultra-low latency and ultra-high dependability to enable new services in various sectors. However, the general public is concerned about the possible health dangers linked with 5G equipment's Radio Frequency (RF) radiation, and numerous localities are actively lobbying to prevent 5G implementation. This research measures the maximum exposure emitted by a 5G base station operating on 3.5 GHz. Considering the transmitted power changes over time with data traffic, the analysis is based on a code selective method. Measurements were conducted at two different distances and three different times to investigate the impacts of distance and time on the level of RF-EMF radiation. The maximum radiation from the base station is 11.69V/m, far less than the accepted limit by the ICNIRP standard.","PeriodicalId":389716,"journal":{"name":"2022 IEEE 6th International Symposium on Telecommunication Technologies (ISTT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114427099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdurraheem Joomye, Mohammad Tahir, M. Sheikh, Mee Hong Ling, K. Yap
{"title":"Performance Analysis of Federated Learning in wireless networks","authors":"Abdurraheem Joomye, Mohammad Tahir, M. Sheikh, Mee Hong Ling, K. Yap","doi":"10.1109/ISTT56288.2022.9966534","DOIUrl":"https://doi.org/10.1109/ISTT56288.2022.9966534","url":null,"abstract":"With the proliferation of connected devices and the increase in the use of Machine Learning(ML), more confidential data is being generated. Traditional ML, whereby data is sent to a server for training and processing using models, is becoming less suitable due to privacy concerns. Thus, distributed approaches such as Federated Learning(FL) are becoming more popular. In the latter approach, the model is sent to the clients, where it is trained using the client’s data. The updated model is sent to a server to be aggregated. FL is expected to be used extensively in wireless networks. Therefore, researchers are interested in optimizing Federated Learning for wireless networks. This paper aims to study the performance of FL in terms of accuracy and amount of data exchanged in a wireless network considering the impact of delay using different datasets. The accuracy of the FL model was found to be reliable when benchmarked to the centralized approach(less than 0.1 difference in accuracy). The data transfer size with FL was also significantly smaller than in the centralized approach for all the tested datasets.","PeriodicalId":389716,"journal":{"name":"2022 IEEE 6th International Symposium on Telecommunication Technologies (ISTT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122236129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sadia Mostofa, M. Abdullah, Mohammad Tausiful Islam, S. Bahari, Mohammad Badal Ahmmed
{"title":"Variations of total electron content during quiet and disturbed geomagnetic conditions over Malaysia","authors":"Sadia Mostofa, M. Abdullah, Mohammad Tausiful Islam, S. Bahari, Mohammad Badal Ahmmed","doi":"10.1109/ISTT56288.2022.9966546","DOIUrl":"https://doi.org/10.1109/ISTT56288.2022.9966546","url":null,"abstract":"Ionosphere behavior is characterized by geographical and temporal changes. It was possible to determine the mobility of the ionosphere by observing how the total electron content (TEC) changed over time. The study on TEC variation was conducted in 2008 and 2009 over Malaysia, where latitude ranged from 1° N to 8° E and longitude ranged from 95° to 120° E, with each year reflecting the same degree of solar activity. The hourly mean vertical TEC (VTEC) is used to monitor the difference of the TEC under various geomagnetic factors such as disturbance storm time (Dst), planetary 3-hour range index (Kp), and solar flux F10.7 variations. This paper considers four cases of geomagnetic disturbances were considered 9 March, 27 March, 4 September 2008, and 22 July 2009. A percentage deviation was calculated to further analyze the geomagnetic disturbances in the equatorial region on quiet days. Results showed the TEC during geomagnetic disturbances was lower than the quiet day, with the percentage deviations between -20% and 10%. An increment of TEC was shown after approximately 24 hours, which is in the storm recovery phase. Also found were that GPS-TEC reaches its highest around post noon and its lowest in the small hours of the morning.","PeriodicalId":389716,"journal":{"name":"2022 IEEE 6th International Symposium on Telecommunication Technologies (ISTT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114620459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. M. Atan, N. Zulkifli, S. M. Idrus, N. A. M. Zin, Nur Asfahani Ismail
{"title":"TCP Capacity Utilization In Next Generation Passive Optical Network During Degradation Attack","authors":"F. M. Atan, N. Zulkifli, S. M. Idrus, N. A. M. Zin, Nur Asfahani Ismail","doi":"10.1109/ISTT56288.2022.9966544","DOIUrl":"https://doi.org/10.1109/ISTT56288.2022.9966544","url":null,"abstract":"The next-generation gigabit passive optical network (NG-PON) is a promising expansion and growth solution for access networks. NG-PON aims to connect more people as the fiber-to-the-home (FTTH) concept is implemented. However, immediate attention is required due to threats to its security infrastructure, such as degradation attacks in the presence of transmission protocol (TCP) traffic environments. Throughout the attack, TCP congestion management is activated to manage collisions. This research investigates the relationship between TCP response in the transport layer while enduring attack in the MAC layer. Two types of TCP were evaluated for resistance to the attack. New Reno TCP reduced link consumption by 54%, whereas high-speed TCP (HSTCP) only reduced it by 37%. The capability of TCP's congestion window to regain quickly in HSTCP demonstrates that TCP flavor contributes to sustaining network performance under attack.","PeriodicalId":389716,"journal":{"name":"2022 IEEE 6th International Symposium on Telecommunication Technologies (ISTT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128794214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. J. Chew, N. N. N. A. Malik, L. Idoumghar, N. A. A. Latiff, Najla Ilyana Ab Majid
{"title":"Adaptive Collaborative Beamforming in Wireless Sensor Network Based on Modified Backtracking Search Algorithm","authors":"J. J. Chew, N. N. N. A. Malik, L. Idoumghar, N. A. A. Latiff, Najla Ilyana Ab Majid","doi":"10.1109/ISTT56288.2022.9966538","DOIUrl":"https://doi.org/10.1109/ISTT56288.2022.9966538","url":null,"abstract":"Collaborative beamforming (CB) in wireless sensor network (WSN) increases the transmission distance, which allow nodes to transmit data directly to the base station without relying on multi-hop transmissions. The choice of sensor node location directly affects the sidelobe levels of the radiation beampattern, which can affect the energy efficiency of the WSN. Therefore, an Artificial Intelligence algorithm, i.e. the Backtracking Search Algorithm (BSA) has been developed and implemented to optimize the radiation beampattern performance by finding the suitable location of the sensor nodes based on the linear array sensor nodes arrangement. The proposed Modified BSA-based Linear Array (LinearBSA) shows a superior improvement compared to the conventional linear array (LFA) in desired performance, i.e. minimize sidelobe level (SLL) and adaptive main beam angle. Performance on 8-, 12-and 16-node LinearBSA shows an improvement in radiation beampattern performance particularly in SLL minimization in any desired adaptive main beam angle.","PeriodicalId":389716,"journal":{"name":"2022 IEEE 6th International Symposium on Telecommunication Technologies (ISTT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125524180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. A. Abdi, A. Ramli, N. N. N. A. Malik, N. Zulkifli, F. Iqbal, Madihah Md. Rasid
{"title":"Cost and Energy Consumption Assessment of Fiber-to-the-School Network","authors":"S. A. Abdi, A. Ramli, N. N. N. A. Malik, N. Zulkifli, F. Iqbal, Madihah Md. Rasid","doi":"10.1109/ISTT56288.2022.9966543","DOIUrl":"https://doi.org/10.1109/ISTT56288.2022.9966543","url":null,"abstract":"The growing demand for broadband access drives the evolution of access networks to fiber-based solutions. School Wi-Fi that is reliable, fast, and secure will empower teachers to maximize their use of the internet in the classroom. As part of its Malaysian Education Blueprint 2013-2025, the Ministry of Education has taken another initiative in order to provide an effective learning experience for Malaysian students. The program aims to give every Malaysian public-school access to high-speed Internet access and a virtual learning environment (VLE). Energy consumption is becoming more important in schools as their network infrastructure expands, not only from an environmental standpoint but also from a capital expenditure perspective. This paper proposes the cost and energy consumption model for fiber-to-the-school (FTTS) network. The developed model was used to assess the energy consumption of the FTTS network. For the cost assessment, there is not much different in the cost variation between different scenarios considered in the analysis. It was also found that subscription cost contribute the highest percentage of 69% in total FTTS cost compared to other network costs. Meanwhile in energy consumption assessment, it is been discovered that the FTTS through scenario with energy saving approach by considering the idle state of the network elements will save approximately 24.33%. The energy saving is improved when considering energy consumption model when the network elements are switched off during inactive hours which is approximately 66.67%.","PeriodicalId":389716,"journal":{"name":"2022 IEEE 6th International Symposium on Telecommunication Technologies (ISTT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132907577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wan Nuraihan Hajidah Wan Abdul Hadi, R. Rashid, M. Sarijari, S. Z. A. Hamid, Norsulliatie Muhammad
{"title":"Machine Learning Bill Prediction for IoT-based Utility Management System","authors":"Wan Nuraihan Hajidah Wan Abdul Hadi, R. Rashid, M. Sarijari, S. Z. A. Hamid, Norsulliatie Muhammad","doi":"10.1109/ISTT56288.2022.9966533","DOIUrl":"https://doi.org/10.1109/ISTT56288.2022.9966533","url":null,"abstract":"Electricity consumption has become a forefront issue of global energy demand management, and one of the biggest contributors to Malaysia’s high electricity demand is the residential sector. Hence, user monitoring of energy consumption is critical for global energy efficiency. The aim of this project is to develop a smart energy metering and appliance control using a microcontroller ESP32 and Arduino IDE, provide prediction for bills to allow decision-making based on energy conservation measures using artificial neural network (ANN) model on MATLAB, provide a dashboard to monitor energy consumption, display accumulated bill and control of appliances on Adafruit IO platform, and provide notifications through email when bill exceeds limit using If This Then That (IFTTT) software platform. At about 94% accuracy of bill prediction, the developed system is believed to be able to contribute significantly to an efficient household utility management system.","PeriodicalId":389716,"journal":{"name":"2022 IEEE 6th International Symposium on Telecommunication Technologies (ISTT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121262399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Zulkifley, Mohamad Ghanim Subki, Mehran Behjati, R. Nordin, N. Abdullah
{"title":"Mobile Communications and Parachute Systems for Safe Beyond Visual Line of Sight (BVLoS) UAV Operation","authors":"M. A. Zulkifley, Mohamad Ghanim Subki, Mehran Behjati, R. Nordin, N. Abdullah","doi":"10.1109/ISTT56288.2022.9966547","DOIUrl":"https://doi.org/10.1109/ISTT56288.2022.9966547","url":null,"abstract":"Demand for Unmanned Aerial Vehicles (UAV) to fly Beyond the Visual Line of Sight has been significant for the past few years. To do so, the UAV must have a reliable long-range Command and Control (C2) link. The UAV is also expected to avoid any obstacle autonomously with a reliable Detect and Avoid (DAA) mechanism and the ability to detect nearby aircraft since the sky is occupied by manned aircraft. Lastly, the UAV should not endanger others’ life or property. Therefore, this article proposes a hardware and software configuration that utilises the cellular network and DAA system with the deployment of a parachute system to achieve a safe BVLOS UAV operation. The quality of cellular networks at multiple altitudes, the C2 link performance, the ability to perform long-range flights, and the parachute system’s reliability were investigated. The results indicate the effectiveness of the developed systems as the starting point to allow BVLOS drone operations.","PeriodicalId":389716,"journal":{"name":"2022 IEEE 6th International Symposium on Telecommunication Technologies (ISTT)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127260781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attenuation of mmWave Based on Measured Data via Rain Sensor in Tropical Region","authors":"Lu Li, A. Sali, Sangin Qahtan Wali","doi":"10.1109/ISTT56288.2022.9966549","DOIUrl":"https://doi.org/10.1109/ISTT56288.2022.9966549","url":null,"abstract":"For tropical areas, rainfall is the main factor in the attenuation of millimeter wave transmission. This paper considers KLIA Sepang region of Malaysia as an example to measure and collect rainfall rate data via rain sensor, establish a mathematical model for millimeter wave rainfall attenuation in tropical areas, simulate and calculate rainfall attenuation at different frequency ranges of 20-300 GHz through MATLAB software, with emphasis on the analysis of millimeter wave communication attenuation characteristics in the widely used 30-50GHz frequency band. The results show that the greater the rainfall rate, the higher the frequency, and the greater the rainfall attenuation. Moreover, the vertical polarization achieves the lowest attenuation compared circular polarization and horizontal polarization. The attenuation and attenuation rate increase with the increase of frequency and rainfall rate. Specifically, the attenuation value appears linearly in the range of 15dB to 90dB in the rainfall rate of 20-60mm/h for the frequency bands of 30-50GHz.","PeriodicalId":389716,"journal":{"name":"2022 IEEE 6th International Symposium on Telecommunication Technologies (ISTT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127832480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}