Mohamed Shalaby, Doaa Baioumy, Mina Hana, M. Shokair
{"title":"Intelligent Reflecting Surfaces: Performance Simulation in Millimeter Wave Channels","authors":"Mohamed Shalaby, Doaa Baioumy, Mina Hana, M. Shokair","doi":"10.21608/ijt.2023.284129","DOIUrl":"https://doi.org/10.21608/ijt.2023.284129","url":null,"abstract":"","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"6 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78755826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Shalaby, Doaa Helmy, Mina Wagih Lamie, M. Shokair
{"title":"Study of Electromagnetic Interference Effects in Intelligent Reflecting Surfaces Aided Communication in Alamouti Coded 5G Networks","authors":"Mohamed Shalaby, Doaa Helmy, Mina Wagih Lamie, M. Shokair","doi":"10.21608/ijt.2022.271689","DOIUrl":"https://doi.org/10.21608/ijt.2022.271689","url":null,"abstract":": The cooperative communication techniques, wherein several transmitters and one receiver are implemented, can greatly increase the performance of a communication system. In fact, the cooperative communication has been launched since the fourth generation mobile systems. The two competing cooperative techniques are; relays and intelligent reflecting surfaces (IRS). It is known that the electromagnetic interference (EMI) can degrade a radio system performance. In this paper, the EMI, affecting an IRS-based communication system, is mathematically modeled and simulated. The interference level can be affected by the channel parameters which are the 5G path loss models. In order to improve the communication system performance, Alamouti codes are applied. The gain, offered by diversity codes “Alamouti”, can reduce the degradation of the performance due to the EMI existence. The complete mathematical model is carried out as well as the simulation model. The simulation results show that the cooperative Alamouti-coded 5G radio systems have a satisfying performance even the EMI exists.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"55 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81604738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brain Tumor Detection Using a Broadband Microstrip Anten-na with a Defected Ground Structure","authors":"Laila T. Rakha, N. Areed, Hamdi Elmkati","doi":"10.21608/ijt.2022.266292","DOIUrl":"https://doi.org/10.21608/ijt.2022.266292","url":null,"abstract":"","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88924212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Facial Expression Recognition and Speech Tran-scripts over an on-premise Video Conference Application","authors":"Sally Ahmed, N. Areed, M. Obayya, F. Khalifa","doi":"10.21608/ijt.2022.266291","DOIUrl":"https://doi.org/10.21608/ijt.2022.266291","url":null,"abstract":": Since Covid-19 pandemic outbreak, organizations and individuals have had to use video conference applications increasingly. However, the commercial video conference applications are expensive, and feature limited. This paper discusses how to enable organizations to host on-premise video conference applications. Then, it explores assisting organization’s stakeholders with making decisions based on facial expressions of video conference attendees. Moreover, it facili-tates transcribing speech into text to enable deaf persons to participate in online conferences. Technologies and tools used in addressing these challenges respectively are: (i) Web Real Time Communication (WebRTC) project, (ii) Tensorflow.js library, (iii) and Web Speech Application Programming Interface (API). This paper depends on integration between a collection of technologies, libraries, standards, and protocols. Most of them can be managed using JavaScript framework. Hence, load of the performance is distributed on each client-side device. The proposed on-premise video conference application has been enhanced through including facial expression recognition with 66% high accuracy while the speech-into-text feature with Word Error Rates (WER) are 0 and 0.12 for British English and Egyptian Arabic, respectively .","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"110 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87665895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Improved Clutter-Map MTD Proces-sor for both Slowly & Tangential Moving Targets (STMT).","authors":"Tamer H. M. Soliman, Hazem Z. Fahim, I. Metwally","doi":"10.21608/ijt.2022.266473","DOIUrl":"https://doi.org/10.21608/ijt.2022.266473","url":null,"abstract":": D etection performance of slowly and tangential moving targets (STMT) is a considerable problem in modern radar systems, especially in unwanted reflected signals. These STMT produce zero/near-zero Doppler frequency shifts which the moving target indicator processor automatically removes. One popular solution is applying the received echo after passing through matched filer (MF) through a moving target detector (MTD) with a clutter map processor. In this paper, an improved clutter map MTD processor is considered. It relays on passing the output from MF through a sidelobe suppression optimum filter (SLS-OF) before clutter map MTD to relieve the detrimental effect of the clutter returns. The performance of the intended processor is evaluated compared with the traditional MTD using equal length Barker and polyphase coded waveforms. The evaluation process involves calculating the average peak signal to sidelobe ratio (PLSR) and evaluating the detection performance through the receiver operating characteristic (ROC) curve. The enhancement PLSR for the two scenarios are 4dB and 6dB, respectively, which improves the detection performance of the proposed processor by 2 dB.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"70 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72979996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposed Approaches for Brain Tumors Detection Techniques Using Convolutional Neural Networks","authors":"Somaya Feshawy, W. Saad, M. Shokair, M. Dessouky","doi":"10.21608/ijt.2022.266293","DOIUrl":"https://doi.org/10.21608/ijt.2022.266293","url":null,"abstract":": A brain tumor is an intracranial mass consisting of irregular growth of brain tissue cells. Medical imaging plays a vital role in discovering and examining the precise performance of organs The performance of object detection has increased dramatically by taking advantage of recent advances in deep learning. This paper presents a Convolutional Neural Network (CNN) architecture model-based classification approach for brain tumor detection from Magnetic Resonance Imaging (MRI) images. The network training was carried out in both the original dataset and the augmented dataset. Whereas the whole brain MRI images were scaled to fit the input image size of each pre-trained CNN network. Moreover, a comparative study between the proposed model and other pre-trained models was made in terms of accuracy, precision, specificity, sensitivity, and F1-score. Finally, experimental results reveal that without data augmentation, the proposed approach achieves an overall accuracy rate of 96.35 percent for a split ratio of 80:20. While the addition of data augmentation boosted the accuracy to 97.78 percent for the same split ratio. Thus, the obtained results demonstrate the effectiveness of the proposed approach to assist professionals in Automated medical diagnostic services. Neural Networks; Data Augmentation.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"14 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82416501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tamer R. Omar, A. Amamra, T. Ketseoglou, Cristian Mejia, Cesar Soto, Quinlan Stankus, Grant Zelinka
{"title":"Performance Evaluation of Machine-Learning Models for Self-Healing in 5G Networks","authors":"Tamer R. Omar, A. Amamra, T. Ketseoglou, Cristian Mejia, Cesar Soto, Quinlan Stankus, Grant Zelinka","doi":"10.4018/ijitn.309701","DOIUrl":"https://doi.org/10.4018/ijitn.309701","url":null,"abstract":"The 5G self-organizing network is a viable solution to the problem of increasing user-connectivity, data rates, and network complexity. This paper proposes a SON solution that uses machine learning for anomaly detection in order to meet user demands. Three different supervised ML algorithms are used for anomaly detection to see which provides the most efficient and accurate results. The various algorithms used key performance indicators (KPIs) to determine whether a base station is healthy, congested, or failing. In order to achieve unbiased results, large datasets composed of multiple simulated network scenarios were preprocessed and partitioned for training and testing. The results show that state vector machine algorithm can accurately detect the status of a base station at exponentially lower processing times than the other ML algorithms. This algorithm was most efficient when larger datasets were used to create the model.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Holistic Approach of Achieving Accurate Radio Location Estimation in Long Range Wide Area Network","authors":"U. Nwawelu, M. Ahaneku","doi":"10.4018/ijitn.312256","DOIUrl":"https://doi.org/10.4018/ijitn.312256","url":null,"abstract":"Position accuracy at any point in time has been a thing of great concern around the globe. Solution has been provided through radio devices with location estimation capabilities. Results have shown that the available location estimation algorithm has recorded improvement in terms of location accuracy and reliability. However, improving location accuracy should be a continuous process as security of life, and properties ought to be given a high priority. For this reason, currently, many localization algorithms are available. This work investigated two localization algorithms that were formulated based on the principle of multiple linear regression, namely weighted multiple linear regression (WMLR) and improved weighted multiple linear regression (iWMLR) algorithms, in order to suggest a better terminal localization algorithm. Location accuracy, range of errors, and R2 scores are the basis on which the aforementioned algorithms are evaluated. Finally, localization algorithm with high location estimation accuracy is proposed.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42289473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role of New Wireless Technologies in Achieving UN SDGs","authors":"M. Pejanović-Djurišić","doi":"10.4018/ijitn.309703","DOIUrl":"https://doi.org/10.4018/ijitn.309703","url":null,"abstract":"New Next G (generation) wireless technologies can be considered as key drivers for improving infrastructure, promoting sustainable industrialization, and fostering innovation. When it comes to their overall impact, key UN Development Goals (SDGs) can be identified where these technologies can provide added economic/social value, contributing to good health, poverty reduction, better education. This paper provides more insights into specific impacts, discussing the implementation of Next G wireless networks in terms of achieving global development indicators. Further on, in the context of specific user scenarios, a mapping between areas of application (vertical industry segments) and SDGs is presented, enabling a better understanding of the role of Next G wireless networks and their impacts on overall economic/social development.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45018517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arnob Paul, H. Islam, Shohrab Hossain, Husnu S. Narman
{"title":"A Novel Zone-Walking Protection for Secure DNS Server","authors":"Arnob Paul, H. Islam, Shohrab Hossain, Husnu S. Narman","doi":"10.4018/ijitn.312235","DOIUrl":"https://doi.org/10.4018/ijitn.312235","url":null,"abstract":"A zone walking attack is to get all existing domain information from a secured DNS server. NSEC3 protocol was proposed to defend against zone walking attacks in a secured DNS server, although NSEC3 uses more CPU time. In this paper, the authors have proposed two novel solutions to defend against the zone walking attack by addressing the efficiency issue of secure DNS protocol. They have simulated the proposed solution and analyzed it with different scenarios of the secure DNS server and attackers. The result of the experiment shows that the proposed solution Low Profiling can be effective against zone walking attacks for up to certain server-side and client-side parameters. The work can help researchers to understand how a new approach in the DNSSEC server can defend against zone walking attacks.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46127088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}