G. Oladosu, Chunling Tu, P. Owolawi, Topside E. Mathonsi
{"title":"Intelligent Metaheuristic-based Handover Algorithm for Vehicular Ad hoc Networks","authors":"G. Oladosu, Chunling Tu, P. Owolawi, Topside E. Mathonsi","doi":"10.12720/jcm.18.9.589-598","DOIUrl":"https://doi.org/10.12720/jcm.18.9.589-598","url":null,"abstract":"—Recently, Vehicular Ad hoc Networks (VANETs) are becoming increasingly popular. VANETs are a subcategory of Mobile Ad hoc Networks (MANETs) in which nodes represent vehicles equipped with On-Board Units (OBUs). The fundamental reason is that VANETs improve safety for road users by providing vehicles with real-time road-related information. However, the increasing number of vehicles being introduced into these networks causes handover delays, and end-to-end delays, among other things. Therefore, the Quality of Service (QoS) is affected. This article proposes an Intelligent Metaheuristic-based Handover Algorithm (IMHA) to improve QoS in VANETs. The proposed IMHA is designed and implemented by integrating two of the most popular and recent optimization methods, namely disturbance Particle Swarm Optimization (d-PSO) and Ant Colony Optimization (ACO), wherein d-PSO assigns different priority levels to vehicles on the road to ensure safety meanwhile ACO determines the most profitable routes from the source to the destination. Furthermore, the Congestion Problem Reduction (CPR) algorithm is implemented in the IMHA to define the requests to process in priority order. The ACO and d-PSO hybrid methods have been tested and evaluated in real-world VANETs, giving us more confidence in their performance and robustness. Network Simulator 2 (NS-2) is used to simulate the proposed algorithm. Based on the outcomes, IHMA reduces end-to-end and handover delays and improves throughput at different vehicle velocities and network packet sizes. Consequently, this proposed solution guarantees improved QoS in VANETs. The experiment results show the proposed method outperforms existing handover algorithms, with a throughput of 92%, an end-to-end delay of 0.8 seconds, a handover delay and a computation time of less than 2.0 seconds, and an average memory usage of 60%.","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"18 1","pages":"589-598"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66344193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of an Optimum Beamforming Strategy for Outdoor Communication in Millimeter Wave Wireless Sensor Network","authors":"Ogwal Emmanuel, Ebosetale Okhaifoh, Ebenezer Esenogho, Edwin Matlotse","doi":"10.12720/jcm.18.9.545-554","DOIUrl":"https://doi.org/10.12720/jcm.18.9.545-554","url":null,"abstract":"— The emerging future wireless sensor networks (WSNs) will utilize the millimeter-wave (mmWave) spectrum for wireless communication. The essence is to avoid spectrum crunch and mitigate bandwidth-hungry applications and services (traffic congestion) in WSNs by exploiting the underutilized spectrum between the 30 GHz and 300 GHz bands, respectively. Since mmWave has a short wavelength, deploying it in WSNs for remote monitoring applications in outdoor environments is still a challenge due to issues of shadowing, blockage effects, and propagation losses associated with atmospheric effects due to rain and oxygen. This paper proposed an optimum beamforming strategy to be employed in mmWave WSNs for remote monitoring applications to offset the additional propagation losses in mmWave outdoor environments through a two-split mix of analog beamforming and hybrid analog/digital beamforming. Also, signal transmission and reception through amplify-and-forward (AF) relay-assisted mmWave WSN is proposed for compensation of the signal fading effect due to blockages. This will ensure greater reliability in the 60 GHz underutilized unlicensed mmWave band when employed in mmWave WSNs for remote temperature monitoring in outdoor environments.","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"18 1","pages":"545-554"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66343837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multicommodity Flow Reliability for Energy Harvesting Wireless Sensor Networks","authors":"John Penaflor, Mohammed Elmorsy","doi":"10.12720/jcm.18.9.571-580","DOIUrl":"https://doi.org/10.12720/jcm.18.9.571-580","url":null,"abstract":"—This paper considers energy harvesting wireless sensor networks (EH-WSN) with multiple sinks supporting concurrent applications. Each application is associated with a set of sensor nodes that generate and send traffic to the associated application sink. Each node can relay any application traffic toward the application sink. In addition, each node uses an energy management unit to control the amount of traffic the node can relay based on its available energy. With the nodes’ energy levels fluctuations, it is essential to quantify the network's ability to fulfill the different applications’ quality of information and service requirements. Therefore, a novel multicommodity flow reliability problem (called MultiFlowRel ) is formalized to estimate the likelihood that at least a certain amount of each application traffic is delivered to the associated application sink. The proposed problem is proven to be #P-hard, and an iterative bounding framework is proposed for deriving lower bounds on the exact reliability solutions. The proposed framework compute’s exact reliability solutions if allowed a sufficient number of iterations. Numerical results show the effectiveness of using the proposed solution to obtain good lower reliability bounds and exact solutions in reasonable running times. Furthermore, the results show examples of the use of the proposed framework in solving some interesting network design problems (e.g. optimal sink locations and appropriate transmission parameters).","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"18 1","pages":"571-580"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66344030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Farooq Sijal Shawqi, L. Audah, Sameer Alani, A. Hammoodi, M. A. Jubair
{"title":"Cubic Metric Reduction by Hybrid Companding-Universal Filtered Multi-carrier in 5G Networks","authors":"Farooq Sijal Shawqi, L. Audah, Sameer Alani, A. Hammoodi, M. A. Jubair","doi":"10.12720/jcm.18.9.555-570","DOIUrl":"https://doi.org/10.12720/jcm.18.9.555-570","url":null,"abstract":".","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"18 1","pages":"555-570"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66343856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reconfigurable Intelligent Surface Assisted Energy Constraint Wireless System under UAV Eavesdropper with Full-Duplex Jammer","authors":"Kehinde O. Odeyemi, Pius A. Owolawi","doi":"10.12720/jcm.18.8.514-521","DOIUrl":"https://doi.org/10.12720/jcm.18.8.514-521","url":null,"abstract":"—This paper study the security performance of a Reconfigurable Intelligent Surface (RIS) energy constraint wireless system under the presence of Unmanned Aerial Vehicle (UAV) eavesdropper, where a full-duplex jammer destination is powered by a dedicated power beacon. A time switching scheme with full-duplex operation is considered for the legitimate energy constraint destination to generate jamming signal to interfere the eavesdropper. In particular, the analytical closed-form expression of Connection Outage Probability (COP), Security Outage Probability (SOP) and Secrecy Throughput (ST) are derived to evaluate the performance of the proposed system. To achieve more insight about the system, the ST asymptotic expression is obtained. Moreover, the accuracy of the derived analytical expressions is justified by the Monte-Carlo simulation. Our results illustrate that the number of reflecting elements 𝑵 𝑬 , amount of SIC 𝝍 , and fading parameter 𝒎 𝑱𝑬 significantly affect the security performance of the concerned system.","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136020292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Sliding Contention Window Design to Minimize Safe Message Collision Rates with Different Priority Levels in VANET","authors":"Nguyen Hoang Chien, Pham Thanh Giang","doi":"10.12720/jcm.18.6.369-376","DOIUrl":"https://doi.org/10.12720/jcm.18.6.369-376","url":null,"abstract":"In Vehicular Ad Hoc Networks (VANETs), the broadcast is an important form of communication and occupies the main traffic in the network. However, since there is no recovery for broadcast frames in the VANET network, the collision rate between safe message traffic can become very high, especially in vehicle-dense network conditions. This paper proposes a new coordination mechanism that adaptively controls the Contention Window (CW) size for broadcast to reduce the safe message collision rate with different priority levels. In our mechanism, each vehicle in the VANET can automatically adjust the CW based on the perception of the current network condition by analyzing the percentage of successfully received frames. The algorithm controls the CW size by sliding the window with a dynamic persistence factor according to each type of safe message traffic. Each data traffic chooses a backoff timer dynamically varying in the range [0, CW[AC[i]]], which can overlap the CW range with other data traffic to improve efficient bandwidth depending on the network conditions. Simulation results prove that the proposed mechanism significantly reduces the collision rate for both safe message traffic in high-priority and low-priority in vehicle-dense network conditions.","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77756647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposed Method for Synthesizing the Radiation Pattern of Linear Antenna Arrays","authors":"A. A. Ka’bi","doi":"10.12720/jcm.17.7.553-558","DOIUrl":"https://doi.org/10.12720/jcm.17.7.553-558","url":null,"abstract":"The design of antenna arrays is one of the most challenging optimization problems in recent research interests. In this research work a new method of optimization is proposed. This method called \"Characteristics Evolution Optimization\" is based on parallel processing of streams of binary digits, and hence it can perform well in parallel processing digital systems. In this article, a 16 - element linear antenna array has been taken into consideration, and the performance of the proposed technique for synthesizing the radiation pattern of the array has been investigated and compared with other existing techniques, such as DE (Differential Evolution), IWO (Invasive Weed Optimization), and PSO (Particle Swarm Optimization). Various variants of Invasive Weed Optimization have been investigated as well. It has been observed that the proposed method (Characteristics Evolution optimization) outperforms the other optimization techniques significantly in different aspects.","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66343533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RF Fingerprinting of Software Defined Radios Using Ensemble Learning Models","authors":"A. A","doi":"10.12720/jcm.17.4.287-293","DOIUrl":"https://doi.org/10.12720/jcm.17.4.287-293","url":null,"abstract":"Machine Learning (ML) is becoming a transformative technology in wireless communication. The deployment of large scale RF devices particularly in IoT applications escalates security threats and also setting up of secure networks using wireless devices is becoming a big challenge. Along with ensuring security, identifying each RF device in an autonomous network is essential and the RFML (Radio Frequency Machine Learning) can play a crucial role here. This paper focuses on the RF characterization of a set of Software Defined Radios (SDR) using advanced machine learning models. This helps to identify each SDR module in the deployed network which runs only a specific protocol in a particular network. The SDRs will be configured for a particular specification and the test will be conducted. The transmitted data from multiple radio nodes were collected using a reconfigurable radio’s receive chain in IQ-format, in the laboratory environment. The RF features like IQ-imbalance, DC-offset and the image leakages in the multicarrier modes were used to set fingerprints for identifying the reconfigurable radios. Two ensemble learning models Random Forest and AdaBoost were used to train and develop predictive models to identify the radio. At a SNR of 30dB Random Forest achieved an accuracy of 85% and AdaBoost achieved an accuracy of 78% with 32K multicarrier data. A maximum recognition rate of 92% is achieved with RF and 83% with AdaBoost.","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66343825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of Energy Harvesting in Mobile Wireless Sensor Networks","authors":"A. A. Ka’bi","doi":"10.12720/jcm.17.4.267-272","DOIUrl":"https://doi.org/10.12720/jcm.17.4.267-272","url":null,"abstract":"The restricted availability of energy supplies is one of the major challenges in designing mobile wireless sensor networks. In this research work, a proposed method for extending the lifetime of energy-constrained mobile wireless sensor networks (MWSNs) is presented. This method is based on the fact that RF signal carries both information and energy at the same time. Hence, by increasing the efficiency of energy harvesting from radio frequency (RF) signals, the lifetime of the wireless network can be significantly extended. The Simultaneous Wireless Information and Power Transfer (SWIPT) technique enables harvesting of energy by relay nodes which in turn can be used for wireless data transmission. To enhance the lifetime of the mobile wireless network, the transmitted RF energy can be recycled at the receiver side. On the other hand, a balance between energy harvesting and wireless data transmission is required in to maximize the overall efficiency of the system. Particle Swarm Optimization (PSO) is employed to obtain the optimum resource allocation policy which maximizes the system energy efficiency. A cost function is framed for this purpose and PSO attains the maximum energy efficiency by improving the solution of the cost function at each iteration with respect to given constraints.","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66343706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}