International Journal of Sensors Wireless Communications and Control - Volume 8, Issue 2, 2018
Volume 8, Issue 2, 2018
-
-
Sparse Underwater Wireless Channel Estimation Overview and Future Work
Authors: Shihab Jimaa and Kok K. ChaiBackground & Objective: Underwater acoustic channels suffer from multipath, attenuation, noise, frequency selectivity and Doppler effect. Finding efficient methods to communicate over such very poor quality and high latency channels has been a challenge. A multipath underwater acoustic channel can be seen as a sparse system, whose impulse response contains many zeroes and very few large coefficients. The underwater digital communication research studies and experiments have been developing over the last three decades leading to achievements and improvements since it started. This field of communications would support so many sectors such as defense, marine research, marine commercial operations, oceanography, and the offshore oil industry. Conclusion: This paper provides a thorough overview of the latest research in the area of sparse underwater wireless channels' estimation and also presents brief proposals for future research directions to enhance the accuracy of the underwater channel estimation.
-
-
-
Security Architecture of 5G Wireless Communication Network
Authors: Akhil Gupta, Rakesh K. Jha and Reeta DeviBackground & Objective: Present wireless generation i.e. 4G is facing challenges like interference management, load sharing and increased capacity demands. Researchers all over the globe are working on to overcome these challenges by introducing 5G in the market. The introduction of relays in Device to Device (D2D) communication and small cell access point (SCA) has fulfilled the issues of interference management, load sharing and increased capacity. But in the journey of introducing these new technologies, somewhere the aspect of security has been ignored. Methodology: This paper focuses on the security architecture of 5G wireless communication networks (WCN). There will be three possible cases in which the security of 5G WCN can be breached. First case will be the security breach through cloud, which is considered as the integral component in Internet of things. The second and the third case will be the security breach through relays and SCA. Conclusion: This paper focusses on the security cases involving relays and SCA, as these components will be the integral part of 5G in the recent future. This paper has also proposed a triple layer security approach that will be helpful in combating the security threats.
-
-
-
On Design and Implementation of an Artificial Lower Limb
Authors: Susmita Das, Sudipta Paul, Sanjeev K. Ojha, Biswarup Neogi, Alexey Nazarov, Joydev Ghosh and Sudeshna GhoshBackground & Objective: The presented design attempt of building an advanced prosthetic lower limb has a vast requirement in these days to connect paralytic patients and elderly people with the external environment for a better lifestyle. The Recordings of Electromyography (EMG) patterns and other data analysis of the muscle signals has lightened the path of technology to a wide range of studies and experiments in the field of prosthesis of certain moveable body parts using the acquired EMG signal of muscles of lower limb. An effort has been made to acquire the EMG signal and study the signals with the incorporation of sufficient technology to build an artificial lower limb with the help of Flex-sensor and ‘Arduino Uno’ programming. The main aspect about the hardware circuitry of this practical work is its ease of use and applicability. The Bio-electrodes are attached on the specified location to acquire the muscle signals and also Laboratory Virtual Instrument Engineering Workbench (LabVIEW) to acquire the signals. In addition, the movements of certain joints of the lower limb can be replicated controlling the movement of a servo-motor for the implementation of the design of the artificial lower limb. Conclusion: The different output parameter changes can be measured according to the relaxation and the contraction of the Flex-sensor attached to the knee, and the ankle joints. The Servo-motors can further be utilized in the construction of the artificial lower leg to be moved externally without any voluntary motion of the subject. The measurement of dispersion has been introduced in the mathematical analysis.
-
-
-
A Partition-based Energy-efficient Strategy for Deadline-based Data Collection in Wireless Sensor Networks
Authors: Ravi Babu, Udaya Kumar K. Shenoy and Kiran K. PatilBackground & Objective: Several studies have revealed that mobile sinks help in extending the lifetime of Wireless Sensor Networks (WSNs) by minimizing multihop transmissions. However, prolonging lifetime of WSNs that require all sensed information to be collected within a time limit involves considerable challenges. A proposed framework to gather data in such WSNs is to combine multihop transmissions with a mobile sink that visits only a subset of sensor nodes, as opposed to all nodes. The ability of such an approach to improve network lifetime depends on the tour taken by the mobile sink. Thus, the problem essentially becomes identifying a sink tour no longer than a given constraint such that the tour visits only a subset of sensor nodes. Since the problem of computing the optimal tour is NP-hard, in this paper we propose a partition-based energy-efficient heuristic to address the problem. Method: The proposed approach computes a subset of sensor nodes to be included in the tour based on their energy consumption rate and hop distance. It operates in an iterative manner, each time identifying the congested part of the network and selecting from that part a node that has the highest rate of energy consumption. The tour computation based on energy consumption rate combined with hop distance ensures a balanced distribution of sensors energy consumption in a WSN. We present an algorithm for the proposed approach, and evaluate the performance of the algorithm through simulations. Conclusion: The simulations results reveal that the approach considerably improves network lifetime.
-
-
-
Query Processing in Hybrid Wireless Network
Authors: Saurabh Singha and Sulata MitraBackground & Objective: With the rapid improvement in mobile communication technology, the query processing has gained a huge interest from the mobile users. But the requirement of high efficiency and high quality service in query processing is still increasing. A query processing scheme in hybrid wireless network is proposed in the present work. Method: In the proposed query processing scheme, normal nodes generate queries as query issuing node. Some infrastructures are assumed as authorized information centre. Each authorized information centre maintains a database to store the response of the queries. A routing algorithm is proposed in the present work to select a route between the query issuing node and its nearest authorized information centre. The query issuing node sends the query through the selected route and receives the response of the query from its nearest authorized information centre through the same route. Conclusion: The performance of the scheme is elaborated qualitatively and quantitatively. The qualitative performance is studied in terms of storage and communication overhead. The quantitative performance is studied in terms of waiting time, traffic and success rate. It is compared with the existing query processing schemes in hybrid wireless network and ad hoc network.
-
-
-
Realistic Scenario Based VANET Analysis through Sumo and NS3
Authors: Taskeen Zaidi, Shubhang Giri, Kavita Srivastava and Shivam ChaurasiaBackground & Objective: Vanet is ad-hoc or temporary network that supports vehicle to vehicle or vehicle to infrastructure communication. Nowadays due to the exponential rise in road traffic and accidents, it is necessary to have information about vehicle position, speed, direction, lane etc. that aware us from traffic, road condition etc. to avoid accidents. Research has been going on in the field of traffic congestion problem, mobility model and Intelligent Transportation System (ITS). Method: To solve this complex problem a traffic simulator and a realistic scenario is needed but the issue is generating a realistic traffic scenario. Current work is focussed in this direction for building a realistic scenario of an area. Conclusion: In the current work, a realistic simulation in VANET is described and SUMO traces are integrated on network simulator-NS3.
-
Most Read This Month
