954 results
Search Results
2. A cost effective transmitter and receiver for unmanned aerial vehicles.
- Author
-
Duruvarajan, Vijayakumar Sengamedu, Ganesan, Vijayakumari, Poovaragavan, Sanjeeve Sivashakthi, Velmurugan, Sivagnanam Arumugam, and Kumar, Venkatramanan
- Subjects
TRANSMITTERS (Communication) ,DRONE aircraft ,MEDICAL care wait times ,DATA transmission systems ,COST effectiveness ,MEDICAL emergencies - Abstract
Unmanned Aerial Vehicles commonly called as Drone, is an aircraft without a human pilot on board. Various application areas such as military, fire emergency and even civilian applications makes it more interesting to go for various research advancements. The objective of this paper is to create a cheap, cost effective, and better range of communication between transmitter and receiver for Unmanned Aerial Vehicles which can be used over large ranges to reduce waiting time and to help medical emergencies for militaries, fire services, and for patients. In this paper, the transmitter and receiver systems use a 2.4 GHz RF module, which is a best option for cost effectiveness and high range data transmission. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. Intelligent fake node identification on wireless sensor network to avoid security threats using enhanced AODV protocol.
- Author
-
Rapaka, Gopala Krishna, Pasupulla, Ajay Prakash, Gupta, Raj Kumar, Firos, A., Magno Ventayen, Randy Joy, and Yadav, Ruchi
- Subjects
WIRELESS sensor networks ,WIRELESS sensor nodes ,WIRELESS sensor network security ,DATA packeting ,DATA transmission systems ,END-to-end delay ,AD hoc computer networks - Abstract
Wireless Sensor Network environment contains a set of sensor nodes which are centralized by means of the routing protocol defined for communication between source and destination entities. The centralized access point mentioned here is the basestation, in which it accumulates the details of every node and maintain that into the log for providing service assistance to the nodes to establish the successful communication between entities. This kind of Wireless Sensor Network medium is admired by many attackers to raise the attack over the weak node to accumulate the information easily by proving them as a destination. The neighbor nodes usually does not have an explicit identity of the destination, in case if any weak or compromised nodes proves that the node is a destination, the data packets are delivered to the specific destination. Of course the data once reached the destination can identify the destination is fake and revert back the data sent by means of IP verification. However, once the data reached the fake destination means it is stolen and public. So, that a new routing protocol is required to provide an efficient communication between source and destination. In this paper, a new routing protocol is introduced with the help of classical Adhoc On-demand Distance Vector (AODV), in which it is called as Enhanced AODV (eAODV). This approach define a new way of identifying the route to the destination by means of dynamic route selection as well as electing the neighbor node based on the routing principles such as Route Request (RREQ) and Route Response (RREP). The main motto of this project is to provide better security and performance in terms of the packet delivery ratio than the traditional AODV routing protocol in the presence of one or multiple black hole attacks with marginal rise in average end-to-end delay and normalized routing overhead. This proposed routing protocol called Enhanced AODV provides intense RREQ and RREP facility to carry over the data transmission successfully between Source and Destination. The resulting section of the paper proves the efficiency of the network in terms of improved throughput ratio, enhanced network lifetime and packet delivery ratio. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. FDR-FLC: Flow direction routing based fuzzy logic control for cluster head selection and optimal routing in MANET.
- Author
-
Jose, Mitha Rachel and Vigila, S. Maria Celestin
- Subjects
AD hoc computer networks ,MULTICASTING (Computer networks) ,FUZZY logic ,BIT error rate ,WIRELESS sensor networks ,DATA transmission systems ,ROUTING algorithms ,ENERGY consumption ,POWER resources - Abstract
The MANET nodes have restricted energy supply and the dynamic nature of these nodes makes minimizing energy consumption and maximizing network lifetime a top priority. Besides, the network experiences irregular node connections, node transmission ability, etc. So, for increasing the lifetime and transmission capability of data in MANET, the selection of the best node and optimal route is necessary throughout the data transmission and processing. This paper presents a novel Fuzzy Logic Control (FLC) based Flow Direction routing algorithm to minimize energy consumption and maximize the network lifetime by cluster head selection and optimal routing. The nodes nearer to the destination are selected as the cluster head by the Flow Direction Algorithm (FDA) based on minimal distance and maximum residual energy. The state-of-art techniques simply integrated the routing metrics which will not always lead to an efficient optimal routing decision that will be accurate. Hence this paper incorporates the fuzzy logic controller to select the MANET node position, link quality, bandwidth, and mobility parameters to take an optimal routing decision. The results show that the proposed model minimizes the Bit error rate and energy consumption up to 97% and 99%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. Privacy Risks in the Storytelling of Open Government Data: A Study from the Perspective of User Cognitive Reasoning.
- Author
-
Geng, Ruili, Wang, Yifan, and Wei, Qi
- Subjects
DATA privacy ,COGNITIVE ability ,STORYTELLING ,DATA security ,DATA transmission systems - Abstract
In recent years, there has been an increase in the openness of government data. Data storytelling has emerged as a means to enhance communication by transforming mundane data into easily understandable narratives. However, it is crucial to pay attention to privacy risks. This paper delves into the concept of storytelling government data, integrating cognitive reasoning and the S‐O‐R model, and evaluates privacy risks. Through comparative experiments and interviews, this study examines how users may infer sensitive information. The research reveals that storytelling data has a positive impact on users' cognition. De‐storytelling, on the other hand, can mitigate privacy risks, reduce information relevance, simplify narratives, and strike a balance between user experience and privacy. Building on this research, the paper proposes a strategy to address privacy risks, recommends strengthening privacy protection awareness from the perspectives of both users and platforms, optimizing data presentation methods, reducing the risk of sensitive information leakage, and ensuring the convenience and security of government data disclosure. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Short Paper: A Reservation MAC Protocol for Ad-Hoc Underwater Acoustic Sensor Networks.
- Author
-
Tracy, Leonard T. and Roy, Sumit
- Subjects
UNDERWATER acoustic telemetry ,DATA transmission systems ,SENSOR networks ,DIGITAL communications ,BROADBAND communication systems - Abstract
In this paper we propose a new MAC protocol for ad-hoc underwater acoustic sensor networks that segregates the available bandwidth into a (small) control channel and a (majority bandwidth) data channel. Reservations for main channel time are made by transmission of Request-to-Send(RTS) packets on the control channel. The effects of channel segregation are explored and simulation results are presented. We find that such a reservation MAC generally achieves good channel utilization with an optimal control channel band-width for a given data bandwidth. [ABSTRACT FROM AUTHOR]
- Published
- 2008
7. Beyond Network Neutrality: Criteria for a Democratic Internet, TOP STUDENT PAPER.
- Author
-
Meinrath, Sascha and Pickard, Victor
- Subjects
TELECOMMUNICATIONS laws & regulations ,INTERNET laws ,MASS media laws ,DATA transmission systems - Abstract
The past year witnessed an event unprecedented in modern telecommunications history. An otherwise obscure telecommunications policy debate spilled outside the rarefied airs of Congressional Committees and the Federal Communications Commission's eighth floor to rage across the Blogosphere, major newspapers, YouTube and episodes of The Daily Show. This contentious discussion centers on an issue known as "network neutrality," defined broadly as the non-discriminatory interconnectedness among data communication networks that allows users to access the content, and run the services, applications, and devices of their choice. As Congress debates whether network neutrality protections should be written into current legislation, the battle lines have been drawn between large telecommunications companies who own the pipes, on one side, and Internet content companies and public interest groups, on the other. This paper contextualizes recent events in relation to historical telecommunications antecedents. In doing so, we critically evaluate the strengths and weaknesses of the current network neutrality debate and offer a set of guidelines for a new understanding of network neutrality. The paper concludes with an exploration of the social and political ramifications of this broader conception of network neutrality. We suggest that this "new network neutrality" provides a proactive foundation for creating a more democratic Internet. ..PAT.-Unpublished Manuscript [ABSTRACT FROM AUTHOR]
- Published
- 2007
8. AGV Wi-Fi vehicle for smart fertilizing system.
- Author
-
Narendran, R., Thiruchelvam, V., Shuhad, M. M., Ravinchandra, K., Ying, F. M., and Sivanesan, S. K.
- Subjects
DATA analytics ,BLOCK diagrams ,DATA transmission systems ,CLOUD computing ,DISPLAY systems - Abstract
The research described in this paper outlines the comprehensive development process of a system spanning five key sections: data collection and transmission, cloud connectivity, AGV Wi-Fi vehicle, fertilizing mechanism, and data analytics. The investigation involved the careful selection of tools and techniques for each section, with a focus on NodeMCU ESP8266 as the microcontroller for data collection and transmission, utilizing various sensors. Google Sheet was chosen as the cloud service provider due to its suitability for the project, and a detailed comparison of platform advantages was provided. The workflow of the WIFI controlled vehicle and cloud connectivity was elucidated through block diagrams and flowcharts. The system implementation successfully integrated Google Sheet with Microsoft Power BI for data analytics, leveraging its user-friendly interface. The connection setup between Google Sheet and Power BI was illustrated, and a step-by-step guide for interpreting data analytics results was presented. The paper concludes by showcasing the implemented system and displaying the Power BI dashboard, demonstrating the practical application of the developed solution. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Solar PV monitoring techniques, state of art review.
- Author
-
Al-Dulaime, Abrar Abdalkareem, Al-Kafaji, Muhammed Salah Sadiq, and Duhis, Ahmed Hussein
- Subjects
PHOTOVOLTAIC power systems ,SOLAR energy ,INTERNET of things ,ACQUISITION of data ,MICROCONTROLLERS ,SOLAR technology ,DATA transmission systems - Abstract
The solar energy system based on PV (photovoltaic) parameters monitoring techniques compromise of the both the electrical and environmental data, the number of parameters being measured in a PV plant that combine and analyze to observe and/or evaluate its efficiency. with a view to vouch the responsible and stable performance of any solar system, an effective measuring system is essential. large scale solar energy plants are respectable complicated and increase the cost and complexity on PV parameters measuring systems, so we can note in the past decennium, numerous ideas of monitoring systems were determined in vast number of research papers. For this review article different PV measuring systems were be studied and reviewed in details. The review manner included the most of solar parameters measuring techniques of PV system, and its efficiency and performance. The most of PV monitoring techniques which exhibited and examined. in other hand the different sensors and their operation principle, microcontroller, data acquisition technologies, data transmission units and types, and information modules storage and display are studied and reviewed in this paper. at last, this survey sustains the selective suggestions for upcoming researches. A massive solar PV monitoring techniques in this review paper concise an inclusive survey of techniques, these techniques based the phenomenal information handling units and different and novel data transmission protocols. The innovative photovoltaic measuring technology's especially that based on the internet of things discussed and investigated in innovative manners. The review will confidently completely the emphasized perceptions progress to improved exertions on the road to improvement of the monitoring technologies in future maintainable solar PV efforts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Influence of telepresence robot using arduino UNO R3 based 20A robot control board.
- Author
-
Vignesh, T., Gowrishankar, S., Jishnu, M., Karthick Prithvi, J., Leander Joseph, P., and Kanaka Durga Devi, P.
- Subjects
TELEPRESENCE ,ROBOT control systems ,ROBOTS ,DATA transmission systems ,MOBILE robots ,MICROCONTROLLERS - Abstract
A telepresence robot is nothing less than a virtual companion that is used to assist in various fields like healthcare, education, manufacturing, etc. The telepresence robot is controlled from a distant location using a mobile or tablet. This paper discusses about controlling the telepresence robot from a distant location by using an android application. It also discusses how the connection is done and data are transmitted and controlled. The data transmission is between the telepresence robot and the application is done by interfacing the microcontroller of the robot with the application. The results of the experiments done are reallypromising. This method is robust and can be helpful in a remote environment. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
11. Improved MAC protocol by back-off algorithm implementation using fuzzy logics and game theory.
- Author
-
Bhardwaja, Shambhu, Vishnoib, Navneet, and Sengarc, Alok Singh
- Subjects
FUZZY logic ,GAME theory ,ADAPTIVE fuzzy control ,CARRIER sense multiple access ,ALGORITHMS ,DATA transmission systems ,FUZZY sets ,UTILITY functions - Abstract
In a wireless network like ad-hoc, IEEE 802.11 Distributed Coordinated Function (DCF) is used for computation of idle channel that is predominantly built on Carrier Sensing Manifold Access Mechanism through Collision Avoidance (CSMA-CA) approach. While transmission of data among multiple stations at the same time, contention occurs and resolving the issue of contention Back-off (BO) algorithm is used and assigned on a contention window (CW).However, the current approaches for addressing the contention issue do not decrement the issue explicitly which gave rise to numerous issues and this paper provides an optimal solution to these issues. This paper proposes a Fuzzy and game theory-based on back off algorithm to multi-traffic classes, the proposed algorithm is compared with the efficient adaptive MAC protocol that is based on attributes which include but not limited to packet delivery ration, residual energy, packet drop along with throughput to upsurge the utility function, saturation throughput. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. Real time data communication through Li-Fi in hospital environment.
- Author
-
Kavipriya, P., Jebarani, M. R. Ebenezar, Lakshmi, S., and Jegan, G.
- Subjects
LIGHT emitting diodes ,LIGHT sources ,OPTICAL communications ,DATA transmission systems ,LED displays ,VISIBLE spectra ,TECHNOLOGICAL innovations - Abstract
Today's Wi-Fi innovation is growing at a rapid pace. Since the remote range is often obstructed, each open spot and private office has Wi-Fi. Because of its efficiency, RF impedance is becoming more common, resolving the problem and paving the way for light fidelity (Li-Fi) innovation. Li-Fi uses LED light sources to transmit data over long distances. Visible Light Communication (VLC) is another name for this technique to create a new way of using Li-Fi as a remote advanced technique. This is a clever way to have internet connectivity. Information transferred from a host PC using visual light correspondence. As a result, the photodetector will benefit. Li-Fi serves as a remote interface between the sender and the receiver. Using Li-Fi technology, we will track the patient and update the patient's condition. The main goal of this paper is to use LEDs to transmit data (Light Emitting Diode). VLC is becoming more widely accepted as an innovative and promising technology for achieving short-range, high-speed, and large-capacity wireless data transmission, thanks to the growing popularity of solid-state lighting devices. A real-time video broadcast system prototype using inexpensive commercially available light emitting diode (LED) lamps is proposed in this paper. Experiments show that by properly arranging LED sources and improving focus effects, real-time video with a maximum distance of 2 feet can be achieved. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
13. VPN blocker and recognizing the pattern of IP address.
- Author
-
Nandhini, S., Vaishnav, Shubham, and Vishwakarma, S. Vikas
- Subjects
VIRTUAL private networks ,INTERNET protocol address ,COMPUTER network security ,TELECOMMUNICATION systems ,DATA transmission systems ,DATA protection - Abstract
Network security has become a big concern in the modern age. And in the last few years we have seen so many different invalid uses of our data there is many prompt for the government to control the data exploiting sites but we have to detect such VPN and delete with it so in future our data network is secure network. In almost all areas, such as online banking, online shopping, communications, companies, and organizations, the internet offers tremendous convenience. As a result, the communication network necessitates the protection of sensitive data that is stored or transferred over the internet. Because of the rapid growth of computerized devices and their widespread use the internet has resulted in data protection issues for users. Security and privacy risks have become increasingly complex in recent years, highlighting the need for a modernized secured medium to safeguard valuable data on the internet. Virtual Private Network (VPN) is a great way to secure devices and information from hackers, as described in this article. A virtual private network (VPN) is a network device that runs more than a network connection and sends encrypted data. data to prevent attackers from accessing it. The aim of a VPN is to provide vari ous security elements such as authenticity, confidentiality, and data integrity, which is why they are becoming increasingly popular, low-cost, and simple to use. Smartphones, laptops, and tablets will all use VPN services. The creation, protocols, tunneling, and protection of VPNs are also discussed in this paper. It is a rapidly developing technology that plays a critical role in WLAN by enabling safe data transmission over the Internet. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
14. Secured online examination system using laravel framework.
- Author
-
Ranjithamani, D. Angeline, Sowmiya, S., Natchiyar, K. Nambi, Subalakshmi, K., Sujitha, M., and AandalGayathiri, R.
- Subjects
DATA encryption ,DATA transmission systems ,DATA security ,EMAIL security - Abstract
Secure Online examination system is a system with an innovative solution for the conduct of the online proctored examination. Data encryption facilitates the security of data. The objective of this work is to monitor the students effectively and to store the data securely. The accuracy of results is produced using this proposed work. Online examination is broadly used in teaching. Currently, the online examination is used in Browser/Server model and Client/Server model. These models can be installed or configured through a browser easily. The client resources are not utilized properly and the server is overloaded with network traffic, data transmission between client and server. Moreover, the security of the data is needed. In this proposed work of the secured browser/server model, the secured data transmission is guaranteed using the AES algorithm, and the model is implemented using PHP. The system has been implemented and analyzed with an existing system and assured better performance. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. A review: Outdoor visible light communication on modulation and receiver denoising scheme.
- Author
-
Othman, Norzalina, Beson, Mohd Rashidi Che, Aljunid, Syed Alwee, and Endut, Rosdisham
- Subjects
OPTICAL communications ,OPTICAL modulation ,VISIBLE spectra ,DATA transmission systems ,WIRELESS communications ,FREE-space optical technology ,THERMAL noise ,MOBILE communication systems ,LED displays - Abstract
A rapid growth of wireless communication system has boosted the exponential development on smart technology while driving a substantial increase in traffic volume. With a highly congested and demand on RF bandwidth spectrum, Visible Light Communication (VLC) seem as a complementary technology towards RF based system which provide wider bandwidth, free and unregulated channel, poses no health hazard, high security and low power consumption leads VLC to be one of the promising technology in data transmission. By maintaining the main purpose of illumination, the exploitation on the existing LED-based lighting system is used as a transmission mechanism to photodetector or image sensor which is used to detect the variations of the light intensity via free space optical channels. Different VLC modulation schemes is review in this paper to see the pros and cons of each scheme implemented in outdoor application specifically for vehicle-to-vehicle (V2V) VLC system. Various type of noises is presented in this paper with the denoising scheme to eliminate or reduce the shot and thermal noise caused by natural sunlight and artificial roadside infrastructure light which degrades the performance of VLC system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. A VM-shared desktop virtualization system based on OpenStack.
- Author
-
Liu, Xi, Zhu, Mingfa, Xiao, Limin, Jiang, Yuanjie, Liu, Lin, Yang, Can, and Ke, Jianfeng
- Subjects
CLOUD computing ,VIRTUAL machine systems ,RAPID prototyping ,REACTION time ,OPEN source software ,DATA transmission systems ,PUSH technology (Computer networks) - Abstract
With the increasing popularity of cloud computing, desktop virtualization is rising in recent years as a branch of virtualization technology. However, existing desktop virtualization systems are mostly designed as a one-to-one mode, which one VM can only be accessed by one user. Meanwhile, previous desktop virtualization systems perform weakly in terms of response time and cost saving. This paper proposes a novel VM-Shared desktop virtualization system based on OpenStack platform. The paper modified the connecting process and the display data transmission process of the remote display protocol SPICE to support VM-Shared function. On the other hand, we propose a server-push display mode to improve user interactive experience. The experimental results show that our system performs well in response time and achieves a low CPU consumption. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
17. Modeling and Simulation of Electric Vehicle Driveline.
- Author
-
Rus, Cosmin, Risteiu, Marius Nicolae, Leba, Monica, and Marcus, Razvan
- Subjects
DATA transmission systems ,MATHEMATICAL models ,ELECTRIC vehicle design & construction ,ELECTRIC vehicles testing - Abstract
Electric vehicle drivetrain modeling and simulation is a crucial aspect of electric vehicle design and development. A driveline is responsible for transferring power from the motor to the wheels, and the modeling and simulation process helps optimize the drivetrain design for efficiency, performance and safety. This paper presents in an extended manner the design and mathematical modeling of a dynamic transmission system of an electric vehicle. The mathematical model was simulated in Matlab Simulink and the obtained results were the basis of the implementation of the entire system in a small vehicle with off-road capabilities. This work is part of a larger project that has as its objective the creation of a complete electric vehicle starting from the design part and up to the testing on the roads. [ABSTRACT FROM AUTHOR]
- Published
- 2023
18. Implementation of an HIV Case Based Surveillance Using Standards-Based Health Information Exchange in Rwanda.
- Author
-
OLUOCH, Tom, BYIRINGIRO, Baptiste, TUYISHIME, Elysee, KITEMA, Frank, NTWALI, Loic, MALAMBA, Samuel, WILMORE, Sridevi, and REMERA, Eric
- Subjects
ELECTRONIC data interchange standards ,HIV infections ,PUBLIC health surveillance ,COMPUTER software ,MEDICAL information storage & retrieval systems ,HEALTH facilities ,INFORMATION display systems ,CONFERENCES & conventions ,HEALTH outcome assessment ,BUSINESS intelligence ,ORGANIZATIONAL goals ,MEDICAL laboratories ,LABOR supply ,INFORMATION retrieval ,ELECTRONIC health records ,DATA analytics ,DATA transmission systems ,ALGORITHMS ,RECORDING & registration - Abstract
As Rwanda approaches the UNAIDS Fast Track goals which recommend that 95% of HIV-infected individuals know their status, of whom 95% should receive treatment and 95% of those on treatment achieve viral suppression, the country currently relies on an inefficient paper, and disjointed electronic, systems for case-based surveillance (CBS). Rwanda has established an ecosystem of interoperable systems based on open standards to support HIV CBS. Data were successfully exchanged between an EMR, a client registry, laboratory information system and DHIS-2 Tracker, and subsequently, a complete analytic dataset was ingested into MS-Power Business Intelligence (MS-PowerBI) for analytics and visualization of the CBS data. Existing challenges included inadequate workforce capacity to support mapping of data elements to HL7 FHIR resources. Interoperability optimization to support CBS is work in progress and rigorous evaluations on the effect on health information exchange on monitoring patient outcomes are needed. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. Investigations on applicability of modulation formats in coherent optical transmission.
- Author
-
Kaushik, Vikas and Saini, Himanshi
- Subjects
LIGHT transmission ,OPTICAL fiber communication ,OPTICAL communications ,DIGITAL signal processing ,TELECOMMUNICATION ,DATA transmission systems - Abstract
The modulation formats play an important role in providing speed and efficiency of the internet and data transmission though optical fiber. The concept of coherency in optical communication has gained popularity because coherent optical communication provides better spectral efficiency, more efficient way of managing non-linear impairments, better sensitivity, an increased capacity with use of DSP (Digital Signal Processing) and a support for the multilevel modulation formats. Coherent communication technology gives rise to advanced modulation formats compared to Intensity Modulation Direct Detection (IM-DD) counterparts. This paper presents a comparison-based analysis to investigate the suitability of various modulation formats available for fiber-optic coherent communication. The selection of a suitable modulation format for coherent optical transmission through fiber is required in order to obtain optimal transmission efficiency and speed. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
20. Forward error-correction techniques in LTE systems.
- Author
-
Hussain, Ghasan Ali and Audah, Lukman
- Subjects
DIGITAL communications ,DATA transmission systems ,LOW density parity check codes ,WIRELESS channels ,TURBO codes ,ELECTROMAGNETIC interference - Abstract
Error-correction codes (ECCs) are one of the most important issues in digital communication systems to enhance data reliability via noisy channels. In wireless transmission channels, the transmitted data is exposed to several factors (for instance, multipath fading environments, atmospheric variations, and electromagnetic interferences), which makes the performance of any communication system unacceptable. In this paper, different forward error-correction (FEC) codes (including turbo, LDPC, convolutional, RS, polar, and BCH), especially those that are already proposed for LTE systems in terms of BER performance and decoding complexity, were discussed to show the advantages and disadvantages of each. While the trade-off between improving system performance and decoding complexity has been discussed, achieving balance between decreasing BER and maintaining the decoding complexity at acceptable levels is important. Where, this comparison is a necessary to figure out the optimal ECCs for LTE systems in terms of capability of error correction and low decoding complexity. The comparison shows that, although error correction capability is high for LDPC codes, the phenomenon of error floor restricts using them in applications that need to lower error rates. By contrast, in finite-length regimes, the performance of polar codes is critical unlike other coding techniques. Among different forward error-correction codes, RS and BCH codes were the best with LTE systems because of their highly improved system performance and low decoding complexity unlike convolutional and turbo codes. However, RS codes outperform BCH codes in terms of BER performance because of their high capability in correcting burst errors. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
21. Securing data using injective labeling on acyclic graphs.
- Author
-
Sherin, D. A. Angel, Maheswari, V., and Balaji, V.
- Subjects
GRAPH labelings ,NUMBER systems ,TELECOMMUNICATION systems ,DATA transmission systems ,INJECTIVE functions ,COMPUTER hacking - Abstract
In this research paper we transmit the data or message to the receiver using the optimisedweight Injective technique on a family of certain acyclic graphs. Weight injective labeling is a class of graphs labeling widely used in networking of communication channels. Labeling is a technique used to number each vertex or edge with non-negative values. Weight injective labeling of a graph is an injection, where the edges are numbered with a set of forms. Networking plays a major role in communication. This communication should be safe and secure. We use weight injective labeling technique on acyclic graph patterns. Also we have clubbed octal numeral system to hide a message. Our goal is to secure the message in an appropriate way that hacking should be avoided. In this paper work we investigated a new labeling technique with cryptography to provide secure data transmission to avoid hacking of data by Brute force attack. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
22. Optimizing the receiver aperture parameters of free space optical (FSO) link for performance enhancement.
- Author
-
Singh, Harjeevan, Mittal, Nitin, and Ogudo, Kingsley A.
- Subjects
COMPUTER network traffic ,FREE-space optical technology ,DATA transmission systems ,PROBLEM solving ,BANDWIDTHS ,LASER communication systems - Abstract
Due to the rising need for high-speed applications, free-space optical (FSO) communication links can solve the problem of bandwidth limitation and allow the current network architecture to handle data traffic efficiently. FSO communication uses laser signal for trasnsmittig data signal and the free space acts as propagating channel for the data transmission. As the FSO links transfer data through the atmospheric channel, the performance of the FSO link is significantly affected by the dynamic channel conditions. Consequently, the performance of FSO system deteriorates and the desried link availability and link performance is not achieved. Hence, it becomes necessary to ensure optimal performance of FSO link under the degrading effect of atmospheric channel. The receiver aperture characteristics of the FSO link are a very crucial factor in designing and installation of FSO links. This paper aims to optimize the receiver design parameters of the FSO link to improve the system performance. The appropriate configuring of receiver aperture diameter ensures the maximum collection of FSO signals at the receiver terminal and results in improved performance of FSO system. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
23. Study and performance analysis of harvested energy in different scenarios and its suitability in different applications.
- Author
-
Dhillon, Hardeep Singh, Chawla, Paras, and Gupta, Anupma
- Subjects
END-to-end delay ,WIRELESS sensor nodes ,DATA transmission systems ,ENERGY harvesting ,POSTURE ,PERFORMANCE theory ,QUALITY of service - Abstract
Energy harvesting technology is paving its way rapidly in the field of wireless sensor technology. Vital performance parameters are need to be optimized to attain best QoS (Quality of Service) for different applications. In this paper, various QoS parameters like throughput, end to end delay, packet loss, and detection efficiency are studied for varying wake time (m-ON). Different body postures/gestures are analyzed on a body sensor node (consisting of four nodes) for collecting QoS parameters. Effect of two energy harvesters is studied and analyzed on QoS parameters. Two body nodes are deployed on hand and remaining two are paced on foot. A novel self-elective forward node algorithm is applied that helps to maintain the BN (body nodes) in energy neutral operation (ENO). ENO signifies that the energy harvested should always be greater than energy consumed during data processing and data transmission. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. A novel implementation of 4 bit parity generator in 7nm technology.
- Author
-
Alluri, Sudhakar, Mounika, K., Balaji, B., and Mamatha, D.
- Subjects
STRAY currents ,THRESHOLD voltage ,DATA transmission systems ,LEAKAGE - Abstract
In today's low power designed life, the dissipated leakage power became as one of the tough task. This type of leakage power will reduced enormously with the threshold voltage scaling only. Along with power scaling, proper transmission of data is necessary without any noise or any other sort of disturbance. For that purpose, a parity generator is required to check the errors during transmission. So, a tough challenge is to design this type of even and odd parity generator with a low power and it was finally worked out in our paper using FINFET 7nm technology in EDA tool. The leakage current is the sum of source, drain and gate current and it is observed as 31.4nA in our paper. Along with these, frequency and delay using EDA (LTspice) tool in 7nm technology which reduces the leakage power drastically. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
25. Cost function for energy(CFE) in Fog based IoT networks.
- Author
-
Mohmmad, Sallauddin, Dadi, Ramesh, Pasha, Syed Nawaz, Kothandaraman, D., Shabana, and Kanakam, Ranganath
- Subjects
COST functions ,ENERGY function ,INTERNET of things ,DATA transmission systems - Abstract
IoT based Fog Computing become major needy technology integration for innovative engineering. In the IoT based technologies the Fog nodes communicate with network edge node and creates easy interaction with Cloud data centers. The data which generated from the origin points transmit to destination in the network of different devices. In each device to process and execute the task needs some energy consumption. In this paper we proposed a Cost Function for Energy (CFE) which evaluate the total energy consumption during in transmission of data from source to destination based on the task. The total energy consumption depended on the total delay of task execution which presents amount of time for execution of a task. The CFE calculated for every tasks execution at local and other nodes of network. In our proposal we have included the greedy heuristic approach for evaluate the total delay accordingly the energy consumption. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
26. Research on the application of RFID technology in artificial intelligence medical management.
- Author
-
Liu, Xinyan
- Subjects
DATA transmission systems ,ARTIFICIAL intelligence ,WIRELESS communications ,MEDICAL personnel ,SATISFACTION ,RADIO frequency identification systems - Abstract
Artificial intelligence plays an important role in medical management, but there is a problem of poor wireless communication effect. In the process of management data transmission, it is easy to distort, high loss rate, limited transmission dependence and other problems. Therefore, this paper integrates RFID technology into medical management and analyzes the transmission effect. First of all, RFID technology is used to standardize the transmission data in medical management, divide it according to departments, categories, and personnel, and screen out the information data that meets the requirements. Then RFID technology mixes RFID on the transmitted data and compares it with wired transmission to verify the rationality and accuracy of the transmitted data and the satisfaction of medical staff. MATLAB simulation shows that under the conditions of transmission standards and IEEE protocols, RFID technology has better data transmission effects, higher accuracy and rationality, and better satisfaction rates, giving full play to the advantages of wired and RFID. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Futuristic aspects of Li-Fi technology.
- Author
-
Kaur, Taranjeet, Sharma, Yashika, and Sikand, Rainy
- Subjects
TECHNOLOGICAL innovations ,TECHNOLOGY convergence ,INDUSTRIAL robots ,WIRELESS communications ,MANUFACTURING processes ,DATA transmission systems - Abstract
The rapid evolution of Li-Fi (Light Fidelity) technology marks a pivotal moment in the realm of wireless communication, promising to bring transformative changes across a spectrum of industries and applications. In this research paper, we embark on a journey through the exhilarating landscape of Li-Fi's potential, where the convergence of innovative technology and cutting-edge research points toward a future where high-speed, secure wireless communication is no longer a vision but a tangible reality. Li-Fi's remarkable capability to harness visible light for data transmission has ignited imaginations and piqued the interest of technologists and visionaries alike. The applications of Li-Fi extend far beyond conventional communication. As we delve deeper into its potential across domains, we uncover its transformative impact on smart cities, where Li-Fi could enable ultra-efficient, interconnected systems, reducing energy consumption, enhancing public services, and redefining urban living. In the healthcare sector, Li-Fi offers the promise of enhancing patient care through reliable and high-speed data transfer, potentially revolutionizing the way medical professionals' access and exchange critical information. Within the industrial landscape, Li-Fi has the potential to empower automation and industrial processes with its low latency and interference-resistant properties, fundamentally reshaping how industries operate and communicate. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Security boundaries of mobile adhoc network: A systematic literature review and future aspects.
- Author
-
Brar, Manbir Kaur, Singh, Sukhpreet, and Singh, Sajjan
- Subjects
AD hoc computer networks ,INFRASTRUCTURE (Economics) ,TECHNOLOGICAL innovations ,COMMUNICATION infrastructure ,WIRELESS communications ,DATA transmission systems ,ENVIRONMENTAL monitoring - Abstract
Technological advancement makes human life more manageable in different aspects, and several variants are available to provide the same. Wireless communication helps to transfer information or data from one place to another without any physical connection between devices. The application includes mobile communication, remote access, satellite transmission, vehicle communication, broadcasting, etc. There are two categories of wireless communication: infrastructure-less networks and infrastructure networks. Any network where nodes connect without the need of infrastructure is called a mobile ad hoc network. Because of features like changeable topology, rapid setup, multi-hop data transmission, and others, MANETs have become more and more common. Due to their distinctive features, MANETs are ideally suited to several real-time applications, such as calamity control, environmental monitoring, and military activities. To assist in actualizing the vision of Industry 4.0, MANETs may also be employed with innovative technologies including cloud computing, machine learning, and the Internet of Things, etc. Any MANET-based critical real-time applications require reliable and secure data delivery. Hence, this study explores several security approaches that advance safe transmission while enhancing MANET performance. The findings of this article indicate that while significant progress has been made in terms of security of MANETs, there are still many challenges that need to be addressed. Overall, this survey paper provides a thorough rundown of security boundaries of MANETs, highlighting both the progress made and the areas that require further attention. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Use of homomorphic encryption techniques for secure cloud computing.
- Author
-
Vyas, Abhishek and Abimannan, Satheesh
- Subjects
CLOUD computing ,CLOUD computing security measures ,CLOUD storage ,BUSINESS enterprises ,DATA transmission systems ,DATA security - Abstract
The importance of cloud computing is increasing in the world. The prominence of cloud computing in the future, where networking will become converged, and everything electronic or digital will be connected, is incontestable. This is due to the advantage of the cloud as a medium of storage. Cloud computing can access platforms with minimal hardware requirements at the user end. Secure transmission of data traffic from the cloud is a serious issue that needs to be addressed professionally. This paper explores various security issues related to cloud computing and some essential techniques implemented to deal with those issues. In cloud computing, anything and everything is available as a service on the cloud to the client of the cloud. So, the client must get the best service possible through cloud resources. Security of the client's data and other computing resources is the company's responsibility for providing cloud services. Availability, Security of Data, Third-Party Control, Privacy and Legal Issues are some of the issues related to cloud computing. Various computing security techniques are devised to implement security measures in cloud computing. Some of them include using encryption algorithms. Homomorphic Encryption is considered the most potent among all other encryption techniques when implementing it for cloud computing services. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
30. Detailed analysis and comparison of communication protocol-oriented IoT applications.
- Author
-
Fadli, Ouijdane, Balboul, Younes, Fattah, Mohammed, Mazer, Said, and Elbekkali, Moulhime
- Subjects
INTERNET of things ,DATA transmission systems ,ENERGY consumption ,SCALABILITY - Abstract
In recent years, the Internet of Things (IoT) constituted one of the major research areas which can offer solutions economically interesting and easily deployed to the remote monitoring and the data processing in several application domains. It became pervasive in all areas of our lives, viz: agriculture, healthcare, transportation, automation industry, banking, military, security and many other fields of application. This requires a larger and more complex network than the current internet. Therefore, it is crucial to create a unified IoT architecture and standardize IoT protocols to solve the challenges of energy efficiency, interoperability, scalability, security, bandwidth management. The communication protocols constitute an important part of the data communication of IoT applications. However, due to the diverse nature of IoT systems and their different messaging challenges, the selection of the appropriate messaging protocol is very difficult. Therefore, this paper presents a study of communication protocols MQTT, SMQTT, AMQP, and CoAP for IoT applications, to determine the appropriate protocol for each domain based on the type of IoT applications. It presents an evaluation of the important needs of some IoT application domains. Subsequently, it performs a detailed analysis of established communication protocols MQTT, SMQTT, AMQP, and CoAP. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. Impact of novel machine learning approaches on intrusion detection system.
- Author
-
Kumari, Muskan, Choudhary, Neha, and Parihar, Shefali
- Subjects
MACHINE learning ,COMPUTER network security ,INTRUSION detection systems (Computer security) ,CYBERTERRORISM ,DATA transmission systems ,GENETIC algorithms - Abstract
Today, Maintaining secure, reliable and secure communication of information between different organizations is very important. However, secure data communications are always vulnerable to intruders and misuse over the Internet and other networks. To achieve this, intrusion detection systems have become a necessary component of computer and computer network security. However, different approaches are used for intrusion detection. Unfortunately, not all previous systems are completely error-free. Therefore, try to improve security. In this course, we will introduce the intrusion detection system "IDS". Before applying a genetic algorithm (GA) to efficiently detect different types of network intruders. Use parameters to learn and implement the GA evolution process. Because of the ascent in specialized progressions, there is likewise an unexpected spike in cyber attacks. To safeguard against these dangers, the IDS is a viable technique, however the standard IDS isn't exceptionally astute and strong to hold the client back from experiencing new assaults on an ordinary premise. To improve the classifiers and calculations, AI classifiers and calculations can be utilized. These AI models are extremely useful and can prepare models to recognizetypical traffic and awful traffic. By means of the help of AI, IDS can then perceive inconsistency assaults and stay away from them. With standard IDS, while distinguishing oddity assaults, the bogus positive rate is high, and that implies that it is erroneous, to limit the misleading positive rate ML calculations can be utilized. Additionally, oddity recognition is conceivable involving ML in interruption identification which will give a high exactness of assaults being distinguished. Our proposed paper includes various ML Algorithm to filter and reduce traffic data complicated. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
32. A review: Study about routing protocol of MANET.
- Author
-
Thapar, Shruti and Shukla, Ritu
- Subjects
AD hoc computer networks ,DATA transmission systems ,NETWORK hubs - Abstract
Versatile Ad hoc network will be a network in which hubs impart with practically no focal setup or organization pattern.MANET is linked via remote nodes and can perform numerous jumps to edit information with them. Steering assemblage is expected for accord and organization of such networks, where it objects capable and opportune transmission of data. DSR is an essential and productive steering show arranged unequivocally for use in multi-hop remote promotion of movable nodes. DSR allows the organization when there is no need for a framework to the current organization. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. Smart highway navigation system with toll collector using Li-Fi.
- Author
-
Chopra, Shakti Raj, Kumar, Shakti, Kumar, Nitish, Balakrishna, Suryadevera, and Jha, Ashutosh
- Subjects
LIGHT emitting diodes ,WIRELESS Internet ,DATA transmission systems ,ARTIFICIAL eyes ,GPS receivers ,TOLL collection - Abstract
In this research paper, we are describing a project that is based on a Li-Fi system. The navigation system and toll collection are two projects through which we are trying to show how we can apply Li-Fi in various systems. Li-Fi is a short form of Light Fidelity, it is a predecessor of WI-FI technology but these both systems as a lot of difference in every aspect. Li-Fi can provide us a speed of about 10Gbps whereas WI-FI only provides us the speed of about 150mbps. In the coming days, Li-Fi will have a lot of applications due to its speed and non-electromagnetic behavior. The concept of Li-Fi is very simple, the normal bulb that we see in our house, blinks approximately 10 billion times/sec, of course, it is not possible to see with the naked eye but artificial eyes (phone camera or light sensors) can detect these blinking. So, this blinking can be converted in the form of 0 s and 1s, thus can be used for communication between two digital systems. The project consists of two sections, the transmitter section, and the receiver section. At the transmitter section, we are going to use Light Emitting Diode (LED) for data transmission, and for the reception of data we are going to use Light Dependent Resistor (LDR). One new feature which we plan to add is audio feedback in which the receiver device will play location information using an mp3 player and speaker system. This is to provide benefits to the users to understand their location easily. We wish to reduce the dependency on GPS devices and make LI-FI a commonly used technology for the future. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
34. UP TO 500 M OPTICAL COMMUNICATION OVER SI-POF.
- Author
-
Kruglov, R., Ziemann, O., Engelbrecht, R., Heinl, W., and Vinogradov, J.
- Subjects
OPTICAL fiber communication ,LIGHT emitting diodes ,DATA transmission systems ,PHOTODIODES ,OPTICAL fiber joints - Abstract
Novel results on a long-reach communication over SI-POF with LED and laser diode operating near 520 nm are reported in the paper. A bit rate of 230 Mbit/s at a BER of 10
-3 has been achieved over 500 m SI-POF link with two additional FSMA connectors by employing a laser diode and receiver based on an avalanche photodiode. A similar transmission link with an LED has demonstrated a capacity of 110 Mbit/s at a BER of 10-3 . [ABSTRACT FROM AUTHOR]- Published
- 2022
35. GI-POF IN METAVERSE SMART MEDICAL APPLICATIONS VIA ALL-OPTICAL NETWORKS.
- Author
-
Snow ZHU, Xiaogang LI, Liangji LAI, Qiurong CHEN, Xiaojun XIE, and Dexi WENG
- Subjects
DATA transmission systems ,5G networks ,OPTICAL fiber communication ,POLYMERS ,DATA analysis - Abstract
Demand for high speed data communications (> 1Gbps) and low latency (milliseconds scale or lower) has been on the rise [1,2,3,4,5]. The chief driving forces behind the demand for high speeds & low latency are applications of 8K video, 5G/6G, smart technologies and COVID19 pandemic-induced demands. For the emerging smart medical applications, especially the ones that are in metaverse, super high data speed with low latency is a must. All-optical network (AON) is one way to meet the demand. Perfluorinated graded-index polymer optical fiber (Gi-POF) is among the best media choices offering high data speeds. Gi-POF, complementing glass optical fiber (GOF) with its better bendability, can form all optical networks with optical/optical (O/O) connections. Due to reduced usage of E/O conversions, the latency of all optical networks will potentially be reduced, too. In this paper we will examine the functions of GI-POF O/O GOF. [ABSTRACT FROM AUTHOR]
- Published
- 2022
36. THE COMPLEX PEDOLOGICAL CHARACTERIZATION OF SOME PILOT AGRICULTURAL PERIMETERS IN ORDER TO CALIBRATE THE SENSORS FOR MEASURING THE NPK AND THE GRAVIMETRIC HUMIDITY OF THE SOIL FOR THE REMOTE TRANSMISSION OF THE NECESSARY DATA TO THE FARMERS.
- Author
-
VOICU, Petre, VASIU, Radu, OAIDA, Mircea, GHEORGHIU, Catalin, and DUMITRU, Aurel
- Subjects
AGRICULTURE ,DATA transmission systems ,SOIL moisture measurement ,AGRICULTURAL chemicals ,METEOROLOGICAL stations ,SOIL moisture ,PRECISION farming ,HUMIDITY - Abstract
The paper presents the complex pedological framework where the high-precision sensors from the meteorological stations are tested in order to remotely transmit the soil parameters with express reference to the NPK content and the water content of the soil. In the context of climate change, the interest in continuous, "in situ" knowledge of soil moisture and macroelement content is high because soil properties are correlated with the mathematical simulation of how crops are formed on agricultural plots. While regional simulation has been operational worldwide for over two decades, during which prediction errors have decreased significantly, remote measurement of NPK and soil moisture with the required accuracy at the local scale, at the level of agricultural plots, is still under investigation. It is necessary to continue the research in this context because the collection of soil samples in order to determine the properties of the soil in the laboratory is becoming more and more restrictive due to the high prices. The determination of soil parameters in the laboratory cannot be completely replaced by remote measurements, but the latter method ensures, if the sensors are properly calibrated and calibrated, a high degree of accuracy and can complete the information provided by pedological laboratories specializing in hydrophysics or agrochemistry. On the other hand, the development of precision agriculture exerts an important pressure in the direction of the development of research on the digitization of agricultural parameters to allow sufficiently accurate measurements at the plot scale, the hydrophysical and agrochemical properties being essential. To be relevant on this scale, the sensors must be calibrated to provide real data, especially for the phenological phases in which the plant is sensitive to various stresses: water, nutrition, disease attacks and pests. Referring only to water stress and NPK content, in the absence of the actual value of surface moisture, and the content of macroelements, the simulation of the "sowing-sunrise" period, greatly influenced by the water available for seed germination, may be affected by significant errors., the results of the simulations being uncertain or even wrong. To date, farmers have relied almost exclusively on the results of NPK determinations and soil moisture in the laboratory, which involves a great deal of financial effort. Now they can continuously know, in addition to the standard weather data provided by meteorological stations, the content of macroelements and the gravimetric humidity of the soil at a given time by transmitting data remotely via satellites. The field experiments followed the methodological framework that is summarized in this paper and took place between September 2021 and May 2022, in pilot agricultural areas in different geographical areas: Baneasa (Bucharest), Fundulea (Calarasi) and Dabuleni (Dolj). [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
37. Energy and Performance Trade-off in Nanophotonic Interconnects using Coding Techniques.
- Author
-
Killian, Cedric, Chillet, Daniel, Le Beux, Sebastien, Pham, Van-Dung, Sentieys, Olivier, and O'Connor, Ian
- Subjects
NANOPHOTONICS ,NANOPHOTONIC integrated circuits ,DATA transmission systems ,DEEP learning ,ARTIFICIAL neural networks - Abstract
Nanophotonic is an emerging technology considered as one of the key solutions for future generation on-chip interconnects. Indeed, this technology provides high bandwidth for data transfers and can be a very interesting alternative to bypass the bottleneck induced by classical NoC. However, their implementation in fully integrated 3D circuits remains uncertain due to the high power consumption of on-chip lasers. However, if a specific bit error rate is targeted, digital processing can be added in the electrical domain to reduce the laser power and keep the same communication reliability. This paper addresses this problem and proposes to transmit encoded data on the optical interconnect, which allows for a reduction of the laser power consumption, thus increasing nanophotonics interconnects energy efficiency. The results presented in this paper show that using simple Hamming coder and decoder permits to reduce the laser power by nearly 50% without loss in communication data rate and with a negligible hardware overhead. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
38. Problems and prospects in internet of things (IoT)security threats.
- Author
-
Sisodia, Ritu, Banerjee, C., and Kaushik, Manju
- Subjects
INTERNET of things ,TELECOMMUNICATION systems ,BUSINESS intelligence ,DATA security ,COMPUTER network security ,DATA transmission systems ,VEHICULAR ad hoc networks - Abstract
Internet of things is a popular technology which is growing at a faster pace day by day. the internet of things (IoT) describes physical objects (or groups of such objects) that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the internet or other communications networks. the important concerns in the data security of IoT applications are insecure communications and data storage. one of the significant challenges for IoT security is that compromised devices can be used to access confidential data. cryptography is an efficient way to deal with this challenge. encryption is a fundamental form of defense that deals with security of the data itself. this means that even in the event of a system breach, compromised data is still only readable by authorized users in possession of the right encryption keys. it's an efficient solution against eavesdropping attacks (used in industrial espionage), also known as sniffing attacks, when the cybercriminal passively accesses data as it is being sent or received on the network. cryptography is also a good defense against active eavesdropping (aka man-in-the-middle attack) in which the hacker intercepts all relevant messages and injects new ones between two devices. this paper contains of comparison of various models and framework & algorithms used in earlier research with respect to IoT security issues. our future proceedings can be in the direction to develop a novel approach to ensure security for IoT using efficient cryptographic algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. Smart monitoring and inspection of electrical installations based on the internet of things.
- Author
-
Ali, Muhamad and Raharjo, Rizky
- Subjects
INTERNET of things ,DATA transmission systems ,SCIENTIFIC method ,ELECTRICAL test equipment ,SYSTEMS design - Abstract
Electrical equipment and Installation such as induction motors, transformers, and others have parameters of voltage, current, active power, apparent power, power factor, and that constantly change at any time along with changes in load, disturbance, or other abnormal conditions. Electrical equipment and Installation need to be monitored to identify its condition to prevent serious problems with the system. This paper aims to develop Smart Monitoring and Inspection of Electrical Installation based on The Internet of things (SMIEE-IoT) by measuring and monitoring electrical parameters in real-time. The development of SMIEE-IoT is carried out using the scientific method, which consists of the following stages: 1) needs analysis conducted through literature study, observation, and interviews with technicians and engineers. 2) System Design which consists of designing hardware, software, and data communication systems. 3) Smart system development, 4. System testing to measure and test electrical equipment and installations in real-time based on IoT and 5. System implementation. The test results show that the SMIEE-IoT can work well. The system can measure and test the electrical parameter with an Android application that can send data within 16 seconds. The accuracy of the SMIEE-IoT in voltage measurement reaches 98.60%, current 98, 84%, active power 97.42%, reactive power 97.80%, energy 97.90%, and power factor 98.80%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
40. Analysis and display of statistical and spectral characteristics of surface water waves.
- Author
-
Atayan, Asya, Mezina, Alesya, Zaytseva, Ekaterina, and Dolgov, Vasilii
- Subjects
WATER waves ,STATISTICS ,DATA transmission systems ,INFORMATION storage & retrieval systems ,INFORMATION measurement - Abstract
The paper considers the issue of relevance of creating cheap and lightweight measuring devices that allow collecting and transmitting to remote information systems data on the waves of the water surface in natural reservoirs. The general scheme of functioning of the hardware-software complex designed to collect the wave parameters is described, the composition and characteristics of the sensors used in the hardware of the measuring device are given. The mathematical methods and algorithms used for filtering and smoothing the primary information received from the measuring device are described, their brief description is given. The scheme of interaction and transmission of data from measuring devices to the general information system for collecting and analyzing information has been developed and presented. The scheme of the information complex functioning and the detailed structure of the data analysis module are given. Examples of the functioning of the measuring module and the information system as a whole, the data analysis module are presented. The graphs of the received initial data, the data after their filtering by various algorithms, the calculated displacement of the measuring device along the vertical axis when using various filtering algorithms are presented. It is shown that for the set of hardware sensors used in this work, the most plausible results are obtained using the Savitsky-Golay filter. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. Random-Access Performances Measures Evaluation with the Concept of Virtual Preamble.
- Author
-
Sinitsyn, I., Zaripova, E., Gaidamaka, Yu., Adamu, A., and Shorgin, V.
- Subjects
PERFORMANCE evaluation ,DATA transmission systems ,MARKOV processes ,TELECOMMUNICATION systems ,TECHNICAL reports ,LONG-Term Evolution (Telecommunications) - Abstract
Now rapid growth of number of the devices communicating among themselves in LTE (Long-Term Evolution) networks and also increase in volume of transmitted data is observed. The task of reduction of signal and user load, which is serviced by communication networks is relevant. For this purpose algorithms of the simplified interaction between the user devices and a network are being developed and implemented to minimize the spent network resources. In this paper the session initiation procedure between the User Equipment and the LTE eNodeB is analyzed. The problem of the small data transmission formed by the Machine-To-Machine (M2M) connections can be solved by using a Random Access Channel (RACH) for session initiation. Such solution was proposed in the technical report 37.868 of 3GPP (3rd Generation Partnership Project) consortium. For a RACH session initiation procedure it is necessary to evaluate preliminary measures such as access delay, access success probability, access failure pobability, statistics on number of preamble transmissions in case of successful access. In this paper we propose formulas for all listed measures estimation using the virtual preambles approach. Numerical analysis shows the accuracy of the proposed analytical model in the form of the Markov chain. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
42. Underwater optical wireless communication with subcarrier intensity modulation: an experimental demonstration.
- Author
-
Popoola, Wasiu O., Geldard, Callum, Guler, Egecan, and Hamilton, Alexander
- Subjects
WIRELESS communications ,UNDERWATER optical communication ,SUBCARRIER multiplexing ,INTENSITY modulation (Optics) ,DATA transmission systems - Abstract
This paper presents an experimental study of an underwater optical wireless communications system (UOWC). The potential of UOWC and how it can operate alongside acoustic based communications in a hybrid system is outlined. The channel characteristics, in terms of the inherent optical properties of water, are described and the impact on data transmission assessed. We present data transmission with a blue laser diode using both on-off keying (OOK) and subcarrier intensity modulation (SIM). These modulation schemes are evaluated in both still and turbulent water, demonstrating the inherent resilience to turbulence of SIM as well as the impact of turbulence on signal transmission. We show a maximum data rate in the range of Gbps, showing the potential for high speed underwater communications links using UOWC. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
43. Optimizing chromatic dispersion compensation using the adaptive maximum likelihood algorithm for FBMC-OQAM fiber optic systems.
- Author
-
Al-Mashkoor, Muntadher T., Jamel, Thamer M., and Al-Tamimi, Haydar M.
- Subjects
DATA transmission systems ,QUADRATURE amplitude modulation ,PHASE noise ,FILTER banks ,OPTICAL fibers ,ALGORITHMS ,OPTICAL dispersion ,ADAPTIVE optics - Abstract
Chromatic Dispersion (CD) compensation in optical fiber Offset Quadrature Amplitude Modulation based Filter Bank Multicarrier (FBMC-OQAM) systems is the most used today, especially on terrestrial Long-haul optical fiber type. As any other related system, FBMC-OQAM have a lot of strength and weakness points that should take in account, therefore, focus on studying data transmission over optical cables with FBMC-OQAM modulation for long distance and improve data access by reducing the noise on phase and have less dispersion on the transmitted light. To get a high spectral efficiency keep the subcarriers number sufficiently high, so will work on 256 subcarriers with cable length up to 3000 km. To get less complexity on an algorithm chose to use, and therefore compensate some of the dispersion at the receiver, must not set the subcarriers number at too high level. In parallel, know that the fiber dispersion or the propagation distance increases or the number of subcarriers decreases, the CD tolerance of single-tap equalization is reduced, so in this paper, propose to use the frequency sampling multi-tap equalizer for improving the CD compensation. Furthermore, will derive a new simple phase noise (PN) estimation algorithm which can be seen as an adaptive maximum likelihood (AML) algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. A study on energy efficiency of a wireless communication system.
- Author
-
Samala, Srinivas, Prasad, Ch. Rajendra, Kollem, Sreedhar, Yalabaka, Srikanth, and Rao, P. Ramchandar
- Subjects
WIRELESS communications ,ENERGY consumption ,POWER resources ,DATA transmission systems ,ENERGY futures ,POWER transmission - Abstract
Wireless networks are using an increasing amount of energy to assure the quality of service as the number of high-data-rate applications increases. As a result of inadequate energy resources and eco-friendly transmission, energy-efficient communications have received significant attention. Data transmission and energy usage are tightly related in wireless communication, whereas the channel's capacity limits the data rate, and It's currently unclear how much energy a communication system require in future generations. So, in this paper, transmission power p, bandwidth B are varied to find the maximum achievable limit on Energy efficiency in future wireless devices under different scenarios. Analysis of energy efficiency as a function of channel gain and bandwidth is performed in the simulation of a single antenna system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Punctured convolutional codes for data communication with unequal error protection.
- Author
-
Kumar, R. Raja, Indumathi, P., Pandian, R., Jacob, T. Prem, Pravin, A., and Prasad, K. Mohana
- Subjects
RANDOM noise theory ,ERROR rates ,DATA transmission systems - Abstract
In this paper, we show the efficacy of Unequal Error Protection (UEP) for data communication using punctured convolutional codes. We have considered PCM and numeric data types to analyse the performance of Unequal Error Protection scheme as compared to the conventional scheme. The performance is evaluated in terms of the decoding error distribution and the word error rate (WER) under Gaussian noise for both the schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Data visualization for energy optimisation in smart campus application using LoRaWAN industrial IoT technology.
- Author
-
Mariappan, R., Suhasini, P. Sarah, Lakshmi, G. Manasa, Manoj, G., Sai, M. Mahitha Sri, and Devendhar, R.
- Subjects
WIDE area networks ,SMART devices ,TRANSMITTERS (Communication) ,PRIVATE networks ,DATA visualization ,DATA transmission systems ,INTERNET of things - Abstract
Remote monitoring and control of appliances or equipment at institute, city, home, or industry from a large distances with low power consumption is still a complicated task. Nowadays, some smart devices or mobile phones are being proactively used to monitor and control equipment using Internet of Things (IoT) systems. However, this system requires high power consumption and covers only short distances. This paper presents Long range wide area network (LoRaWAN) based smart campus controlling system. The proposed system contains of the transmitter, receiver and a web application. A private network server is built and connected to a LoRa gateway, which gathers information from end nodes/wireless sensors and transmits it to a network server which is, TheThingsNetwork (TTN) without the use of routers at the transmitter end. At the receiver end, the data can be used to power an end-user application/dashboard/mobile app, as well as to monitor and operate various appliances and devices. LoRa is used to implement the network interface, which solves communication failure problems and allows for energy-efficient data transmission. The LoRa smart campus platform optimizes the energy utilization of the campus. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. Performance evaluation of ASK digital modulation for data transmission over an audio channel.
- Author
-
Iliev, Iliyan
- Subjects
DIGITAL modulation ,DATA transmission systems ,DIGITAL communications ,TELECOMMUNICATION systems ,TRANSMISSION of sound ,TRANSMITTERS (Communication) ,QUALITY factor ,ERROR rates - Abstract
Digital Amplitude-Shift Keying (ASK) modulation is widely used in control systems such as health monitoring with bio-implants, tire pressuring monitoring systems etc. In binary ASK digital modulation, the time to transmit one bit of information depends on the length of the symbol. In a sound communication system, the symbol is transmitted as a sound pulse. The total transmission time of a message is associated with a symbol length. For a symbol length of 0.01 s, the transmission rate is 100 bps. But transmitting short sound pulses at low frequencies requires the use of low-quality factor emitters. This is necessary to be able to achieve fast decay for the small number of oscillations of the pulse being emitted. With a carrier frequency of 1000 Hz and a pulse duration of 0.01 s, the pulse contains 10 periods. On the other hand, to achieve the required received signal power that provides the desired Beet Error Rate (BER) levels, the use of high gain emitters allows the use of a lower power transmitting device. A contradiction arises between the two transmitter requirements due to the fact that a small quality factor does not allow a high gain factor to be achieved. In this paper, using a sound data transmission system with binary ASK digital modulation, how the BER levels change at different symbol lengths and carrier frequencies of the transmitted signal is investigated. The audio transmission and reception channels were implemented on a PC using the LabView. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Effective organization of personal data protection.
- Author
-
Kornienko, Dmitriy
- Subjects
DATA protection ,CLOUD storage ,DATA transmission systems ,TELECOMMUNICATION systems ,DATA warehousing ,COMPUTER networks ,ELECTRONIC data processing ,BANDWIDTHS ,DISTRIBUTED algorithms - Abstract
Over the past few years, computer network researchers have proposed many new congestion control algorithms for general and specific data transmission. However, most of these algorithms are completed by modelling and limited to the conditions of laboratory experiments; few of them have been practically tested in real high-performance networks. The paper solves an actual scientific problem of developing models and methods for increasing the bandwidth of distributed telecommunication systems of highly accessible cloud data storage based on new access protocols. The problems were analysed concerning the deployment and functioning of cloud data storage. The technological and functional problems were highlighted when deploying cloud data storage based on the analysis. The attention was focused on unsolvable problems of building distributed data transmission systems. A cloud data storage model was improved by presenting it as an algebraic system, which differs from the existing ones by introducing data processing methods based on session-level protocol tools into the architecture of a connected telecommunications network, which made it possible to determine and use its bandwidth more accurately and fully. The system architecture was designed based on the proposed and modelled methods to access cloud storage. Cloud storage was deployed in practice and data was exchanged. A comparative analysis was carried out of the proposed methods and the existing ones, and their effectiveness was proved. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. In-depth evaluation of security requirements and attacks for secure data communication in ITS.
- Author
-
Sandeep, Y. and Venugopal, P.
- Subjects
AD hoc computer networks ,DATA transmission systems ,TECHNOLOGICAL innovations ,WIRELESS communications ,WIRELESS channels ,VEHICULAR ad hoc networks ,INTELLIGENT transportation systems ,NEAR field communication - Abstract
With new technology, the Intelligent Transportation System (ITS) has evolved into Data-Driven Intelligent Transport System (DDITS) and further to the Internet of Vehicles (IOV) during the last few decades. Vehicular Ad-hoc networks (VANETs), a hierarchy of Mobile Ad-hoc networks (MANETs), are usually deployed in smart ITS in urban, highway, and rural scenarios. VANET facilitates vehicle-to-everything (V2X) communication with massive exchanges of safety and non-safety messages to other vehicles. Moreover, it achieves low latency in an open-access environment without requiring fixed infrastructure or centralized administration, improving ride quality, safety, comfort, and efficiency issues in road traffic. However, open wireless communication channels make these messages vulnerable to attackers to intercept, tamper, replay, and eradicate them. Hence, this paper provides an extensive overview of VANETs, security, and various attacks and countermeasures. It further analyses the critical and challenging security issues, in particular Authentication, data confidentiality, data integrity, availability, and nonrepudiation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Edge computing technology engineering analysis.
- Author
-
Kovalenko, Sergei, Kazantseva, Larisa, and Suprunenko, Dmitry
- Subjects
EDGE computing ,ENGINEERING mathematics ,ELECTRONIC data processing ,DATA transmission systems ,MATHEMATICAL models - Abstract
The paper analyzes the problems arising in edge computing technology. A mathematical model describing the time delays in data processing and transmission is constructed, and suggestions are made to improve the efficiency of using the technology. The devices' examples developed taking into account the edge computing technology requirements are given. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.