keyboard_arrow_up
Top Read research articles in the field of Mobile Network Communications & Telematics @ 2024

AN OVERVIEW OF PEAK-TO-AVERAGE POWER RATIO REDUCTION TECHNIQUES FOR OFDM SIGNALS

    Z Wang, E Sun, YZ3 1,2,3College of Electronics Information and Control Engineering, Beijing University of Technology, Beijing

    ABSTRACT

    OFDM (Orthogonal Frequency Division Multiplexing) has been widely adopted for high data rate wireless communication systems due to its advantages such as extraordinary spectral efficiency, robustness to channel fading and better QoS (Quality of Service) performance for multiple users. However, some challenging issues are still unresolved in OFDM systems. One of the issues is the high PAPR (peak-toaverage power ratio), which results in nonlinearity in power amplifiers, and causes out of band radiation and in band distortion. This paper reviews some conventional PAPR reduction techniques and their modifications to achievebetter PAPR performance. Advantages and disadvantages of each technique are discussed in detail. And comparisons between different techniques are also presented. Finally, this paper makes a prospect forecast about the direction for further researches in the area of PAPR reduction forOFDM signals.

    KEYWORDS

    OFDM, PAPR, Clipping, Companding.


    For More Details :
    https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf


    Volume Link :
    http://airccse.org/journal/ijmnct/current2016.html




JOURNEY OF MOBILE GENERATION AND COGNITIVE RADIO TECHNOLOGY IN 5G

    Parnika De and Shailendra Singh, Department of Engineering and Application, National Institute of Technical Teacher Training and Research, Bhopal, India.

    ABSTRACT

    The ever increasing number of smart network devices may reach up to 24 billion in year 2020 as stated in the recent survey conducted by Forbes magazine. This may obsolete the current 4G technology for handling smart bandwidth allocation to such a large number of devices. In order to cope the challenging need for fast and efficient data transfer over these devices, demands next generation mobile network technology. In literature 5G technology has been suggested that offers appropriate solution to the above issues. 5G is a futuristic technology that would solve many problem of day to day life. By using 5G high data rates can be achieved in the range of Gbps with minimal latency. But the question is how to make such futuristic technology realistic. This can be done by efficiently utilizing the bandwidth in the allotted spectrum. Despite numerous benefits, 5G may critically suffer from tedious implementation problems that have been discussed in this paper. Cognitive radio (CR) is an intelligent radio that works on the principle of dynamic spectrum allocation. Cognitive Radio is capable of learning and adapting to external environment and reuses the frequency when primary user is absent. This paper combine the advantage of two technology 5G terminal and Cognitive radio terminal where 5G provide quality of service and high data rate whereas Cognitive radio give flexibility and adaptability to 5G.

    KEYWORDS

    5G, Cognitive Radio, Spectrum Sensing, Resource Allocation.


    For More Details :
    https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf


    Volume Link :
    http://airccse.org/journal/ijmnct/current2016.html




DESIGN AND IMPLEMENTATION A NEW ENERGY EFFICIENT CLUSTERING ALGORITHM USING THE FUZZY LOGIC AND GENETIC ALGORITHM FOR WIRELESS SENSOR NETWORKS

    Sayyed Hedayat Tarighinejad1Reza Alinaghian2,3Mehdi Sadeghzadeh2,3, 1Faculty of Computer Engineering,Najafabad Branch,Islamic Azad University,Najafabad,Iran2Faculty of Computer Engineering,Najafabad Branch,Islamic Azad University,Najafabad,Iran3Departmen of computer, Mobarakeh Branch, Islamic Azad University,Mobarakeh,Isfahan,Iran4Departmen of computer,Mahshahr Branch, Islamic AzadUniversity,Mahshahr,Iran.

    ABSTRACT

    Wireless Sensor Networks are consist of small battery powered devices with limited energy resources. Once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. Hence, one of the most important issues that need to be enhanced in order to improve the life span of the network is energy efficiency. to overcome this demerit many research havebeen done. The clustering is the one of the representative approaches. In this paper, we introduce a dynamic clustering algorithm using Fuzzy Logic and genetic algorithm. In fact, using fuzzy system design and system optimization by genetic algorithm is presented approach to select the best cluster head in sensor networks. Using random data set has been addressed to evaluate of fuzzy-genetic system presented in this paper and finally, MSE rate or mean error of sending the messages using proposed fuzzy system in comparison with LEACH method is calculated in select the cluster head. The results of evaluations is representative of a reduction the MSE metric in proposed method in comparison with LEACH method for select the cluster head. Reduce of MSE directly is effective on energy consumption and lifetime of wireless sensor network and can cause the reduce energy consumption and increase network lifetime.

    KEYWORDS

    Wireless sensor networks, fuzzy logic, fuzzy system, genetic algorithm, energy consumption, clustering.


    For More Details :
    https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf


    Volume Link :
    http://airccse.org/journal/ijmnct/current2016.html




TRUST BASED SECURITY MODEL TO WITHSTAND AGAINST BLACK HOLE AND GREY HOLE ATTACKS IN MILITARY BASED MOBILE AD HOC NETWORKS

    S.Sivagurunathan1K.Prathapchandran2, Department of Computer Science and Applications Gandhigram Rural Institute-Deemed University, Gandhigram-624 302 Tamilnadu, India

    ABSTRACT

    Significant features of Mobile Ad Hoc Networks make it suitable for modern military communication. These characteristics also weaken the security aspects in terms of attacks. Among the attacks, black hole and grey hole attacks are notable since they are launched internally and cannot be identified easily. The military communication requires confidential information sharing, ensuring correct identity of soldiers but offering such facility in military based MANET is difficult due to its unique nature. As providing authentication is a first form of security, in this article we propose a trust based security model to identifying black hole and grey hole nodes that weaken or collapse the success of mission in military communication. To provide authentication, we incorporate soldier’s interpersonal characteristics in terms of Stereo trust, Situational Awareness trust and soldier’s operational things in terms of first-hand information, second hand information and soldier’s current trust. Simulation results show the efficiency of our proposed model in terms of identifying black hole and grey hole nodes and its performances are compared with an existing model.

    KEYWORDS

    Mobile Ad hoc Networks, Authentication, Security, Black hole, Grey hole, direct trust, indirect trust,Situational Awareness, Stereo.


    For More Details :
    https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf


    Volume Link :
    http://airccse.org/journal/ijmnct/current2016.html




MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES

    Belal Amro, College of Information Technology, Hebron University

    ABSTRACT

    Mobile devices have become very popular nowadays, due to is portability and high performance, a mobiledevice became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications are also increasing in their complexity and performance to cover most the needs of their users. Both software and hardware design focused on increasing performance and the working hours of a mobile device. Different mobile operating systems are being used today withdifferent platforms and different market shares. Like all information systems, mobile systems are prone to malware attacks. Due to the personality feature of mobile devices, malware detection is very important and is a must tool in each device to protect private data and mitigate attacks. In this paper, we will study and analyze different malware detection techniques used for mobile operating systems. We will focus on the to two competing mobile operating systems – Android and iOS. We will asset each technique summarizing itsadvantages and disadvantages. The aim of the work is to establish a basis for developing a mobile malware detection tool based on user profiling.

    KEYWORDS

    Malware, malware detection, mobile device, mobile application, security, privacy


    For More Details :
    https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf


    Volume Link :
    http://airccse.org/journal/ijmnct/current2017.html




AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING

    SeyyedHedayatTarighiNejad1MohammadNikbakht2Mohammad HosseinAfrakhteh2, 1Faculty of Engineering, Islamic Azad University, Yasuj Branch2Keshavarzi Bank Staff Management, Kohgiluyeh and Boyer-Ahmad Province

    ABSTRACT

    Using modern methods of the electronic commerce in daily life transactions is increasing because of the growth and the comfortable access of the people to the internet and social networks. The electronic payment systems are one of the most important electronic commerce methods and the electronic payment fraud is a major problem.For example, the credit card fraud loss increases every year and is regarded as one of the important issues in the credit card institutes and corporations. Therefore, fraud detection is considered as an important research challenge. Fraud reduction is a complicated process requiring a body of knowledge in many scientific fields. Based on the kind of the fraud the banks or the credit card institutes face, different measures may be taken. This paper compares and analyzes the available recent findings on the credit card fraud detection techniques. The objectives of the present study are first to detect different credit card and electronic commerce fraud and then to investigate the strategies used for the purpose of detection.

    KEYWORDS

    credit card fraud, fraud detection, data mining techniques, electronic commerce, decision tree, electronic payment systems.


    For More Details :
    https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf


    Volume Link :
    http://airccse.org/journal/ijmnct/current2017.html




SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COGNITIVE RADIO NETWORKS

    A. Masri1, Y. A. S. Dama ,N. Odeh1, F.Hasan,A. Mousa 1N Eya 2R. A. Abd-Alhameed,J. M. Noras 21Dept. of Telecommunication Engineering, An-Najah National University, Nablus, Palestine 2School of Engineering and Informatics, University of Bradford, Bradford, UK

    ABSTRACT

    Email is a channel of communication which is considered to be a confidential medium of communication for exchange of information among individuals and organisations. The confidentiality consideration about e-mail is no longer the case as attackers send malicious emails to users to deceive them into disclosing their private personal information such as username, password, and bank card details, etc. In search of a solution to combat phishing cybercrime attacks, different approaches have been developed. However, the traditional exiting solutions have been limited in assisting email users to identify phishing emails from legitimate ones. This paper reveals the different email and website phishing solutions in phishing attack detection. It first provides a literature analysis of different existing phishing mitigation approaches. It then provides a discussion on the limitations of the techniques, before concluding with an explorationin to how phishing detection can be improved.

    KEYWORDS

    Cognitive Radio, Dynamic Spectrum Access, Resource Management, Cooperative Overlay.


    For More Details :
    https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf


    Volume Link :
    http://airccse.org/journal/ijmnct/current2017.html




BUSINESS MODELS FOR THE NEXT GENERATION OF MOBILE COMMUNICATIONS

    Ghoul Smail1Jia Weijia 2

    ABSTRACT

    The Next Generation of mobile network 5G, which will be based on a high-speed wireless broadband connection, could bring important changes to the way individuals and businesses employ telecommunications services and solve the issues related to the explosive growth in demand for mobile traffic, and the profitability decreasing of the mobile Broadband market. Therefore, the OMNs (Operator Mobile Networks) should plan for deploying 5G mobile network beyond 2020, which is the expected year for launching 5G. A business analysis study and mathematic modelling approach was considered. Also, a new pricing model is proposed to be consistent with the growth of mobile broadband. The results show that 5G is very beneficial, not only because of its lower cost compared with 4G LTE, but also due to the increment of average data consumptions offered by 5G mobile technologies and the increasing growth of number of users. We also found that good analysis of Price Elasticity of Volume (PED) gives an important margin of benefit. We confirm that the reuse of existing sites have a large impact on reducing costs when a denser macro network deployed. However, we encountered a lack of the limited capacity related to the macro sites and coverage limited with small cell solutions like femtocells, picocells deployed with 5G millimeter Wave system and Wi-Fi.

    KEYWORDS

    4G, 5G, Benefit, CAPEX, Cost, OMN, OPEX, Prediction, Techno-economic


    For More Details :
    https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf


    Volume Link :
    http://airccse.org/journal/ijmnct/current2017.html







menu
Reach Us

emailsecretary@cseij.org


emailcseijsecretary@yahoo.com

close