AN OVERVIEW OF PEAK-TO-AVERAGE POWER RATIO REDUCTION TECHNIQUES FOR OFDM SIGNALS
Z Wang, E Sun, YZ3 1,2,3College of Electronics Information and Control Engineering, Beijing University of Technology, Beijing
OFDM (Orthogonal Frequency Division Multiplexing) has been widely adopted for high data rate wireless communication systems due to its advantages such as extraordinary spectral efficiency, robustness to channel fading and better QoS (Quality of Service) performance for multiple users. However, some challenging issues are still unresolved in OFDM systems. One of the issues is the high PAPR (peak-toaverage power ratio), which results in nonlinearity in power amplifiers, and causes out of band radiation and in band distortion. This paper reviews some conventional PAPR reduction techniques and their modifications to achievebetter PAPR performance. Advantages and disadvantages of each technique are discussed in detail. And comparisons between different techniques are also presented. Finally, this paper makes a prospect forecast about the direction for further researches in the area of PAPR reduction forOFDM signals.
OFDM, PAPR, Clipping, Companding.
For More Details :
https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf
Volume Link :
http://airccse.org/journal/ijmnct/current2016.html
JOURNEY OF MOBILE GENERATION AND COGNITIVE RADIO TECHNOLOGY IN 5G
Parnika De and Shailendra Singh, Department of Engineering and Application, National Institute of Technical Teacher Training and Research, Bhopal, India.
The ever increasing number of smart network devices may reach up to 24 billion in year 2020 as stated in the recent survey conducted by Forbes magazine. This may obsolete the current 4G technology for handling smart bandwidth allocation to such a large number of devices. In order to cope the challenging need for fast and efficient data transfer over these devices, demands next generation mobile network technology. In literature 5G technology has been suggested that offers appropriate solution to the above issues. 5G is a futuristic technology that would solve many problem of day to day life. By using 5G high data rates can be achieved in the range of Gbps with minimal latency. But the question is how to make such futuristic technology realistic. This can be done by efficiently utilizing the bandwidth in the allotted spectrum. Despite numerous benefits, 5G may critically suffer from tedious implementation problems that have been discussed in this paper. Cognitive radio (CR) is an intelligent radio that works on the principle of dynamic spectrum allocation. Cognitive Radio is capable of learning and adapting to external environment and reuses the frequency when primary user is absent. This paper combine the advantage of two technology 5G terminal and Cognitive radio terminal where 5G provide quality of service and high data rate whereas Cognitive radio give flexibility and adaptability to 5G.
5G, Cognitive Radio, Spectrum Sensing, Resource Allocation.
For More Details :
https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf
Volume Link :
http://airccse.org/journal/ijmnct/current2016.html
DESIGN AND IMPLEMENTATION A NEW ENERGY EFFICIENT CLUSTERING ALGORITHM USING THE FUZZY LOGIC AND GENETIC ALGORITHM FOR WIRELESS SENSOR NETWORKS
Sayyed Hedayat Tarighinejad1Reza Alinaghian2,3Mehdi Sadeghzadeh2,3, 1Faculty of Computer Engineering,Najafabad Branch,Islamic Azad University,Najafabad,Iran2Faculty of Computer Engineering,Najafabad Branch,Islamic Azad University,Najafabad,Iran3Departmen of computer, Mobarakeh Branch, Islamic Azad University,Mobarakeh,Isfahan,Iran4Departmen of computer,Mahshahr Branch, Islamic AzadUniversity,Mahshahr,Iran.
Wireless Sensor Networks are consist of small battery powered devices with limited energy resources. Once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. Hence, one of the most important issues that need to be enhanced in order to improve the life span of the network is energy efficiency. to overcome this demerit many research havebeen done. The clustering is the one of the representative approaches. In this paper, we introduce a dynamic clustering algorithm using Fuzzy Logic and genetic algorithm. In fact, using fuzzy system design and system optimization by genetic algorithm is presented approach to select the best cluster head in sensor networks. Using random data set has been addressed to evaluate of fuzzy-genetic system presented in this paper and finally, MSE rate or mean error of sending the messages using proposed fuzzy system in comparison with LEACH method is calculated in select the cluster head. The results of evaluations is representative of a reduction the MSE metric in proposed method in comparison with LEACH method for select the cluster head. Reduce of MSE directly is effective on energy consumption and lifetime of wireless sensor network and can cause the reduce energy consumption and increase network lifetime.
Wireless sensor networks, fuzzy logic, fuzzy system, genetic algorithm, energy consumption, clustering.
For More Details :
https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf
Volume Link :
http://airccse.org/journal/ijmnct/current2016.html
TRUST BASED SECURITY MODEL TO WITHSTAND AGAINST BLACK HOLE AND GREY HOLE ATTACKS IN MILITARY BASED MOBILE AD HOC NETWORKS
S.Sivagurunathan1K.Prathapchandran2, Department of Computer Science and Applications Gandhigram Rural Institute-Deemed University, Gandhigram-624 302 Tamilnadu, India
Significant features of Mobile Ad Hoc Networks make it suitable for modern military communication. These characteristics also weaken the security aspects in terms of attacks. Among the attacks, black hole and grey hole attacks are notable since they are launched internally and cannot be identified easily. The military communication requires confidential information sharing, ensuring correct identity of soldiers but offering such facility in military based MANET is difficult due to its unique nature. As providing authentication is a first form of security, in this article we propose a trust based security model to identifying black hole and grey hole nodes that weaken or collapse the success of mission in military communication. To provide authentication, we incorporate soldier’s interpersonal characteristics in terms of Stereo trust, Situational Awareness trust and soldier’s operational things in terms of first-hand information, second hand information and soldier’s current trust. Simulation results show the efficiency of our proposed model in terms of identifying black hole and grey hole nodes and its performances are compared with an existing model.
Mobile Ad hoc Networks, Authentication, Security, Black hole, Grey hole, direct trust, indirect trust,Situational Awareness, Stereo.
For More Details :
https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf
Volume Link :
http://airccse.org/journal/ijmnct/current2016.html
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
Belal Amro, College of Information Technology, Hebron University
Mobile devices have become very popular nowadays, due to is portability and high performance, a mobiledevice became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications are also increasing in their complexity and performance to cover most the needs of their users. Both software and hardware design focused on increasing performance and the working hours of a mobile device. Different mobile operating systems are being used today withdifferent platforms and different market shares. Like all information systems, mobile systems are prone to malware attacks. Due to the personality feature of mobile devices, malware detection is very important and is a must tool in each device to protect private data and mitigate attacks. In this paper, we will study and analyze different malware detection techniques used for mobile operating systems. We will focus on the to two competing mobile operating systems – Android and iOS. We will asset each technique summarizing itsadvantages and disadvantages. The aim of the work is to establish a basis for developing a mobile malware detection tool based on user profiling.
Malware, malware detection, mobile device, mobile application, security, privacy
For More Details :
https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf
Volume Link :
http://airccse.org/journal/ijmnct/current2017.html
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
SeyyedHedayatTarighiNejad1MohammadNikbakht2Mohammad HosseinAfrakhteh2, 1Faculty of Engineering, Islamic Azad University, Yasuj Branch2Keshavarzi Bank Staff Management, Kohgiluyeh and Boyer-Ahmad Province
Using modern methods of the electronic commerce in daily life transactions is increasing because of the growth and the comfortable access of the people to the internet and social networks. The electronic payment systems are one of the most important electronic commerce methods and the electronic payment fraud is a major problem.For example, the credit card fraud loss increases every year and is regarded as one of the important issues in the credit card institutes and corporations. Therefore, fraud detection is considered as an important research challenge. Fraud reduction is a complicated process requiring a body of knowledge in many scientific fields. Based on the kind of the fraud the banks or the credit card institutes face, different measures may be taken. This paper compares and analyzes the available recent findings on the credit card fraud detection techniques. The objectives of the present study are first to detect different credit card and electronic commerce fraud and then to investigate the strategies used for the purpose of detection.
credit card fraud, fraud detection, data mining techniques, electronic commerce, decision tree, electronic payment systems.
For More Details :
https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf
Volume Link :
http://airccse.org/journal/ijmnct/current2017.html
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COGNITIVE RADIO NETWORKS
A. Masri1, Y. A. S. Dama ,N. Odeh1, F.Hasan,A. Mousa 1N Eya 2R. A. Abd-Alhameed,J. M. Noras 21Dept. of Telecommunication Engineering, An-Najah National University, Nablus, Palestine 2School of Engineering and Informatics, University of Bradford, Bradford, UK
Email is a channel of communication which is considered to be a confidential medium of communication for exchange of information among individuals and organisations. The confidentiality consideration about e-mail is no longer the case as attackers send malicious emails to users to deceive them into disclosing their private personal information such as username, password, and bank card details, etc. In search of a solution to combat phishing cybercrime attacks, different approaches have been developed. However, the traditional exiting solutions have been limited in assisting email users to identify phishing emails from legitimate ones. This paper reveals the different email and website phishing solutions in phishing attack detection. It first provides a literature analysis of different existing phishing mitigation approaches. It then provides a discussion on the limitations of the techniques, before concluding with an explorationin to how phishing detection can be improved.
Cognitive Radio, Dynamic Spectrum Access, Resource Management, Cooperative Overlay.
For More Details :
https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf
Volume Link :
http://airccse.org/journal/ijmnct/current2017.html
BUSINESS MODELS FOR THE NEXT GENERATION OF MOBILE COMMUNICATIONS
Ghoul Smail1Jia Weijia 2
The Next Generation of mobile network 5G, which will be based on a high-speed wireless broadband connection, could bring important changes to the way individuals and businesses employ telecommunications services and solve the issues related to the explosive growth in demand for mobile traffic, and the profitability decreasing of the mobile Broadband market. Therefore, the OMNs (Operator Mobile Networks) should plan for deploying 5G mobile network beyond 2020, which is the expected year for launching 5G. A business analysis study and mathematic modelling approach was considered. Also, a new pricing model is proposed to be consistent with the growth of mobile broadband. The results show that 5G is very beneficial, not only because of its lower cost compared with 4G LTE, but also due to the increment of average data consumptions offered by 5G mobile technologies and the increasing growth of number of users. We also found that good analysis of Price Elasticity of Volume (PED) gives an important margin of benefit. We confirm that the reuse of existing sites have a large impact on reducing costs when a denser macro network deployed. However, we encountered a lack of the limited capacity related to the macro sites and coverage limited with small cell solutions like femtocells, picocells deployed with 5G millimeter Wave system and Wi-Fi.
4G, 5G, Benefit, CAPEX, Cost, OMN, OPEX, Prediction, Techno-economic
For More Details :
https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf
Volume Link :
http://airccse.org/journal/ijmnct/current2017.html
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING ENVIRONMENTS BY USING CHAYD MODEL
Sayyed Jalalaldin Gharibi Karyak1Sayyed Hedayat Tarighinejad2
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
E-learning, fraud, Chayd, data mining, decision tree.
For More Details :
https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf
Volume Link :
http://airccse.org/journal/ijmnct/current2017.html