Search published articles



S. Shaerbaf, S. A. Seyedin,
Volume 8, Issue 1 (3-2012)
Abstract

In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynamic properties of chaotic nonlinear systems, the performance of most of such designs is not studied and so is not still suitable for wireless channels. To overcome this problem, in this paper a novel wide-band chaos-based communication scheme in multipath fading channels is presented, where the chaotic synchronization is implemented by particle filter observer. To illustrate the effectiveness of the proposed scheme, numerical simulations based on particle filter are presented in different channel conditions and the results are compared with two other EKF and UKF based communication scheme. Simulation results show the Remarkable BER performance of the proposed particle filter-based system in both AWGN and multipath fading channels condition, causes this idea act as a good candidate for asynchronous wide band communication.
P. Raja, P. Dananjayan,
Volume 10, Issue 1 (3-2014)
Abstract

Wireless Sensor Networks (WSNs) comprising of tiny, power-constrained nodes are getting very popular due to their potential uses in wide applications like monitoring of environmental conditions, various military and civilian applications. The critical issue in the node is energy consumption since it is operated using battery, therefore its lifetime should be maximized for effective utilization in various applications. In this paper, a game theory based hybrid MAC protocol (GH-MAC) is proposed to reduce the energy consumption of the nodes. GH-MAC is combined with the game based energy efficient TDMA (G-ETDMA) for intra-cluster communication between the cluster members to head nodes and game theory based nanoMAC (G-nanoMAC) protocol used for inter-cluster communication between head nodes. Performance of GH-MAC protocol is evaluated in terms of energy consumption, delay and compared with conventional MAC schemes. The results obtained using GH-MAC protocol shows that the energy consumtion is enormously reduced and thereby the lifetime of the sensor network is enhanced.
R. Samadi, S. A. Seyedin,
Volume 10, Issue 2 (6-2014)
Abstract

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with structured codebook is the Scalar Costa Scheme (SCS). The main goal of this paper is to increase security and robustness of SCS in the KMA scenario. To do this, SCS model is extended to more general case. In this case, the usual assumption of an infinite Document to Watermark Ratio (DWR) is not applied. Moreover watermark is assumed to be an arbitrary function of the quantization noise without transgressing orthogonality as in the Costa’s construction. Also, this case is restricted to the structured codebooks. The fundamental trade-off is proved between security and robustness of Generalized SCS (GSCS) in the KMA scenario. Based on this trade-off and practical security attack on SCS, a new extension of SCS is proposed which is called Surjective-SCS (SSCS). In the absence of robustness attack, the SSCS has more security than SCS in the same DWR. However, the SSCS achieves more security and robustness than SCS only in low Watermark to Noise Ratio (WNR) regime or low rate communications.
S. Khosroazad, N. Neda, H. Farrokhi,
Volume 12, Issue 3 (9-2016)
Abstract

Physical-layer network coding (PLNC) has the ability to drastically improve the throughput of multi-source wireless communication systems. In this paper, we focus on the problem of channel tracking in a Decode-and-Forward (DF) OFDM PLNC system. We proposed a Kalman Filter-based algorithm for tracking the frequency/time fading channel in this system. Tracking of the channel is performed in the time domain while data detection is implemented in the frequency domain. As an important advantage, this approach does not need for training of some subcarriers in every OFDM symbols and this, results in higher throughput, compared to other methods. High accuracy, no phase ambiguity, and stability in fast fading conditions are some other advantages of this approach.


M. Monemizadeh, H. Fehri, Gh. Abed Hodtani, S. Hajizadeh,
Volume 16, Issue 2 (6-2020)
Abstract

Communication in the presence of a priori known interference at the encoder has gained great interest because of its many practical applications. In this paper, additive exponential noise channel with additive exponential interference (AENC-AEI) known non-causally at the transmitter is introduced as a new variant of such communication scenarios. First, it is shown that the additive Gaussian channel with a priori known interference at the encoder when the transmitter suffers from a fast-varying phase noise can be modeled by the AENC-AEI. Then, capacity bounds for this channel under a non-negativity constraint as well as a mean value constraint on input are derived. Finally, it is shown both analytically and numerically that the upper and lower bounds coincide at high signal to noise ratios (SNRs), and therefore, the capacity of the AENC-AEI at high SNRs is obtained. Interestingly, this high SNR-capacity has a simple closed-form expression and is independent of the interference mean, analogous to its Gaussian counterpart.

M. H. Adhami, R. Ghazizadeh,
Volume 19, Issue 1 (3-2023)
Abstract

A novel hybrid method for tracking multiple indistinguishable maneuvering targets using a wireless sensor network is introduced in this paper. The problem of tracking the location of targets is formulated as a Maximum Likelihood Estimation. We propose a hybrid optimization method, which consists of an iterative and a heuristic search method, for finding the location of targets simultaneously. The Levenberg-Marquardt (LM) algorithm is used for iterative search, while the Particle Swarm Optimization (PSO) is used for the heuristic search. We use the maximum sensors separating distance-grouping algorithm (G-MSSD), which was introduced in our previous work, to generate initial guesses for search algorithms. The estimates of both methods are compared and the best one is selected as the final estimation. We demonstrate the accuracy and performance of our new tracking method via simulations and compare our results with the Gauss-Newton (GN) method.

A. Rezapour, Z. Ahmadian,
Volume 19, Issue 1 (3-2023)
Abstract

Shamir’s secret sharing scheme is one of the substantial threshold primitives, based on which many security protocols are constructed such as group authentication schemes. Notwithstanding the unconditional security of Shamir's secret sharing scheme, protocols that are designed based on this scheme do not necessarily inherit this property. In this work, we evaluate the security of a lightweight group authentication scheme, introduced for IoT networks in IEEE IoT Journal in 2020, and prove its weakness against the linear subspace attack, which is a recently-proposed cryptanalytical method for secret sharing-based schemes. Then, we propose an efficient and attack-resistant group authentication protocol for IoT networks.

A. O. Akande, F. A. Semire, Z. K. Adeyemo, C. K. Agubor,
Volume 19, Issue 2 (6-2023)
Abstract

The quality of signal at a particular location is essential to determine the performance of mobile system. The problem of poor network in Lagos, Nigeria needs to be addressed especially now that the attention is toward online learning and meetings. Existing empirical Path Loss (PL) models designed elsewhere are not appropriate for predicting the 4G Long-Term Evolution (LTE) signal in Nigeria. This research developed a modified Okumura-Hata model in 4G network. The Okumura-Hata model being the closest to the measured values was modified using the PL exponent. The modified model was enhanced by Gravitational Search Algorithm (GSA). The measured data, modified and existing models were simulated using MATLAB R2018a software. Root Mean Square (RMSE) was used to evaluate the performance modified and existing and models. The result showed that Enhanced GSA model outperformed the existing models. The study successfully developed a modified PL model for LTE in Lagos, Nigeria. Therefore, modified model will be a good model in network planning for voice and fast online data connection in 4G LTE network.

Mohamed Khalaf, Ahmed Fawzi, Ahmed Yahya,
Volume 20, Issue 1 (3-2024)
Abstract

Cognitive radio (CR) is an effective technique for dealing with scarcity in spectrum resources and enhancing overall spectrum utilization. CR attempts to enhance spectrum sensing by detecting the primary user (PU) and allowing the secondary user (SU) to utilize the spectrum holes. The rapid growth of CR technology increases the required standards for Spectrum Sensing (SS) performance, especially in regions with low Signal-to-Noise Ratios (SNRs). In Cognitive Radio Networks (CRN), SS is an essential process for detecting the available spectrum. SS is divided into sensing time and transmission time; the more the sensing time, the higher the detection probability) and the lower the probability of a false alarm). So, this paper proposes a novel two-stage SS optimization model for CR systems. The proposed model consists of two techniques: Interval Dependent De-noising (IDD) and Energy Detection (ED), which achieve optimum sensing time, maximum throughput, lower and higher. The Simulation results demonstrated that the proposed model decreases the, achieves a higher especially at low SNRs ranging, and obtains the optimum sensing time, achieving maximum throughput at different numbers of sensing samples (N) and different SNRs from -10 to -20 dB in the case of N = 1000 to 10000 samples. The proposed model achieves a throughput of 5.418 and 1.98 Bits/Sec/HZ at an optimum sensing time of 0.5ms and 1.5ms respectively, when N increases from 10000 to 100000 samples. The proposed model yields an achievable throughput of 5.37 and 4.58 Bits/Sec/HZ at an optimum sensing time of 1.66ms and 13ms respectively. So, it enhances the SS process than previous related techniques.
Tasqiatul Qulbi Kamila Huda, I Gede Puja Astawa, Yoedy Moegiharto, Mohamad Ridwan, Budi Aswoyo, Anang Budikarso, Ida Anisah, Faridatun Nadziroh,
Volume 20, Issue 1 (3-2024)
Abstract

The progress of 5G networks is propelled by wireless technology, specifically mobile internet and smart devices. This article provides an in-depth analysis of the fundamental elements of 5G technology, encompassing the advancement of cellular networks, simultaneous transmission capabilities, energy efficiency enhancements, and the implementation of cooperative communication. This study examines the application of simultaneous wireless information and power transfer (SWIPT) in cooperative device-to-devices (D2D) communication. Specifically, it investigates relay selection using decode-forward (DF) protocols and considers the issue of self-interference. Radio frequency based energy harvesting (RF-EH) is proposed to address power limitations in device-to-device (D2D) communication. This article describes the development of this technology and suggests a system architecture that employs time-switching relaying (TSR) techniques to enhance the power efficiency of base stations. This research aims to assess data transfer efficiency in two-way cooperative communication systems by incorporating many technologies.
Ramin Safaeian, Mahmoud Tabandeh ,
Volume 20, Issue 2 (6-2024)
Abstract

Directed Acyclic Graphs stand as one of the prevailing approaches for representing causal relationships within a set of variables. With observational or interventional data, certain undirected edges within a causal DAG can be oriented. Performing intervention can be done in two different settings, passive and active. Here, we prove that an optimal intervention set can be obtained based on the minimum vertex cover of a graph. We propose an algorithm that efficiently identifies such an optimal intervention set for chordal graphs within polynomial time. Performing intervention on this optimal set recovers all the undirected edges in graph G, regardless of the underlying ground truth DAG. Furthermore, we present an algorithm for evaluating the performance of passive algorithms. This evaluation provides insights into how many intervention steps of a specific algorithm are required to recover all edges in the causal graph for any possible underlying ground truth in the equivalence class. Experimental findings underscore that the number of nodes in the optimal intervention set increases with growing the number of nodes in a graph, where the edge density is fixed, and also increases with the rising edge density in a graph with a fixed number of nodes.

Shivanand Konade, Manoj Dongre,
Volume 20, Issue 2 (6-2024)
Abstract

The proposed research presents a two-port compact Multiple Input Multiple Output (MIMO) antenna for Ultra-Wide Band (UWB) applications. The designed antenna has two identical radiators and has an overall dimension of 20 × 44.1 × 1.6mm3 on a FR4 substrate. The designed antenna is fed by a 50-microstrip line. Extended F-shaped stubs are introduced in the shared ground plane of the proposed antenna to produce high isolation between the MIMO antenna elements. Extended F-shaped stubs are introduced in the ground plane to produce multiple resonance and high isolation between the radiating elements. The antenna offers good impedance matching in the UWB band.  The proposed antenna has lower isolation < -25 dB and Envelope Correlation Coefficient (ECC) < 0.015 from 3.1 to 10.6 GHz. Antenna parameters are evaluated in term of return loss, ECC, Diversity Gain (DG), gain, Total active reflection coefficient (TRAC) radiation pattern and isolation. The proposed antenna is tested and fabricated. However, obtained results are good agreement which make suitable for UWB wearable applications.
Godday Biowei, Sulaiman Adeniyi Adekola, Kamoli Akinwale Amusa,
Volume 20, Issue 3 (9-2024)
Abstract

Presented in this paper is an evaluation of human tissue penetration by millimeter wave (mmW) energy, particularly at 30, 35, 40 and 45 GHz. Numerical simulations show that the penetration depths in the tissue are (0.1000, 0.0937, 0.08869 and 0.08882) mm at the aforementioned frequency, respectively. It is also demonstrated that all mmW at those frequencies attenuate to zero at the epidermis which is the layer adjacent to the skin surface, without getting into the dermis which is the next layer. Crucially, these discoveries present fresh, previously unmentioned data within the current research literature. Furthermore, at the lower frequency of 24 GHz, computer simulations presented show that the propagating wave penetrates deeper (depth of 0.12 mm) and attenuates to zero at the dermis. This shows that the depth of penetration increases further at lower frequencies which strongly conforms to the principles of physical reasoning, thereby bolstering the reliability of the findings presented in this paper. The results collectively indicate that the absorption of mmW into the human tissue have limited significance when assessing compliance with electromagnetic field standards at mmW frequencies. It is reinforced in this paper why the human skin reduces the harmful effects of ultra-violet radiation.  To lend credence to our formulation, certain aspects of the results obtained in this investigation when compared with similar results in the literature, show good agreements.

Page 1 from 1     

Creative Commons License
© 2022 by the authors. Licensee IUST, Tehran, Iran. This is an open access journal distributed under the terms and conditions of the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) license.