3 research outputs found

    Throughput, Spectral, and Energy Efficiency of 5G Massive MIMO Applications Using Different Linear Precoding Schemes

    Get PDF
    — A promising massive multiple input multiple output (M-MIMO) system is required to meet the growing need for highly traffic data, highly-resolution of streaming video, and intelligent communication on the fifth-generation wireless networks (5G). M-MIMO systems are essential for the optimization of the trade between energy efficiency (EE), throughput (R), and spectral _efficiency (SE) in wireless 5G networks. M-MIMO system architecture is proposed in this paper to enhance the trade-off between energy efficiency and uplink and downlink throughput at the optimum EE. Furthermore, using linear precoding techniques such as M MMSE, RZF, ZF, and MR, the EE-SE trade-off is optimized for uplink and downlink (M-MIMO) systems. The analysis of simulation results proved that throughput (R) is enhanced by increasing the number of antennas at optimum EE. After that, the proposed trading scheme is optimized and improved using M_MMSE compared to RZF, ZF. Finally, the results prove that M_MMSE gives the optimum trade-off between EE and R at the proved optimum ratio between the number of active antennas and the number of active users UE

    REVIEWING AND APPLYING SECURITY SERVICES WITH NON-ENGLISH LETTER CODING TO SECURE SOFTWARE APPLICATIONS IN LIGHT OF SOFTWARE TRADE-OFFS

    No full text
    Important software applications need to be secured by choosing the suitable security services. In this paper, a shopper program is designed and implemented using VB.NET to follow up the movement of goods in the store and the shopping place. The program uses five files to store: the passwords, the information of goods in the store and the shopping place. A literature review is carried out to collect the information system and software trade-offs. The applied security services are then analyzed in light of these trade-offs. For security purposes, files and folders are hidden and files are set to ReadOnly. The files' contents are encrypted by applying XOR operation with a random key generator. The file's contents are hashed and signed by the user to protect the integrity and authenticity of the files' contents. The applied security services do not result in much complexity and thus it does not affect the system resources. The program usability is easy to handle. The software is not freely available and in case of hunting a copy, it would be hard to run it without disclosing the needed keys. Applying the Arabic letter coding adds more credit to the program usability and availability
    corecore