62 research outputs found
Recommended from our members
Power aware routing algorithms (PARA) in wireless mesh networks for emergency management
Wireless Mesh Networks (WMNs) integrate the advantages of WLANs and mobile Ad Hoc networks, which have become the key techniques of next-generation wireless networks in the context of emergency recovery. Wireless Mesh Networks (WMNs) are multi-hop wireless networks with instant deployment, self-healing, self-organization and self-configuration features. These capabilities make WMNs a promising technology for incident and emergency communication. An incident area network (IAN) needs a reliable and lively routing path during disaster recovery and emergency response operations when infrastructure-based communications and power resources have been destroyed and no routes are available. Power aware routing plays a significant role in WMNs, in order to provide continuous efficient emergency services. The existing power aware routing algorithms used in wireless networks cannot fully fit the characteristics of WMNs, to be used for emergency recovery. This paper proposes a power aware routing algorithm (PARA) for WMNs, which selects optimal paths to send packets, mainly based on the power level of next node along the path. This algorithm was implemented and tested in a proven simulator. The analytic results show that the proposed power node-type aware routing algorithm metric can clearly improve the network performance by reducing the network overheads and maintaining a high delivery ratio with low latency
Towards green energy for smart cities: particle swarm optimization based MPPT approach
This paper proposes an improved one-power-point (OPP) maximum power point tracking (MPPT) algorithm for wind energy conversion system (WECS) to overcome the problems of the conventional OPP MPPT algorithm, namely, the difficulty in getting a precise value of the optimum coefficient, requiring pre-knowledge of system parameters, and non-uniqueness of the optimum curve. The solution is based on combining the particle swarm optimization (PSO) and optimum-relation-based (ORB) MPPT algorithms. The PSO MPPT algorithm is used to search for the optimum coefficient. Once the optimum coefficient is obtained, the proposed algorithm switches to the ORB MPPT mode of operation. The proposed algorithm neither requires knowledge of system parameters nor mechanical sensors. In addition, it improves the efficiency of the WECS. The proposed algorithm is studied for two different wind speed profiles, and its tracking performance is compared with conventional optimum torque control (OTC) and conventional ORB MPPT algorithms under identical conditions. The improved performance of the algorithm in terms of tracking efficiency is validated through simulation using MATLAB/Simulink. The simulation results confirm that the proposed algorithm has a better performance in terms of tracking efficiency and energy extracted. The tracking efficiency of the PSO-ORB MPPT algorithm could reach up to 99.4% with 1.9% more harvested electrical energy than the conventional OTC and ORB MPPT algorithms. Experiments have been carried out to demonstrate the validity of the proposed MPPT algorithm. The experimental results compare well with system simulation results, and the proposed algorithm performs well, as expected
Nearmesh: network environment aware routing in a wireless mesh network for emergency-response
Wireless Mesh Networks (WMNs) employ hybrid distributed mobile networks with instant deployment and capabilities Such as: self_healing, self_organization and self_configuration. These abilities make WMNs a likely technology for incident communication. An Incident Area Network (IAN) requires a reliable and efficient routing path in an environment, where infrastructure-based communications have been destroyed. Routing awareness plays a significant part in this situation to deliver dynamic disaster facilities. Though, most of the proposed aware routing schemes do not entirely exploit the characteristics of WMNs. In this article, we propose a network environment-aware routing scheme for emergency response (NEARMesh) in WMNs, which employs a network routing information map to select the optimized path, based on cooperative consideration of route awareness information. This scheme is carried out and verified in NCTNus simulator. Imitation outcomes clearly display that the suggested scheme can enhance the network performance by maintaining a high delivery ratio with low latency while reducing the energy ingesting by minimizing network expenses
Recommended from our members
Ensemble methods for instance-based Arabic language authorship attribution
The Authorship Attribution (AA) is considered as a subfield of authorship analysis and it is an important problem as the range of anonymous information increased with fast growing of internet usage worldwide. In other languages such as English, Spanish and Chinese, such issue is quite well studied. However, in Arabic language, the AA problem has received less attention from the research community due to complexity and nature of Arabic sentences. The paper presented an intensive review on previous studies for Arabic language. Based on that, this study has employed the Technique for Order Preferences by Similarity to Ideal Solution (TOPSIS) method to choose the base classifier of the ensemble methods. In terms of attribution features, hundreds of stylometric features and distinct words using several tools have been extracted. Then, Adaboost and Bagging ensemble methods have been applied on Arabic enquires (Fatwa) dataset. The findings showed an improvement of the effectiveness of the authorship attribution task in the Arabic language
Millimeter wave propagation measurements and characteristics for 5G system
In future 5G systems, the millimeter wave (mmWave) band will be used to support a large capacity for current mobile broadband. Therefore, the radio access technology (RAT) should be made available for 5G devices to help in distinct situations, for example device-to-device communications (D2D) and multi-hops. This paper presents ultra-wideband channel measurements for millimeter wave bands at 19, 28, and 38 GHz. We used an ultra-wideband channel sounder (1 GHz bandwidth) in an indoor to outdoor (I2O) environment for non-line-of-sight (NLOS) scenarios. In an NLOS environment, there is no direct path (line of sight), and all of the contributed paths are received from different physical objects by refection propagation phenomena. Hence, in this work, a directional horn antenna (high gain) was used at the transmitter, while an omnidirectional antenna was used at the receiver to collect the radio signals from all directions. The path loss and temporal dispersion were examined based on the acquired measurement data—the 5G propagation characteristics. Two different path loss models were used, namely close-in (CI) free space reference distance and alpha-beta-gamma (ABG) models. The time dispersion parameters were provided based on a mean excess delay, a root mean square (RMS) delay spread, and a maximum excess delay. The path loss exponent for this NLOS specific environment was found to be low for all of the proposed frequencies, and the RMS delay spread values were less than 30 ns for all of the measured frequencies, and the average RMS delay spread values were 19.2, 19.3, and 20.3 ns for 19, 28, and 38 GHz frequencies, respectively. Moreover, the mean excess delay values were found also at 26.1, 25.8, and 27.3 ns for 19, 28, and 38 GHz frequencies, respectively. The propagation signal through the NLOS channel at 19, 28, and 38 GHz was strong with a low delay; it is concluded that these bands are reliable for 5G systems in short-range applications
A pseudo feedback-based annotated TF-IDF technique for dynamic crypto-ransomware pre-encryption boundary delineation and features extraction
The cryptography employed against user files makes the effect of crypto-ransomware attacks irreversible even after detection and removal. Thus, detecting such attacks early, i.e. during pre-encryption phase before the encryption takes place is necessary. Existing crypto-ransomware early detection solutions use a fixed time-based thresholding approach to determine the pre-encryption phase boundaries. However, the fixed time thresholding approach implies that all samples start the encryption at the same time. Such assumption does not necessarily hold for all samples as the time for the main sabotage to start varies among different crypto-ransomware families due to the obfuscation techniques employed by the malware to change its attack strategies and evade detection, which generates different attack behaviors. Additionally, the lack of sufficient data at the early phases of the attack adversely affects the ability of feature extraction techniques in early detection models to perceive the characteristics of the attacks, which, consequently, decreases the detection accuracy. Therefore, this paper proposes a Dynamic Pre-encryption Boundary Delineation and Feature Extraction (DPBD-FE) scheme that determines the boundary of the pre-encryption phase, from which the features are extracted and selected more accurately. Unlike the fixed thresholding employed by the extant works, DPBD-FE tracks the pre-encryption phase for each instance individually based on the first occurrence of any cryptography-related APIs. Then, an annotated Term Frequency-Inverse Document Frequency (aTF-IDF) technique was utilized to extract the features from runtime data generated during the pre-encryption phase of crypto-ransomware attacks. The aTF-IDF overcomes the challenge of insufficient attack patterns during the early phases of the attack lifecycle. The experimental evaluation shows that DPBD-FE was able to determine the pre-encryption boundaries and extract the features related to this phase more accurately compared to related works
Survey of millimeter-wave propagation measurements and models in indoor environments
The millimeter-wave (mmWave) is expected to deliver a huge bandwidth to address the future demands for higher data rate transmissions. However, one of the major challenges in the mmWave band is the increase in signal loss as the operating frequency increases. This has attracted several research interests both from academia and the industry for indoor and outdoor mmWave operations. This paper focuses on the works that have been carried out in the study of the mmWave channel measurement in indoor environments. A survey of the measurement techniques, prominent path loss models, analysis of path loss and delay spread for mmWave in different indoor environments is presented. This covers the mmWave frequencies from 28 GHz to 100 GHz that have been considered in the last two decades. In addition, the possible future trends for the mmWave indoor propagation studies and measurements have been discussed. These include the critical indoor environment, the roles of artificial intelligence, channel characterization for indoor devices, reconfigurable intelligent surfaces, and mmWave for 6G systems. This survey can help engineers and researchers to plan, design, and optimize reliable 5G wireless indoor networks. It will also motivate the researchers and engineering communities towards finding a better outcome in the future trends of the mmWave indoor wireless network for 6G systems and beyond
Hybrid and multifaceted context-aware misbehavior detection model for vehicular ad hoc network
Vehicular Ad Hoc Networks (VANETs) have emerged mainly to improve road safety and traffic efficiency and provide user comfort. The performance of such networks’ applications relies on the availability of accurate and recent mobility-information shared among vehicles. This means that misbehaving vehicles that share false mobility information can lead to catastrophic losses of life and property. However, the current solutions proposed to detect misbehaving vehicles are not able to cope with the dynamic vehicular context and the diverse cyber-threats, leading to a decrease in detection accuracy and an increase in false alarms. This paper addresses these issues by proposing a Hybrid and Multifaceted Context-aware Misbehavior Detection model (HCA-MDS), which consists of four phases: data-collection, context-representation, context-reference construction, and misbehavior detection. Data-centric and behavioral-detection-based features are derived to represent the vehicular context. An online and timely updated context-reference model is built using unsupervised nonparametric statistical methods, namely Kalman and Hampel filters, through analyzing the temporal and spatial correlation of the consistency between mobility information to adapt to the highly dynamic vehicular context. Vehicles’ behaviors are evaluated locally and autonomously according to the consistency, plausibility, and reliability of their mobility information. The results from extensive simulations show that HCA-MDS outperforms existing solutions in increasing the detection rate by 38% and decreasing the false positive rate by 7%. These results demonstrate the effectiveness and robustness of the proposed HCA-MDS model to strengthen the security of VANET applications and protocols
Non-cooperative power control game in D2D underlying networks with variant system conditions
In this paper, the problem of power control using a game theoretic approach based on sigmoid cost function is studied for device-to-device (D2D) communications underlying cellular networks. A non-cooperative game, where each D2D transmitter and a cellular user select their own transmit power level independently, is analyzed to minimize their user-serving cost function and achieve a target signal to interference-plus-noise-ratio (SINR) requirement. It is proved analytically that the Nash equilibrium point of the game exists and it is unique under certain constraints. Numerical results verify the analysis and demonstrate the effectiveness of the proposed game with variant system conditions, such as path loss exponents, target SINR, interference caused by the cellular user, pricing coefficients, and sigmoid control parameter
Recommended from our members
Masked face recognition using deep learning: a review
A large number of intelligent models for masked face recognition (MFR) has been recently presented and applied in various fields, such as masked face tracking for people safety or secure authentication. Exceptional hazards such as pandemics and frauds have noticeably accelerated the abundance of relevant algorithm creation and sharing, which has introduced new challenges. Therefore, recognizing and authenticating people wearing masks will be a long-established research area, and more efficient methods are needed for real-time MFR. Machine learning has made progress in MFR and has significantly facilitated the intelligent process of detecting and authenticating persons with occluded faces. This survey organizes and reviews the recent works developed for MFR based on deep learning techniques, providing insights and thorough discussion on the development pipeline of MFR systems. State-of-the-art techniques are introduced according to the characteristics of deep network architectures and deep feature extraction strategies. The common benchmarking datasets and evaluation metrics used in the field of MFR are also discussed. Many challenges and promising research directions are highlighted. This comprehensive study considers a wide variety of recent approaches and achievements, aiming to shape a global view of the field of MFR
- …