12 research outputs found

    Wireless Network Security: Challenges, Threats and Solutions. A Critical Review

    Get PDF
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It was found that attackers (hackers) have different mechanisms to attack the networks through bypassing the security trap developed by organizations and they may use one weak pint to attack the whole network of an organization. However the author suggested using firewall in each wireless access point as the counter measure to protect data of the whole organization not to be attacked

    Status of Big Data In Internet of Things: A Comprehensive Overview

    Get PDF
    Abstract: Reports suggests that total amount of data generated everyday reaches 2.5 quintillion bytes [9], annual global IP traffic run rate in 2016 was 1.2 zettabytes and will reach 3.3 zettabytes by 2021 [12]. According to Gartner [25], Internet of Things excluding personal computers, tablets and smartphones will grow to 26 billion units of installed devices in year 2020. This results from penetration of digital applications which highly motivated by smart societies which can be defined as to when a society deploys light and advanced computer technologies to aid provision and or supply chain value of social, cultural, governance and economic utilities for efficiency. Smart society is equipped with mobile, ubiquitous computing facilities, sensors and cyber-physical systems aims at exploring economies of scale; and to large extent it has been made possible with Internet of Things (IoT). This survey paper discusses status of big data in Internet of Things; how IoT generates big data, nature of data generated and dynamics in IoT as influenced by big data

    Yagi-Uda Antenna Gain Improvement for Enhanced Reception of DVB-T2 Signals

    Get PDF
    Yagi-Uda Antenna is a widely used roof top DVB-T2 receiver antenna due to its high forward gain capability, low cost and ease in construction. In Tanzania, there have been some complaints which were logged to Tanzania Communications Regulatory Authority (TCRA) by the customers on the poor reception of DVB-T2 signals which may be caused by signal degradation. In this paper we propose enhancement of the gain of the Yagi antenna so as to improve the reception signals of the DVB-T2. This will help solve those complaints. It is well known that the increase in radiation pattern causes the increase in directivity and hence gain which will have an impact on good quality of reception for DVB-T2 signals coming from the transmitter. After carefully design and simulation in FEKO simulating software by adding the number of director elements and making some adjustments on the length and spacing between the elements, we managed to increase the gain of the antenna by 4.7dB. This is significant improvement of the quality of received signals. Keywords: DVB-T2, Yagi Uda antenna, Set Top Box (STB), antenna gain, Directivity, Wavelength, Electric field strength, Signal reception, Radiation pattern

    PERFORMANCE EVALUATION OF DVB-T2 BROADCASTING NETWORK: A CASE STUDY OF DAR ES SALAAM, TANZANIA

    Get PDF
    DVB-T2 is the second generation of the digital terrestrial television broadcasting system which transmits composite (compressed digital audio and video) signal and other data in an MPEG-4 transport stream, using coded orthogonal frequency-division multiplexing (COFDM or OFDM) modulation. DVB-T2 uses multiple MPEG-4 transport streams and have enhanced FEC and higher QAM (256-QAM) constellations. Tanzania switched from analogue to Digital Video Broadcasting Terrestrial second generation (DVB-T2) in 2013, since the official switching there has been complaints from the DVB-T2 users on the coverage and quality of service provided. In this paper we evaluated the DVB-T2 performance and make the recommendations on the ways to optimize the performance. Through measurements it has been observed that, the quality of coverage in some areas (locations) is poor, so to improve the received signal strength coverage and quality we recommend the use of enhanced Yagi-Uda antenna gain which is going to be designed. Keywords: DVB-T2, Received Signal Strength Indicator (RSSI), Bit Error Rate (BER), Carrier to Noise Ratio (CNR), Modulation Error Rate (MER), Polarization, Yagi-Uda antenna

    A Survey on Idea Mining: Techniques and Application

    Get PDF
    Abstract: Idea mining is an interesting field in the area of information retrieval and it is increasingly becoming important asset for decision makers. Huge volumes of high quality data from various sources such as scanners, mobile phones, loyalty cards, the web, and social media platforms presents enormous opportunity for organization to achieve success in their businesses. It is possible to achieve this by properly analysing data to reveal feature patterns; hence decision makers can capitalize upon the resulting ideas from wealth of information available. Idea mining helps managers to use their time efficiently by grasping ideas from a huge amount of unstructured data with text mining, instead of reading through page by page, it also helps to avoid the danger of overlooking data with useful ideas. The main objective of this survey article is to provide assessment on a number of successful text mining and text classification tools combined with idea mining measures to extract the idea from texts

    A Review Paper on Scope of Big Data Analysis in Heath Informatics

    Get PDF
    Abstract— The term Health Informatics represent a huge volume of data that is collected from different source of health sector. Because of its’ diversity in nature, quite a big number of attributes, numerous amount data, health informatics can be considered as Big Data. Therefore, different techniques used for analyzing Big Data will also fit for Health Informatics. In recent years, implementation of Data Mining on Health Informatics brings a lot of fruitful outcomes that improve the overall healthcare system both in analyzing disease and improving healthcare services which eventually reduce expenses. This paper will define the term the health informatics with a detail discussion about different source of heath informatics. Finally, some case study will be illustrated as examples where data mining techniques are applied to produce more efficient, in depth outcomes in analyzing disease

    Analysis of the Impact of Electromagnetic Radiations from Cell Phones on Male Sperm Infertility

    No full text
    Research Article published International Journal of Scientific and Research Publications, Volume 3, Issue 11, November 2013Tanzania telecommunication sector has witnessed fast growth in the number of mobile telephone users now served by seven cellular operators. Until February 2012, there were about 26 million mobile phone subscribers served by more than 4,000 base stations spread all over the country. Despite the many advantages brought by these systems, there is increased public concern over possible adverse health effects due to electromagnetic fields (EMF) radiated by these equipments. This paper aimed to analyze the impact of the electromagnetic radiations from cellular phones to male sperm infertility. The cellular phones with operating frequency of 900MHz and operating frequency 1800MHz were placed at a certain distance near the male reproductive organ (testis) and then electromagnetic wave radiated by the phone were analyzed by measuring the SAR of the testis. It was concluded that there is significant impact on the male sperm fertility on the exposure of the male reproductive organ to the radiations from the cellular phones at the specified operating frequencies near the testis. Several recommendations has been provided, that radiating devices should not be placed on the male pocket trouser for storage and also making calls while the cell phone is in pocket trouser (ie using headphones to receive or make a call) should be completely avoided
    corecore