99 research outputs found

    Effective Planning and Analysis of Huawei and Cisco Routers for MPLS Network Design Using Fast Reroute Protection

    Get PDF
    This chapter deals with a description of the MPLS traffic engineering technology behavior on two heterogeneous, but nowadays the most commonly used network vendors are Cisco and Huawei. Compatibility and functionality between network devices Huawei and Cisco were verified by testing the appropriate network topology. In this topology, we mainly focused on the useful feature of MPLS TE called Fast Reroute (FRR) protection. It provides link protection, node protection and also bandwidth protection during the failure of the primary link, especially on backbone networks. After successful validation, compatibility and functionality of the network topology between the heterogeneous routers using the Fast Reroute protection will be possible to use this MPLS TE application in the real networks

    Secrecy performance analysis on spatial modeling of wireless communications with unmanned aerial vehicle and ground devices

    Get PDF
    In this paper, the secrecy performance of the spatial modeling for ground devices with randomly placed eavesdroppers when an unmanned aerial vehicle (UAV) acted as two hops decode and forward (DF) was investigated. We characterize the secrecy outage probability (SOP) and intercept probability (IP) expressions. Our capacity performance analysis is based on the Rayleigh fading distributions. After analytical results by Monte Carlo simulation, and the Gauss-Chebyshev parameter was selected to yield a close approximation, the results demonstrate the SOP with the average signal-to-noise ratio (SNR) between UAV and ground users among the eavesdroppers and the IP relationship with the ability to intercept the information of the ground users successfully

    Throughput analysis of non-orthogonal multiple access and orthogonal multiple access assisted wireless energy harvesting K-hop relaying networks

    Get PDF
    This study introduces the non-orthogonal multiple access (NOMA) technique into the wireless energy harvesting K-hop relay network to increase throughput. The relays have no dedicated energy source and thus depend on energy harvested by wireless from a power beacon (PB). Recently, NOMA has been promoted as a technology with the potential to enhance connectivity, reduce latency, increase fairness amongst users, and raise spectral effectiveness compared to orthogonal multiple access (OMA) technology. For performance considerations, we derive exact throughput expressions for NOMA and OMA-assisted multi-hop relaying and compare the performance between the two. The obtained results are validated via Monte Carlo simulations

    On the Performance of Power Beacon-Assisted D2D Communications in the Presence of Multi-Jammers and Eavesdropper

    Get PDF
    In this work, we investigate the performance analysis of a device-to-device (D2D) communication network under an eavesdropper E attack. Besides, we assume that E is located in the proximal region where it can overhear the information from the source S. Specifically, S transmits information to the destination D, adopting the power beacon's energy to surmount the limited energy budget. Moreover, to reduce the quality of the eavesdropping link, the cooperative jamming technique can be used, where the multi-friendly jammers are employed to generate the artificial noises to E continuously. As considering the above presentation, we derive the quality of system analysis in terms of the outage probability (OP), intercept probability (IP), and secrecy outage probability (SOP) of the proposed system model. Finally, the Monte-Carlo simulations are performed to corroborate the exactness of the mathematical analysis.This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited

    System Performance Analysis of Half-Duplex Relay Network over Rician Fading Channel

    Get PDF
    In this paper, the system performance of an amplify-and-forward (AF) relaying network over Rician Fading Channel is proposed, analyzed and demonstrated. For details this analysis, the energy and information are transferred from the source to the relay nodes by two methods: 1) time switching protocol and 2) power splitting protocol. Firstly, due to the constraint of the wireless energy harvesting at the relay node, the analytical mathematical expressions of the achievable throughput and the outage probability of both schemes were proposed and demonstrated. After that, the effect of various system parameters on the system performance is rigorously studied with closed-form expressions for the system performance. Finally, the analytical results are also demonstrated by Monte-Carlo simulation in comparison with the closed-form expressions. The numerical results demonstrated the effect of various system parameters, such as energy harvesting time, power splitting ratio, source transmission to noise power, and the threshold value, on the system performance of AF wireless relay nodes. The results show that the analytical mathematical and simulated results match for all possible parameter values for both schemes

    Design of Emotion Recognition System

    Get PDF
    The chapter deals with a speech emotion recognition system as a complex solution including a Czech speech database of emotion samples in a form of short sound records and the tool evaluating database samples by using subjective methods. The chapter also involves individual components of an emotion recognition system and shortly describes their functions. In order to create the database of emotion samples for learning and training of emotional classifier, it was necessary to extract short sound recordings from radio and TV broadcastings. In the second step, all records in emotion database were evaluated using our designed evaluation tool and results were automatically evaluated how they are credible and reliable and how they represent different states of emotions. As a result, three final databases were formed. The chapter also describes the idea of new potential model of a complex emotion recognition system as a whole unit

    An Evolutionary Algorithm to Mine High-Utility Itemsets

    Get PDF
    High-utility itemset mining (HUIM) is a critical issue in recent years since it can be used to reveal the profitable products by considering both the quantity and profit factors instead of frequent itemset mining (FIM) of association rules (ARs). In this paper, an evolutionary algorithm is presented to efficiently mine high-utility itemsets (HUIs) based on the binary particle swarm optimization. A maximal pattern (MP)-tree strcutrue is further designed to solve the combinational problem in the evolution process. Substantial experiments on real-life datasets show that the proposed binary PSO-based algorithm has better results compared to the state-of-the-art GA-based algorith

    A Survey on Electromagnetic Interferences on Aircraft Avionics Systems and a GSM On Board System Overview

    Get PDF
    ABSTRACT Recent years have been characterized by an increase in the air traffic. More attention over micro-economic and macroeconomic indexes would be strategic to gather and enhance the safety of a flight and customer needing, for communicating by wireless handhelds on-board aircrafts. Thus, European Telecommunications Standards Institute (ETSI) proposed a GSM On Board (GSMOBA) system as a possible solution, allowing mobile terminals to communicate through GSM system on aircraft, avoiding electromagnetic interferences with radio components aboard. The main issues are directly related with interferences that could spring-out when mobile terminals attempt to connect to ground BTS, from the airplane. This kind of system is able to resolve the problem in terms of conformance of Effective Isotropic Radiated Power (EIRP) limits, defined outside the aircraft, by using an On board BTS (OBTS) and modeling the relevant key RF parameters on the air. The main purpose of this work is to illustrate the state-of-the-art of literature and previous studies about the problem, giving also a good detail of technical and normative references
    corecore