Pub Date : 2023-11-13DOI: 10.24425/ijet.2023.147700
— The Non Line of Sight (NLOS) broadband wireless access provided by Worldwide Interoperability for Microwave Access (WiMAX) operating in 2-11 GHz frequency is susceptible to the effects of multipath propagation, diffraction fading, vegetation attenuation, shadowing loss etc. In order to overcome these effects effective fade mitigation techniques, have to be implemented. The Orthogonal Frequency Division Multiplexing-Multiple Input Multiple Output (OFDM-MIMO) is an efficient method that helps in combatting the fading and providing higher SNR to the WiMAX system. According to the IEEE 802.16 specification, for QPSK modulation, a threshold SNR of 6 dB is required for the link to operate. In the present work the use of OFDM-MIMO achieves a SNR above this operating threshold.
{"title":"147700","authors":"","doi":"10.24425/ijet.2023.147700","DOIUrl":"https://doi.org/10.24425/ijet.2023.147700","url":null,"abstract":"— The Non Line of Sight (NLOS) broadband wireless access provided by Worldwide Interoperability for Microwave Access (WiMAX) operating in 2-11 GHz frequency is susceptible to the effects of multipath propagation, diffraction fading, vegetation attenuation, shadowing loss etc. In order to overcome these effects effective fade mitigation techniques, have to be implemented. The Orthogonal Frequency Division Multiplexing-Multiple Input Multiple Output (OFDM-MIMO) is an efficient method that helps in combatting the fading and providing higher SNR to the WiMAX system. According to the IEEE 802.16 specification, for QPSK modulation, a threshold SNR of 6 dB is required for the link to operate. In the present work the use of OFDM-MIMO achieves a SNR above this operating threshold.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":"54 26","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-13DOI: 10.24425/ijet.2023.147692
— The paper deals with alliances and coalitions that can be formed by agents or entities. It is assumed that alliance agents cooperate and form coalitions for performing the tasks or missions. It is considered that alliance agents are unselfish. That is, they are more interested in achieving the common goal(s) than in getting personal benefits. In the paper, the concept of fuzzy alliance was introduced. A fuzzy alliance is considered as generalization of traditional alliance allowing agents to decide on the capabilities that their agents can and wanted deliver to coalition. Coalitions that can be formed by fuzzy alliance agents were considered. The definition of the “best” coalition was explained. The method of how to find the “best” coalition among all possible coalitions was suggested and verified by computer simulation.
{"title":"147692","authors":"","doi":"10.24425/ijet.2023.147692","DOIUrl":"https://doi.org/10.24425/ijet.2023.147692","url":null,"abstract":"— The paper deals with alliances and coalitions that can be formed by agents or entities. It is assumed that alliance agents cooperate and form coalitions for performing the tasks or missions. It is considered that alliance agents are unselfish. That is, they are more interested in achieving the common goal(s) than in getting personal benefits. In the paper, the concept of fuzzy alliance was introduced. A fuzzy alliance is considered as generalization of traditional alliance allowing agents to decide on the capabilities that their agents can and wanted deliver to coalition. Coalitions that can be formed by fuzzy alliance agents were considered. The definition of the “best” coalition was explained. The method of how to find the “best” coalition among all possible coalitions was suggested and verified by computer simulation.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":"54 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-13DOI: 10.24425/ijet.2023.147696
— This research proposed a model of Enhanced Distributed Channel Access (EDCA) scheme which is one of the techniques used in reducing collision and usually prioritized due to its contention window to determine the impact of distance change on the IEEE 802.11 ah standard. The proposed model was analyzed using the Markov Chain approach to determine the effect of distance change on collisions levels while the numerical were simulated using MATLAB. Moreover, the Markov chain solution was used to evaluate parameters such as throughput, energy consumption, and delay. The results showed the increment in RAW slot duration and the distance change for each station can reduce the performance on the standard and the scenario when the RAW slot duration was changed by 50 ms performed better than 100 ms and 250 ms.
{"title":"Analytical Study of the Distance Change on IEEE 802.11ah Standard using Markov Chain Model","authors":"","doi":"10.24425/ijet.2023.147696","DOIUrl":"https://doi.org/10.24425/ijet.2023.147696","url":null,"abstract":"— This research proposed a model of Enhanced Distributed Channel Access (EDCA) scheme which is one of the techniques used in reducing collision and usually prioritized due to its contention window to determine the impact of distance change on the IEEE 802.11 ah standard. The proposed model was analyzed using the Markov Chain approach to determine the effect of distance change on collisions levels while the numerical were simulated using MATLAB. Moreover, the Markov chain solution was used to evaluate parameters such as throughput, energy consumption, and delay. The results showed the increment in RAW slot duration and the distance change for each station can reduce the performance on the standard and the scenario when the RAW slot duration was changed by 50 ms performed better than 100 ms and 250 ms.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":"12 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-13DOI: 10.24425/ijet.2023.146518
— IP scheduled throughput defined according to 3GPP TS 36.314 reflects user throughput regardless of traffic characteristics, and therefore has become one of the most important indicators for monitoring Quality of Service (QoS) of the end user in Evolved Universal Terrestrial Radio Access Network (E-UTRAN). However, networks built on a distributed architecture make the above definition impossible to be applied directly due to the implementation challenges. This paper gives an overview of the classical Long Term Evolution (LTE) architecture as opposed to Dual Connectivity (DC) topology and focuses on a novel method of solving the calculation issue with the IP scheduled throughput measurement in edge computing environment. Experimental results show a good agreement with the real end user perception.
{"title":"146518","authors":"","doi":"10.24425/ijet.2023.146518","DOIUrl":"https://doi.org/10.24425/ijet.2023.146518","url":null,"abstract":"— IP scheduled throughput defined according to 3GPP TS 36.314 reflects user throughput regardless of traffic characteristics, and therefore has become one of the most important indicators for monitoring Quality of Service (QoS) of the end user in Evolved Universal Terrestrial Radio Access Network (E-UTRAN). However, networks built on a distributed architecture make the above definition impossible to be applied directly due to the implementation challenges. This paper gives an overview of the classical Long Term Evolution (LTE) architecture as opposed to Dual Connectivity (DC) topology and focuses on a novel method of solving the calculation issue with the IP scheduled throughput measurement in edge computing environment. Experimental results show a good agreement with the real end user perception.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":"54 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-13DOI: 10.24425/ijet.2023.147704
—This research investigates the intricacies of X.509 certificates within a comprehensive corporate infrastructure. Spanning over two decades, the examined enterprise has heavily depended on its internal certificate authority and Public Key Infrastructure (PKI) to uphold its data and systems security. With the broad application of these certificates, from personal identification on smart cards to device and workstation authentication via Trusted Platform Modules (TPM), our study seeks to address a pertinent question on how prevalent are weak RSA keys within such a vast internal certificate repository. Previous research focused primarily on key sets publicly accessible from TLS and SSH servers or PGP key repositories. On the contrary, our investigation provides insights into the private domain of an enterprise, introducing new dimensions to this problem. Among our considerations are the trustworthiness of hardware and software solutions in generating keys and the consequential implications of identified vulnerabilities on organizational risk management. The obtained results can contribute to enhancing security strategies in enterprises.
{"title":"RSA Keys Quality in a Real-world Organizational Certificate Dataset: a Practical Outlook","authors":"","doi":"10.24425/ijet.2023.147704","DOIUrl":"https://doi.org/10.24425/ijet.2023.147704","url":null,"abstract":"—This research investigates the intricacies of X.509 certificates within a comprehensive corporate infrastructure. Spanning over two decades, the examined enterprise has heavily depended on its internal certificate authority and Public Key Infrastructure (PKI) to uphold its data and systems security. With the broad application of these certificates, from personal identification on smart cards to device and workstation authentication via Trusted Platform Modules (TPM), our study seeks to address a pertinent question on how prevalent are weak RSA keys within such a vast internal certificate repository. Previous research focused primarily on key sets publicly accessible from TLS and SSH servers or PGP key repositories. On the contrary, our investigation provides insights into the private domain of an enterprise, introducing new dimensions to this problem. Among our considerations are the trustworthiness of hardware and software solutions in generating keys and the consequential implications of identified vulnerabilities on organizational risk management. The obtained results can contribute to enhancing security strategies in enterprises.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":"11 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-13DOI: 10.24425/ijet.2023.147691
— A hardware-software system has been implemented to monitor the environmental state (EnvState) at the site of railway (RY) accidents and disasters. The proposed hardware-software system consists of several main components. The first software component, based on the queueing theory (QT), simulates the workload of emergency response units at the RY accident site. It also interacts with a central data processing server and information collection devices. A transmitter for these devices was built on the ATmega328 microcontroller. The hardware part of the environmental monitoring system at the RY accident site is also based on the ATmega328 microcontroller. In the hardware-software system for monitoring the EnvState at the RY accident site, the data processing server receives information via the MQTT protocol from all devices about the state of each sensor and the device's location at the RY accident or disaster site, accompanied by EnvState contamination. All data is periodically recorded in a database on the server in the appropriate format with timestamps. The obtained information can then be used by specialists from the emergency response headquarters.
{"title":"Hardware-Software Complex for Predicting the Development of an Ecologically Hazardous Emergency Situation on the Railway","authors":"","doi":"10.24425/ijet.2023.147691","DOIUrl":"https://doi.org/10.24425/ijet.2023.147691","url":null,"abstract":"— A hardware-software system has been implemented to monitor the environmental state (EnvState) at the site of railway (RY) accidents and disasters. The proposed hardware-software system consists of several main components. The first software component, based on the queueing theory (QT), simulates the workload of emergency response units at the RY accident site. It also interacts with a central data processing server and information collection devices. A transmitter for these devices was built on the ATmega328 microcontroller. The hardware part of the environmental monitoring system at the RY accident site is also based on the ATmega328 microcontroller. In the hardware-software system for monitoring the EnvState at the RY accident site, the data processing server receives information via the MQTT protocol from all devices about the state of each sensor and the device's location at the RY accident or disaster site, accompanied by EnvState contamination. All data is periodically recorded in a database on the server in the appropriate format with timestamps. The obtained information can then be used by specialists from the emergency response headquarters.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":"10 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-13DOI: 10.24425/ijet.2023.147702
--Multicarrier modulation (MCM) based schemes have been a major contributing factor in revolutionizing cellular networks due to their ability to overcome fading. One of the popular scheme orthogonal frequency division multiple access (OFDMA), having been part of 4G, is also adapted as part of 5G enhanced mobile broadband (eMBB). Though it has several advantages, spectral efficiency (SE) and peak to average power ratio (PAPR) have been two major concerns which have attracted lot of attention resulting in proposals of several other MCM schemes. But most of these studies have treated the two issues independently. This paper in particular studies the subcarrier filtering approach to improve the spectral efficiency of MCM scheme and its impact on the overall PAPR of such schemes. The analysis shows that the PAPR improvement is also achieved by such filters meant for spectral confinement and the simulation results validate the same provoking.
{"title":"Subcarrier Filtering For Spectrally Efficient Multicarrier Modulation Schemes and Its Impact on PAPR: A Unified Approach","authors":"","doi":"10.24425/ijet.2023.147702","DOIUrl":"https://doi.org/10.24425/ijet.2023.147702","url":null,"abstract":"--Multicarrier modulation (MCM) based schemes have been a major contributing factor in revolutionizing cellular networks due to their ability to overcome fading. One of the popular scheme orthogonal frequency division multiple access (OFDMA), having been part of 4G, is also adapted as part of 5G enhanced mobile broadband (eMBB). Though it has several advantages, spectral efficiency (SE) and peak to average power ratio (PAPR) have been two major concerns which have attracted lot of attention resulting in proposals of several other MCM schemes. But most of these studies have treated the two issues independently. This paper in particular studies the subcarrier filtering approach to improve the spectral efficiency of MCM scheme and its impact on the overall PAPR of such schemes. The analysis shows that the PAPR improvement is also achieved by such filters meant for spectral confinement and the simulation results validate the same provoking.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":"16 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-13DOI: 10.24425/ijet.2023.147686
— This Article presented the study of a single pacth antenna and array patch antenna. We will focus on the design based on a small size at a resonant frequency of 30GHz. using the software CST Microwave Studio (FEM method) and ADS software (Moments method) to find internal parameters (S... parameters, bandwidth ,VSWR) and external characteristics (gain, directivity and radiation pattern, efficiencies) . To increase the total gain of the antenna and to have a wider bandwidth band width and taking advantage of the functionality of the radiation overlap of several elements radiating in the same direction, we suggest the second and most important step to design a most important step to design an antenna array grouping patches identical to our first patch antenna proposed in first patch antenna proposed in the first step
{"title":"A 30 GHz Slotted Bow-Tie Rectangular Patch Antenna Design for 5G Application","authors":"","doi":"10.24425/ijet.2023.147686","DOIUrl":"https://doi.org/10.24425/ijet.2023.147686","url":null,"abstract":"— This Article presented the study of a single pacth antenna and array patch antenna. We will focus on the design based on a small size at a resonant frequency of 30GHz. using the software CST Microwave Studio (FEM method) and ADS software (Moments method) to find internal parameters (S... parameters, bandwidth ,VSWR) and external characteristics (gain, directivity and radiation pattern, efficiencies) . To increase the total gain of the antenna and to have a wider bandwidth band width and taking advantage of the functionality of the radiation overlap of several elements radiating in the same direction, we suggest the second and most important step to design a most important step to design an antenna array grouping patches identical to our first patch antenna proposed in first patch antenna proposed in the first step","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":"15 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-13DOI: 10.24425/ijet.2023.147689
— Faster R-CNN is an algorithm development that continuously starts from CNN then R-CNN and Faster R-CNN. The development of the algorithm is needed to test whether the heuristic algorithm has optimal provisions. Broadly speaking, faster R-CNN is included in algorithms that are able to solve neural network and machine learning problems to detect a moving object. One of the moving objects in the current phenomenon is the use of masks. Where various countries in the world have issued endemic orations after the Covid 19 pandemic occurred. Detection tool has been prepared that has been tested at the mandatory mask door, namely for mask users. In this paper, the role of the Faster R-CNN algorithm has been carried out to detect masks poured on Internet of Thinks (IoT) devices to automatically open doors for standard mask users. From the results received that testing on the detection of moving mask objects when used reaches 100% optimal at a distance of 0.5 to 1 meter and 95% at a distance of 1.5 to 2 meters so that the process of sending detection signals to IoT devices can be carried out at a distance of 1 meter at the position mask users to automatic doors.
{"title":"The Role of Faster R-CNN Algorithm in the Internet of Things to Detect Mask Wearing: The Endemic Preparations","authors":"","doi":"10.24425/ijet.2023.147689","DOIUrl":"https://doi.org/10.24425/ijet.2023.147689","url":null,"abstract":"— Faster R-CNN is an algorithm development that continuously starts from CNN then R-CNN and Faster R-CNN. The development of the algorithm is needed to test whether the heuristic algorithm has optimal provisions. Broadly speaking, faster R-CNN is included in algorithms that are able to solve neural network and machine learning problems to detect a moving object. One of the moving objects in the current phenomenon is the use of masks. Where various countries in the world have issued endemic orations after the Covid 19 pandemic occurred. Detection tool has been prepared that has been tested at the mandatory mask door, namely for mask users. In this paper, the role of the Faster R-CNN algorithm has been carried out to detect masks poured on Internet of Thinks (IoT) devices to automatically open doors for standard mask users. From the results received that testing on the detection of moving mask objects when used reaches 100% optimal at a distance of 0.5 to 1 meter and 95% at a distance of 1.5 to 2 meters so that the process of sending detection signals to IoT devices can be carried out at a distance of 1 meter at the position mask users to automatic doors.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-13DOI: 10.24425/ijet.2023.147701
{"title":"QIBMRMN: Design of a Q-Learning based Iterative sleep-scheduling & hybrid Bioinspired Multipath Routing model for Multimedia Networks","authors":"","doi":"10.24425/ijet.2023.147701","DOIUrl":"https://doi.org/10.24425/ijet.2023.147701","url":null,"abstract":"","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":"12 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}