Pub Date : 2021-11-11DOI: 10.1109/cits52676.2021.9618021
Riya Kakkar, Rajesh Gupta, M. Obaidat, S. Tanwar
This paper proposes a blockchain-based secure energy trading platform for electric vehicles (EVs) in a smart grid platform. EVs can be either prosumer (generates and consumes energy) or consumer. The proposed system mainly focuses on securing the energy demand data of EVs. It employs sixth-generation (6G) as a communication network that ensures ultra-low latency, high reliability, and scalable communication. We employed a multiple linear regression (MLR) model to analyze the energy demand data and predict EV energy consumption. Smart grid optimizes the energy for EVs that maximizes the profit for both prosumer and consumer EVs. The performance analysis of the proposed system with the 6G is evaluated by comparing it with the traditional 5G and 4G networks. Various performance metrics that have been considered for assessing the proposed scheme are latency, scalability, and profit for EVs. The performance results and analysis show that the proposed system is reliable, secure, and cost-efficient for both EVs compared to traditional energy trading systems.
{"title":"Blockchain and Multiple Linear Regression-based Energy Trading Scheme for Electric Vehicles","authors":"Riya Kakkar, Rajesh Gupta, M. Obaidat, S. Tanwar","doi":"10.1109/cits52676.2021.9618021","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618021","url":null,"abstract":"This paper proposes a blockchain-based secure energy trading platform for electric vehicles (EVs) in a smart grid platform. EVs can be either prosumer (generates and consumes energy) or consumer. The proposed system mainly focuses on securing the energy demand data of EVs. It employs sixth-generation (6G) as a communication network that ensures ultra-low latency, high reliability, and scalable communication. We employed a multiple linear regression (MLR) model to analyze the energy demand data and predict EV energy consumption. Smart grid optimizes the energy for EVs that maximizes the profit for both prosumer and consumer EVs. The performance analysis of the proposed system with the 6G is evaluated by comparing it with the traditional 5G and 4G networks. Various performance metrics that have been considered for assessing the proposed scheme are latency, scalability, and profit for EVs. The performance results and analysis show that the proposed system is reliable, secure, and cost-efficient for both EVs compared to traditional energy trading systems.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115709058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-11DOI: 10.1109/cits52676.2021.9618460
B. Kumar, S. K. Dhurandher, M. Obaidat
The world has seen revolutionary changes in the area of communication. Nowadays, communication is the very important part of everyone’s life. It has changes the way we live, talk, move, think, commerce, study and so on. Wireless radio spectrum is the backbone of this entire scintillating structure. Static allocation of radio spectrum has resulted not only in the scarcity of the availability of spectrum bands, but also the under utilization of the available bandwidth as well. Cognitive radio is envisioned as the panacea for this scarcity. The protection of primary users is vital when secondary users use the licensed spectrum bands. Overlay and underlay are the two main approaches being used in the area of cognitive radio networks. Modern research has proven that none of them alone is good enough for achieving the purpose of desirable spectral efficiency. A hybrid approach is required for taking the full benefit of the opportunities generated, due to the behavioural pattern of the primary users. In this article, we use a Markov based model for maximum utilization of available spectrum bands. This article provides a performance analysis of three different access strategies namely Overlay, Underlay, and Hybrid access methods on several network parameters including the primary user (PU) arrival rate, achieved throughput for secondary users, sensing time (sensing interval), and the consumption of energy by the secondary users during the process of data transmission. OMNeT++ simulator is used for the analysis purpose. Our analysis reveals that adopting a hybrid access strategy is more preferable for better spectrum utilization.
{"title":"Performance Analysis of the Spectrum Access Strategies in Cognitive Radio Networks","authors":"B. Kumar, S. K. Dhurandher, M. Obaidat","doi":"10.1109/cits52676.2021.9618460","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618460","url":null,"abstract":"The world has seen revolutionary changes in the area of communication. Nowadays, communication is the very important part of everyone’s life. It has changes the way we live, talk, move, think, commerce, study and so on. Wireless radio spectrum is the backbone of this entire scintillating structure. Static allocation of radio spectrum has resulted not only in the scarcity of the availability of spectrum bands, but also the under utilization of the available bandwidth as well. Cognitive radio is envisioned as the panacea for this scarcity. The protection of primary users is vital when secondary users use the licensed spectrum bands. Overlay and underlay are the two main approaches being used in the area of cognitive radio networks. Modern research has proven that none of them alone is good enough for achieving the purpose of desirable spectral efficiency. A hybrid approach is required for taking the full benefit of the opportunities generated, due to the behavioural pattern of the primary users. In this article, we use a Markov based model for maximum utilization of available spectrum bands. This article provides a performance analysis of three different access strategies namely Overlay, Underlay, and Hybrid access methods on several network parameters including the primary user (PU) arrival rate, achieved throughput for secondary users, sensing time (sensing interval), and the consumption of energy by the secondary users during the process of data transmission. OMNeT++ simulator is used for the analysis purpose. Our analysis reveals that adopting a hybrid access strategy is more preferable for better spectrum utilization.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127077829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-11DOI: 10.1109/cits52676.2021.9618576
Kübra Sevim, T. Tuğcu
The wide variety of new opportunities offered by 5G, together with the very large number of mobile devices, imposes significant challenges in network operation. Network slicing provides efficient operation of the network under these conditions by separating the slices. However, scalable and flexible approaches are required to allow for the dynamic load of the network. Network slicing is the concept of having multiple isolated virtual networks on top of the same physical infrastructure. As the result of fluctuations (due to mobility or varying offered traffic), a UE may be subject to handover between cells. The selection of the UE and the corresponding service base station (BS) may hamper utilization if the UE undergoing handover cannot be offered the same slice capacities by the destination BS. In this paper, we propose handover to increase the utilization of the radio resources by selecting the UEs that undergo handover according to the required services for each slice and the availability of those slices at the destination BS. We develop an optimization problem to optimize the radio resources and propose three heuristics to reach similar results in considerably low computing times. We simulate the results of the algorithms and show that our heuristics can present solutions close to the optimal within a short time frame.
{"title":"Handover with Network Slicing in 5G Networks","authors":"Kübra Sevim, T. Tuğcu","doi":"10.1109/cits52676.2021.9618576","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618576","url":null,"abstract":"The wide variety of new opportunities offered by 5G, together with the very large number of mobile devices, imposes significant challenges in network operation. Network slicing provides efficient operation of the network under these conditions by separating the slices. However, scalable and flexible approaches are required to allow for the dynamic load of the network. Network slicing is the concept of having multiple isolated virtual networks on top of the same physical infrastructure. As the result of fluctuations (due to mobility or varying offered traffic), a UE may be subject to handover between cells. The selection of the UE and the corresponding service base station (BS) may hamper utilization if the UE undergoing handover cannot be offered the same slice capacities by the destination BS. In this paper, we propose handover to increase the utilization of the radio resources by selecting the UEs that undergo handover according to the required services for each slice and the availability of those slices at the destination BS. We develop an optimization problem to optimize the radio resources and propose three heuristics to reach similar results in considerably low computing times. We simulate the results of the algorithms and show that our heuristics can present solutions close to the optimal within a short time frame.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116725920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-11DOI: 10.1109/cits52676.2021.9618355
Athanasios Tsakmakis, A. Valkanis, G. Beletsioti, Konstantinos F. Kantelis, Petros Nicopolitidis, Georgios I. Papadimitriou
LoRaWAN is one of the most promising standards for IoT applications. Slotted ALOHA has been proposed as a LoRaWAN MAC protocol, to achieve performance improvement. This paper explores the effect of using clusters in a multichannel Slotted ALOHA-based LoRaWAN network, for event detection, like forest fires, where a small part of the network nodes, at the pace of the event, produce data at a high rate. It proposes a new frequency planning for such environments, that aims to reduce the number of collisions, and consequently to reduce the mean packet delay, as the data is important to be transmitted as fast as possible. Extensive simulation results indicate a promising performance improvement in terms of throughput and mean packet delay, compared to a random frequency channel assignment to the network nodes.
{"title":"Efficient Frequency Planning for LoRaWAN networks with urgent traffic","authors":"Athanasios Tsakmakis, A. Valkanis, G. Beletsioti, Konstantinos F. Kantelis, Petros Nicopolitidis, Georgios I. Papadimitriou","doi":"10.1109/cits52676.2021.9618355","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618355","url":null,"abstract":"LoRaWAN is one of the most promising standards for IoT applications. Slotted ALOHA has been proposed as a LoRaWAN MAC protocol, to achieve performance improvement. This paper explores the effect of using clusters in a multichannel Slotted ALOHA-based LoRaWAN network, for event detection, like forest fires, where a small part of the network nodes, at the pace of the event, produce data at a high rate. It proposes a new frequency planning for such environments, that aims to reduce the number of collisions, and consequently to reduce the mean packet delay, as the data is important to be transmitted as fast as possible. Extensive simulation results indicate a promising performance improvement in terms of throughput and mean packet delay, compared to a random frequency channel assignment to the network nodes.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125743942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-11DOI: 10.1109/cits52676.2021.9618349
{"title":"2021 CITS Obituary","authors":"","doi":"10.1109/cits52676.2021.9618349","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618349","url":null,"abstract":"","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128818651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-11DOI: 10.1109/cits52676.2021.9618476
P. Lagakis, S. Demetriadis
This paper critically reviews the recently published scientific literature on the task of Automated Essay Scoring (AES), by examining the various systems and approaches used. Automated Essay Scoring, which is the process of automating the evaluation of answers to open-ended questions, most usually in educational settings, by utilizing NLP techniques, gathers an increasing amount of interest, due to its potential applications both commercially and as part of the learn-ing process. The focus of this paper is to analyze the most popular approaches in recently published AES systems, categorize the systems with respect to certain characteristics in their design, the datasets that they use and the evaluation schemas that are used to evaluate them, and finally discuss the recent trends and challenges of the field of AES.
{"title":"Automated essay scoring: A review of the field","authors":"P. Lagakis, S. Demetriadis","doi":"10.1109/cits52676.2021.9618476","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618476","url":null,"abstract":"This paper critically reviews the recently published scientific literature on the task of Automated Essay Scoring (AES), by examining the various systems and approaches used. Automated Essay Scoring, which is the process of automating the evaluation of answers to open-ended questions, most usually in educational settings, by utilizing NLP techniques, gathers an increasing amount of interest, due to its potential applications both commercially and as part of the learn-ing process. The focus of this paper is to analyze the most popular approaches in recently published AES systems, categorize the systems with respect to certain characteristics in their design, the datasets that they use and the evaluation schemas that are used to evaluate them, and finally discuss the recent trends and challenges of the field of AES.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124232164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-11DOI: 10.1109/cits52676.2021.9618445
D. Gupta, Krittibas Parai, M. Obaidat, S. H. Islam
In this modern era, the need for key agreement protocols equipped with high-speed Internet has become necessary in information/network security. An authenticated key agreement (AKA) protocol is a technique that negotiates a secret session key among various users in a network and is used in many scenarios like mutual authentication, data integrity, and many more. The current state-of-the-art include many AKA protocols that are either vulnerable to different attacks or incur massive communication and computational costs. This paper proposes an identity-based three-party authenticated key agreement (ID-3PAKA) protocol using elliptic curve cryptography (ECC). The proposed ID-3PAKA protocol generates a shared secret session key among three users. The security of the proposed ID-3PAKA protocol relies on the hardness assumption of the ECDLP and the CDH problems. The proposed ID-3PAKA protocol is safe against active and passive attacks, which is proved through the simulation of the OFMC and Cl-AtS back-ends of the AVISPA tool.
{"title":"Efficient and Secure Design of ID-3PAKA Protocol Using ECC","authors":"D. Gupta, Krittibas Parai, M. Obaidat, S. H. Islam","doi":"10.1109/cits52676.2021.9618445","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618445","url":null,"abstract":"In this modern era, the need for key agreement protocols equipped with high-speed Internet has become necessary in information/network security. An authenticated key agreement (AKA) protocol is a technique that negotiates a secret session key among various users in a network and is used in many scenarios like mutual authentication, data integrity, and many more. The current state-of-the-art include many AKA protocols that are either vulnerable to different attacks or incur massive communication and computational costs. This paper proposes an identity-based three-party authenticated key agreement (ID-3PAKA) protocol using elliptic curve cryptography (ECC). The proposed ID-3PAKA protocol generates a shared secret session key among three users. The security of the proposed ID-3PAKA protocol relies on the hardness assumption of the ECDLP and the CDH problems. The proposed ID-3PAKA protocol is safe against active and passive attacks, which is proved through the simulation of the OFMC and Cl-AtS back-ends of the AVISPA tool.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124347737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-11DOI: 10.1109/cits52676.2021.9618605
Salah Berra, M. Albreem, Maha Malek, R. Dinis, Xingwang Li, Khaled Maaiuf Rabie
In massive multiple-input multiple-output (MIMO) systems, although the performance of maximum likelihood (ML) is the optimum, it introduces extremely high computational complexity, while minimum mean square error (MMSE) receivers can achieve quasi-optimal performance. Unfortunately, it requires a matrix inverse which increases the computational complexity in high loaded environments. Several methods have been proposed to avoid the matrix inversion such as the accelerated over relaxation (AOR). In the AOR algorithm, the initial solution and the optimum parameters have a great impact on the performance, computational complexity, and the convergence rate. In this paper, a detector based on AOR and a stair matrix is proposed to iteratively avoid the inverse of equalization matrix and expediting the convergence rate. In order to obtain high performance and low complexity, suitable schemes for the selection relaxation and acceleration parameters are also proposed. Numerical results show that the computational complexity of the proposed AOR approach is dramatically reduced from $mathcal{O}left( {{K^3}} right)$ to $mathcal{O}left( {{K^2}} right)$ where K is the number of users. It is also shown that the proposed detection algorithm outperforms the Neumann series method and achieves a quasi-optimal performance with a relatively small number of iterations.
{"title":"A Low-Complexity Soft-Output Signal Data Detection Algorithm for UL Massive MIMO Systems","authors":"Salah Berra, M. Albreem, Maha Malek, R. Dinis, Xingwang Li, Khaled Maaiuf Rabie","doi":"10.1109/cits52676.2021.9618605","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618605","url":null,"abstract":"In massive multiple-input multiple-output (MIMO) systems, although the performance of maximum likelihood (ML) is the optimum, it introduces extremely high computational complexity, while minimum mean square error (MMSE) receivers can achieve quasi-optimal performance. Unfortunately, it requires a matrix inverse which increases the computational complexity in high loaded environments. Several methods have been proposed to avoid the matrix inversion such as the accelerated over relaxation (AOR). In the AOR algorithm, the initial solution and the optimum parameters have a great impact on the performance, computational complexity, and the convergence rate. In this paper, a detector based on AOR and a stair matrix is proposed to iteratively avoid the inverse of equalization matrix and expediting the convergence rate. In order to obtain high performance and low complexity, suitable schemes for the selection relaxation and acceleration parameters are also proposed. Numerical results show that the computational complexity of the proposed AOR approach is dramatically reduced from $mathcal{O}left( {{K^3}} right)$ to $mathcal{O}left( {{K^2}} right)$ where K is the number of users. It is also shown that the proposed detection algorithm outperforms the Neumann series method and achieves a quasi-optimal performance with a relatively small number of iterations.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120891339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-11DOI: 10.1109/cits52676.2021.9617928
Basima Kurungadan, A. Abdrabou
Most Smart city initiatives embrace WiFi as the candidate technology for its ubiquitous coverage and cost-effectiveness. Nevertheless, the quality-of-service (QoS) requirements of different applications vary, hindering the applicability of some smart city services. This paper addresses the usage of software-defined networking ( SDN) to control the traffic load of WiFi access points constituting a city-wide coverage. The traffic load control aims to satisfy the packet delay requirements of smart city applications without the need of having special requirements on the WiFi nodes such as running a software agent, sending probe packets, or supporting specific roaming protocol. A traffic load control algorithm is developed and tested using hardware experiments performed in a practical setting that mimics the actual scenario. The performance results show that the developed algorithm is effective in maintaining low packet transfer delay.
{"title":"A Software-defined Delay-aware Traffic Load Control for WiFi-based Smart City Services","authors":"Basima Kurungadan, A. Abdrabou","doi":"10.1109/cits52676.2021.9617928","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9617928","url":null,"abstract":"Most Smart city initiatives embrace WiFi as the candidate technology for its ubiquitous coverage and cost-effectiveness. Nevertheless, the quality-of-service (QoS) requirements of different applications vary, hindering the applicability of some smart city services. This paper addresses the usage of software-defined networking ( SDN) to control the traffic load of WiFi access points constituting a city-wide coverage. The traffic load control aims to satisfy the packet delay requirements of smart city applications without the need of having special requirements on the WiFi nodes such as running a software agent, sending probe packets, or supporting specific roaming protocol. A traffic load control algorithm is developed and tested using hardware experiments performed in a practical setting that mimics the actual scenario. The performance results show that the developed algorithm is effective in maintaining low packet transfer delay.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115642792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-11DOI: 10.1109/cits52676.2021.9618011
Mircea Stanic
Ionosphere’s variability largely influences the reliability and the stability of high frequency communications. Approaching this topic, the present paper proposes a passive sounding technique able to evaluate narrowband radio channels based on spectral digital signal processing methods. To this end, the study employs two freely available KiwiSDR receivers, thus encouraging a discussion on the potential that the online SDR infrastructure has in relation to ionosphere enquires. The experimental results, derived out of roughly 48 hours of sounding, are ultimately used to determine the degree of conformity of a proprietary analytical model developed previously.
{"title":"Comparisons Between an Oblique Ionosphere Sounding Technique Based on KiwiSDR Receivers and a Proprietary Analytical Propagation Model","authors":"Mircea Stanic","doi":"10.1109/cits52676.2021.9618011","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618011","url":null,"abstract":"Ionosphere’s variability largely influences the reliability and the stability of high frequency communications. Approaching this topic, the present paper proposes a passive sounding technique able to evaluate narrowband radio channels based on spectral digital signal processing methods. To this end, the study employs two freely available KiwiSDR receivers, thus encouraging a discussion on the potential that the online SDR infrastructure has in relation to ionosphere enquires. The experimental results, derived out of roughly 48 hours of sounding, are ultimately used to determine the degree of conformity of a proprietary analytical model developed previously.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124951148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}