Pub Date : 2019-01-01DOI: 10.1109/IBCAST.2019.8667223
B. Zia, Hafiz Sana Ullah Butt
Landing gear strut is one of the critical structural members of an aircraft which sustains impact loads during take-off, taxi and landing phase. So its strength characteristics and dynamic response play an important role in the overall functionality and performance of aircraft. This paper presents the dynamic response of a composite strut of landing gear against different impact velocities. For this purpose, a strut assembly was analyzed using ANSYS LSDYNA software. Velocities were imparted to strut through two lumped masses which represent the total weight of aircraft. The dynamic response of strut was determined in the form of acceleration "g's" at aircraft and a comparison was established among all load cases of impact velocities.
{"title":"Dynamic Response of a Composite Strut of Landing Gear of an Aircraft against Impact Velocity","authors":"B. Zia, Hafiz Sana Ullah Butt","doi":"10.1109/IBCAST.2019.8667223","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667223","url":null,"abstract":"Landing gear strut is one of the critical structural members of an aircraft which sustains impact loads during take-off, taxi and landing phase. So its strength characteristics and dynamic response play an important role in the overall functionality and performance of aircraft. This paper presents the dynamic response of a composite strut of landing gear against different impact velocities. For this purpose, a strut assembly was analyzed using ANSYS LSDYNA software. Velocities were imparted to strut through two lumped masses which represent the total weight of aircraft. The dynamic response of strut was determined in the form of acceleration \"g's\" at aircraft and a comparison was established among all load cases of impact velocities.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131831469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/IBCAST.2019.8667205
F. Gulzar, Y. Butt
This paper reports a novel approach for a microstrip based parallel line coupler designed at centre frequency of 16 GHz. The design is based on analytical computations and is simulated in Serenade Harmonica and validated experimentally. For experimental validation, a prototype was fabricated and tested using network analyzer. An issue of less spacing between parallel lines was identified and solved in a distinguished way i.e., by optimizing the shape ratios for the best response. Fabrication was done on GML substrate with thickness of 30 mils (0.762 mm) having relative permittivity of 3.2. Response of manufactured device was recorded over a 1.6 GHz bandwidth (10% of centre frequency) for its implementation at narrowband reception channel with required coupling of -11.5 dB. Experimental results of manufactured device were found in good agreement with simulation results in terms of coupling factor and S-Parameters. Device technology developed is found precise, simple and cheap, and is suitable for mass production.
{"title":"Design and Manufacturing of Ku Band Coupler","authors":"F. Gulzar, Y. Butt","doi":"10.1109/IBCAST.2019.8667205","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667205","url":null,"abstract":"This paper reports a novel approach for a microstrip based parallel line coupler designed at centre frequency of 16 GHz. The design is based on analytical computations and is simulated in Serenade Harmonica and validated experimentally. For experimental validation, a prototype was fabricated and tested using network analyzer. An issue of less spacing between parallel lines was identified and solved in a distinguished way i.e., by optimizing the shape ratios for the best response. Fabrication was done on GML substrate with thickness of 30 mils (0.762 mm) having relative permittivity of 3.2. Response of manufactured device was recorded over a 1.6 GHz bandwidth (10% of centre frequency) for its implementation at narrowband reception channel with required coupling of -11.5 dB. Experimental results of manufactured device were found in good agreement with simulation results in terms of coupling factor and S-Parameters. Device technology developed is found precise, simple and cheap, and is suitable for mass production.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129056381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/IBCAST.2019.8667217
M. Hamza, M. Atique-ur-Rehman, Hamza Shafqat, Subhan Bin Khalid
In this research work we have developed a platform to remotely control a surveillance robot over internet. It will enable us to monitor the activities in the remote and sensitive areas. In traditional security systems, fixed locations are used for monitoring and spying purposes. For such cases, our robotic system is mobile and it can go into those areas where human access is risky, impossible or not suitable and provide us with the footage of those locations. The camera mounted on the robot keeps on capturing the video. This live video from robot will be streamed on web page and it will be used for both surveillance and controlling the robot movement accordingly. The movement algorithm of the robot is implemented using CGI scripts and the monitoring is done by utilizing the MJPG video streamer. The aim is to control the robot from anywhere in the world via web page and to make the delay time as little as possible. The proposed system has a great potential to be used commercially due to its efficient response, vast applications and economical value.
{"title":"CGI SCRIPT AND MJPG VIDEO STREAMER BASED SURVEILLANCE ROBOT USING RASPBERRY PI","authors":"M. Hamza, M. Atique-ur-Rehman, Hamza Shafqat, Subhan Bin Khalid","doi":"10.1109/IBCAST.2019.8667217","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667217","url":null,"abstract":"In this research work we have developed a platform to remotely control a surveillance robot over internet. It will enable us to monitor the activities in the remote and sensitive areas. In traditional security systems, fixed locations are used for monitoring and spying purposes. For such cases, our robotic system is mobile and it can go into those areas where human access is risky, impossible or not suitable and provide us with the footage of those locations. The camera mounted on the robot keeps on capturing the video. This live video from robot will be streamed on web page and it will be used for both surveillance and controlling the robot movement accordingly. The movement algorithm of the robot is implemented using CGI scripts and the monitoring is done by utilizing the MJPG video streamer. The aim is to control the robot from anywhere in the world via web page and to make the delay time as little as possible. The proposed system has a great potential to be used commercially due to its efficient response, vast applications and economical value.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121024653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/IBCAST.2019.8667119
M. A. Munir, A. R. Maud
Jamming attacks can limit the availability of wireless networks and can lead to significant re-transmissions and increased power consumption. Over the past decades DSSS has been utilized to consolidate jamming-resistant communication. Such a system is relatively immune to jamming interference when the spreading sequence is unknown to the jammer. However, the cyclostationary behavior of the spreading sequence can be exploited by the jammer to identify the spreading sequence and hence completely jam the system. In this paper, a DSSS system using variable spreading sequence is proposed. The proposed system uses a shared secret key with appropriate ciphers like AES for selection of variable spreading sequence. Each bit is spread by a different spreading sequence resulting in jamming immunity. In addition, the proposed system uses a coarse time and date based plaintext after regular intervals to achieve synchronization between transmitter and receiver. Simulation results show the synchronization and bit error rate performance of the proposed system in the presence of different types of jammers.
{"title":"Direct-Sequence Spread Spectrum with Variable Spreading Sequence for Jamming Immunity","authors":"M. A. Munir, A. R. Maud","doi":"10.1109/IBCAST.2019.8667119","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667119","url":null,"abstract":"Jamming attacks can limit the availability of wireless networks and can lead to significant re-transmissions and increased power consumption. Over the past decades DSSS has been utilized to consolidate jamming-resistant communication. Such a system is relatively immune to jamming interference when the spreading sequence is unknown to the jammer. However, the cyclostationary behavior of the spreading sequence can be exploited by the jammer to identify the spreading sequence and hence completely jam the system. In this paper, a DSSS system using variable spreading sequence is proposed. The proposed system uses a shared secret key with appropriate ciphers like AES for selection of variable spreading sequence. Each bit is spread by a different spreading sequence resulting in jamming immunity. In addition, the proposed system uses a coarse time and date based plaintext after regular intervals to achieve synchronization between transmitter and receiver. Simulation results show the synchronization and bit error rate performance of the proposed system in the presence of different types of jammers.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/IBCAST.2019.8667183
A. Jalal, M. A. K. Quaid, M. A. Sidduqi
Health industry off late has been driven heavily by sensors i.e. accelerometers, magnetometers etc. which has allowed instant medical response to any injurious activity in an indoor/outdoor environment. Among the medical applications of accelerometers, fitness systems have used this component extensively but it still holds prominent room for deployment in an ambient smart home system to monitor daily life. In this paper, a novel accelerometer-based motion recognition system using statistical features have been proposed. Axial components of accelerometer have been processed statistically to produce discriminating features values from each activity. The proposed system was validated against accelerometer dataset and achieved satisfactory accuracy of 79.58% with random forest. The proposed system can be applied to health monitoring systems, interactive games and for examination of behaviors in outdoor and indoor environments.
{"title":"A Triaxial Acceleration-based Human Motion Detection for Ambient Smart Home System","authors":"A. Jalal, M. A. K. Quaid, M. A. Sidduqi","doi":"10.1109/IBCAST.2019.8667183","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667183","url":null,"abstract":"Health industry off late has been driven heavily by sensors i.e. accelerometers, magnetometers etc. which has allowed instant medical response to any injurious activity in an indoor/outdoor environment. Among the medical applications of accelerometers, fitness systems have used this component extensively but it still holds prominent room for deployment in an ambient smart home system to monitor daily life. In this paper, a novel accelerometer-based motion recognition system using statistical features have been proposed. Axial components of accelerometer have been processed statistically to produce discriminating features values from each activity. The proposed system was validated against accelerometer dataset and achieved satisfactory accuracy of 79.58% with random forest. The proposed system can be applied to health monitoring systems, interactive games and for examination of behaviors in outdoor and indoor environments.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129305034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/IBCAST.2019.8667124
F. Ashraf, Ashmal Shafique, A. Shahzad
The purpose of this paper is to implement and ascertain the optimality of the Iterative Guidance Algorithm for higher altitude orbits by comparing it with the Optimal Control Algorithm. The objective of SLV guidance is to ensure that the SLV injects the given payload into its orbit, as specified by its mission profile, that too in the presence of various kind of perturbations and other parametric variations which cannot be reliably anticipated or predicted before the launch. These parametric variations include propulsion system performance, launch day winds, weight and other atmospheric parameters like density and temperature uncertainties. This paper discusses the implementation of iterative algorithm in an exo-atmospheric phase to provide near optimal guidance in real-time. The guidance is carried out in an inertial 2-D reference frame and a closed loop simulation in which inputs are taken from the on-board navigation system; also the guidance is carried out in the last stage of the vehicle. In the algorithm, the equations of motion of the launch vehicle are first taken for a flat earth surface with the gravity field being uniform, then those equations are extended over a spherical earth model where gravity follows the inverse square law. The control vector is computed as a function of the state variables of the vehicle and the guidance commands are updated at the end of each guidance cycle using the current state variables. In order to check the optimality of the algorithm, the same problem is solved using the Optimal Control Theory and the results are compared. The optimal control problem is converted into a two-point boundary value problem using Pontryagin’s Minimum Principle. Both the algorithm’s are implemented on MATLAB/SIMULINK. Simulation results and the comparisons show that the iterative guidance approach gives highly accurate results and retains its optimal properties under any kind of perturbation. Hence, the iterative guidance scheme is a very reliable and effective method of guidance for a launch vehicle in real-time as the results indicate that the execution time that is required for a single guidance loop stays within the domain of real-time implementation.
{"title":"Iterative Guidance Scheme for Satellite Launch Vehicles","authors":"F. Ashraf, Ashmal Shafique, A. Shahzad","doi":"10.1109/IBCAST.2019.8667124","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667124","url":null,"abstract":"The purpose of this paper is to implement and ascertain the optimality of the Iterative Guidance Algorithm for higher altitude orbits by comparing it with the Optimal Control Algorithm. The objective of SLV guidance is to ensure that the SLV injects the given payload into its orbit, as specified by its mission profile, that too in the presence of various kind of perturbations and other parametric variations which cannot be reliably anticipated or predicted before the launch. These parametric variations include propulsion system performance, launch day winds, weight and other atmospheric parameters like density and temperature uncertainties. This paper discusses the implementation of iterative algorithm in an exo-atmospheric phase to provide near optimal guidance in real-time. The guidance is carried out in an inertial 2-D reference frame and a closed loop simulation in which inputs are taken from the on-board navigation system; also the guidance is carried out in the last stage of the vehicle. In the algorithm, the equations of motion of the launch vehicle are first taken for a flat earth surface with the gravity field being uniform, then those equations are extended over a spherical earth model where gravity follows the inverse square law. The control vector is computed as a function of the state variables of the vehicle and the guidance commands are updated at the end of each guidance cycle using the current state variables. In order to check the optimality of the algorithm, the same problem is solved using the Optimal Control Theory and the results are compared. The optimal control problem is converted into a two-point boundary value problem using Pontryagin’s Minimum Principle. Both the algorithm’s are implemented on MATLAB/SIMULINK. Simulation results and the comparisons show that the iterative guidance approach gives highly accurate results and retains its optimal properties under any kind of perturbation. Hence, the iterative guidance scheme is a very reliable and effective method of guidance for a launch vehicle in real-time as the results indicate that the execution time that is required for a single guidance loop stays within the domain of real-time implementation.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/IBCAST.2019.8667196
Shahab-Ul-Islam, Mudassar Ali, A. Ishtiaq, Aasma Khan, Muhammad Hashir
In wireless communication many packets may be lost during handoff. In conventional wired networks Transmission Control Protocol (TCP) is used. But in case of wireless communication TCP needs to be modifies according to the environment because if a packet drops during communication it reduces the congestion window sizes excessively due to congestion. To overcome this problem many extension in TCP has been proposed. The purpose of this research is to analyze the performance of TCP and Freeze -TCP in the wireless environment. The simulation was done using Network Simulator-2 (NS-2) for both the TCP and Freeze-TCP for managing the mobility and handoffs and the result was compared according to the performance. The simulation is categorized in to two scenarios Varying Window Size, Varying Segment Size on the basis of window and segment sizes. Each scenario consist of three window sizes and three segment sizes. For each and every scenario the performance of TCP and Freeze-TCP are analyzed and compared. The result shows that for managing the handoffs in mobile wireless communication the F-TCP performs better than that of simple TCP.
{"title":"Performance Analysis of Simple TCP and F-TCP for Smooth Connectivity in Wireless Communication","authors":"Shahab-Ul-Islam, Mudassar Ali, A. Ishtiaq, Aasma Khan, Muhammad Hashir","doi":"10.1109/IBCAST.2019.8667196","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667196","url":null,"abstract":"In wireless communication many packets may be lost during handoff. In conventional wired networks Transmission Control Protocol (TCP) is used. But in case of wireless communication TCP needs to be modifies according to the environment because if a packet drops during communication it reduces the congestion window sizes excessively due to congestion. To overcome this problem many extension in TCP has been proposed. The purpose of this research is to analyze the performance of TCP and Freeze -TCP in the wireless environment. The simulation was done using Network Simulator-2 (NS-2) for both the TCP and Freeze-TCP for managing the mobility and handoffs and the result was compared according to the performance. The simulation is categorized in to two scenarios Varying Window Size, Varying Segment Size on the basis of window and segment sizes. Each scenario consist of three window sizes and three segment sizes. For each and every scenario the performance of TCP and Freeze-TCP are analyzed and compared. The result shows that for managing the handoffs in mobile wireless communication the F-TCP performs better than that of simple TCP.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126226127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/IBCAST.2019.8667160
A. Zaidi, E. Uddin
Series of two convergent-divergent nozzles is called ejector; the first or primary nozzle accelerates high pressure primary fluid to low pressure and at supersonic speed. The low pressure developed at the end of primary nozzle entrains the fluid in the secondary nozzle. Eventually, these two fluid streams meet at constant area section resulting in a shock wave. Afterwards, diffuser increases the pressure to desired range. In this paper, numerical simulations are used for designing and shock capturing in ejector using R134a as a refrigerant. The flow analysis is done by Reynolds averaged Navier Stokes equation (RANS) using k-epsilon turbulence model. At first, simulations are done for each nozzle and later they are combined in case of ejector. In case of ejector, rapid fluctuations in pressure and magnitude of velocity showed that there are series of shock waves that result in increase in pressure in ejector. The pressure and Mach number contours explained the physics behind the suction and entrainment of secondary fluid in ejector.
{"title":"Design and Capturing of Shock Wave in Ejector by Numerical Simulations","authors":"A. Zaidi, E. Uddin","doi":"10.1109/IBCAST.2019.8667160","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667160","url":null,"abstract":"Series of two convergent-divergent nozzles is called ejector; the first or primary nozzle accelerates high pressure primary fluid to low pressure and at supersonic speed. The low pressure developed at the end of primary nozzle entrains the fluid in the secondary nozzle. Eventually, these two fluid streams meet at constant area section resulting in a shock wave. Afterwards, diffuser increases the pressure to desired range. In this paper, numerical simulations are used for designing and shock capturing in ejector using R134a as a refrigerant. The flow analysis is done by Reynolds averaged Navier Stokes equation (RANS) using k-epsilon turbulence model. At first, simulations are done for each nozzle and later they are combined in case of ejector. In case of ejector, rapid fluctuations in pressure and magnitude of velocity showed that there are series of shock waves that result in increase in pressure in ejector. The pressure and Mach number contours explained the physics behind the suction and entrainment of secondary fluid in ejector.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/IBCAST.2019.8667251
Zeeshan Anwar, Nazia Bibi, H. Afzal
Mobile devices are now an important part of our lives. In many respect mobile devices make our life easier and increases our working capabilities, but with the increased usage many security concerns are also introduced. Most of these concerns are related to mobile technologies like 3G, 4G etc., and security and privacy of users. In this study, we identified the eleven major security concerns associated with mobile devices that are reported in research literature and performed risk analysis on identified concerns to propose detection and mitigation strategy. Furthermore, we developed the corpus of research literature on mobile devices, security concerns to identify the most important security concerns by using word frequency. The concerns which are most discussed by the researchers are more important. Finally, based results of text mining, we proposed a framework to detect, mitigate and address the security concerns. For benchmarking, we evaluate the proposed framework with the results of various research papers and found that our framework is more effective as it is covering more dimensions of mobile security.
{"title":"Mining Mobile Security Concerns and their Solutions","authors":"Zeeshan Anwar, Nazia Bibi, H. Afzal","doi":"10.1109/IBCAST.2019.8667251","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667251","url":null,"abstract":"Mobile devices are now an important part of our lives. In many respect mobile devices make our life easier and increases our working capabilities, but with the increased usage many security concerns are also introduced. Most of these concerns are related to mobile technologies like 3G, 4G etc., and security and privacy of users. In this study, we identified the eleven major security concerns associated with mobile devices that are reported in research literature and performed risk analysis on identified concerns to propose detection and mitigation strategy. Furthermore, we developed the corpus of research literature on mobile devices, security concerns to identify the most important security concerns by using word frequency. The concerns which are most discussed by the researchers are more important. Finally, based results of text mining, we proposed a framework to detect, mitigate and address the security concerns. For benchmarking, we evaluate the proposed framework with the results of various research papers and found that our framework is more effective as it is covering more dimensions of mobile security.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130339916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/IBCAST.2019.8667181
Rida Tahir, S. Ejaz, Sobia Jangsher, Saqib Ali
It is a well-known fact that as the number of users increase in a CDMA system, the bit error rate (BER) performance drops drastically. To overcome, such problems, forward error correction codes come to aid and BER performance is significantly improved. Recently, polar codes have gained much attention in the research which approach theoretical Shannon’s limit after turbo and low density and parity check (LDPC) codes. To the best of our knowledge, this paper presents the use of state of-the-art Polar codes in conjunction with CDMA system for the first time. It is observed that the polar coded CDMA systems outperform convolutional coded CDMA by the margin of more than 4dB under identical conditions. Successive cancellation (SC) decoder is used at the receiver nodes which has low decoding complexity and thus reduces receiver’s complexity.
{"title":"Performance Analysis of Multi-User Polar Coded CDMA system","authors":"Rida Tahir, S. Ejaz, Sobia Jangsher, Saqib Ali","doi":"10.1109/IBCAST.2019.8667181","DOIUrl":"https://doi.org/10.1109/IBCAST.2019.8667181","url":null,"abstract":"It is a well-known fact that as the number of users increase in a CDMA system, the bit error rate (BER) performance drops drastically. To overcome, such problems, forward error correction codes come to aid and BER performance is significantly improved. Recently, polar codes have gained much attention in the research which approach theoretical Shannon’s limit after turbo and low density and parity check (LDPC) codes. To the best of our knowledge, this paper presents the use of state of-the-art Polar codes in conjunction with CDMA system for the first time. It is observed that the polar coded CDMA systems outperform convolutional coded CDMA by the margin of more than 4dB under identical conditions. Successive cancellation (SC) decoder is used at the receiver nodes which has low decoding complexity and thus reduces receiver’s complexity.","PeriodicalId":335329,"journal":{"name":"2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131662260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}