Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 13
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Europe has to face strong competitive challenges in the field of QIT from other regions of the world. The tools for the effective implementation of the challenges related to the start, we hope, of building a quantum civilization are both common and individual in particular European countries. Joint projects in the field of QIT, usually narrowly focused, are announced by large European Agencies and are related to their activities. Large-scale collaborative projects are of course the domain of the EC. National projects depend heavily on the capabilities of individual countries and vary greatly in size. The most technologically advanced European countries invest hundreds of millions of Euros in national QIT projects annually. The largest European FET class project currently being implemented is the Quantum Flagship. Although the EQF is basically just one of the elements of a large and complicated European scene of development of quantum technologies, it becomes the most important element and, in a sense, a dominant one, also supported from the political level. There are complex connections and feedbacks between the elements of this quantum scene. National projects try to link to the EQF. Here we are interested in such connections and their impact on the effectiveness of QIT development in Europe, and especially in Poland.
Go to article

Authors and Affiliations

Ryszard S. Romaniuk
1

  1. Warsaw University of Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

In this paper, we show that the signal sampling operation considered as a non-ideal one, which incorporates finite time switching and operation of signal blurring, does not lead, as the researchers would expect, to Dirac impulses for the case of their ideal behavior.
Go to article

Authors and Affiliations

Andrzej Borys
1
ORCID: ORCID

  1. Gdynia Maritime University, Poland
Download PDF Download RIS Download Bibtex

Abstract

In a smart city environment, Intelligent Transportation System (ITS) enables the vehicle to generate and communicate messages for safety applications. There exists a challenge where the integrity of the message needs to be verified before passing it on to other vehicles. There should be a provision to motivate the honest vehicles who are reporting the true event messages. To achieve this, traffic regulations and event detections can be linked with blockchain technology. Any vehicle violating traffic rules will be issued with a penalty by executing the smart contract. In case any accident occurs, the vehicle nearby to the spot can immediately send the event message to Unmanned Aerial Vehicle (UAV). It will check for its credibility and proceed with rewards. The authenticity of the vehicle inside the smart city area is verified by registering itself with UAVs deployed near the city entrance. This is enabled to reduce the participation of unauthorized vehicles inside the city zone. The Secure Hash Algorithm (SHA256) and Elliptic Curve Digital Signature Algorithm (ECDSA-192) are used for communication. The result of computation time for certificate generation and vehicles involvement rate is presented.
Go to article

Authors and Affiliations

Suganthi Evangeline
1
Ashmiya Lenin
2
Vinoth Babu Kumaravelu
3

  1. Department of Electronics and Communication Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India
  2. PG Scholar in Communication Systems, Karunya Institute of Technology and Sciences, Coimbatore, India
  3. School of Electronics Engineering, VIT University, Vellore, India
Download PDF Download RIS Download Bibtex

Abstract

Automating the tasks that require manpower has been considered as an area of active research in science and technology. Challenges in designing such systems include accuracy in the parameters of performance, minimal hardware, cost-efficiency, and security. The efficiency of drones designed for replacing humans is often evaluated using their weight, flying time, and power consumption. Herein, the prototypebased Drone model has been designed and discussed for horticulture applications. In this model, a horticulture drone has been designed for structuring and cutting of plants in street interstates. This methodology focuses on automation engineering that is utilized for cutting the plants in less time and less power, thereby diminishing the contamination that may happen by utilizing fuels. The epic part of this plan includes the less weight drone predesigned using Computer-Aided Three-Dimensional Interactive Application (CATIA) V5 Software. The throttle for the motors is adjusted at 50% to get the required thrust for the Unmanned Aerial Vehicle (UAV) to fly. Experimental results show that the horticulture drone has comparatively more flying time and less power consumption.
Go to article

Authors and Affiliations

M. Arun Kumar
1
Dioline Sara
1
Nagarjuna Telagam
1
Balwinder Raj
2

  1. Department of EECE, GITAM University Bengaluru, India
  2. Department of Electronics Communication, Engineering, NITTTR, India
Download PDF Download RIS Download Bibtex

Abstract

The cellular users, on high speed railways and highways, travel at a very high speed and follow a nearly straight path, in general. Thus, they typically undergo a maximum frequency of handovers in the cellular environment. This requires a very fast triggering of the handover. In the existing method of handover in 5G cellular communication, for high speed users, neither the decision-making of handover nor the triggering of handover is sufficiently fast. This can lead to poor signal quality and packet losses and in the worst case, radio link failure (RLF) during a handover. This paper proposes a forward handover based method, combined with PN sequence detections, to facilitate a quicker handover for high speed users on railways and highways. The proposed method adds some complexity but can offer a significant improvement in the overall handover delay. A simplistic simulation is used to demonstrate the improvement of the proposed method.
Go to article

Authors and Affiliations

Mohammad T. Kawser
1
Kazi Md. Abir Hassan
1
Md. Atiqul Haque
1
Sakif Ahmed
1
Mohammad Rubbyat Akram
2

  1. Department of Electrical and Electronic Engineering, Islamic University of Technology, Gazipur, Bangladesh
  2. Robi Axiata Ltd., Dhaka, Bangladesh
Download PDF Download RIS Download Bibtex

Abstract

In a massive multiple-input multiple-output (MIMO) system, a large number of receiving antennas at the base station can simultaneously serve multiple users. Linear detectors can achieve optimal performance but require large dimensional matrix inversion, which requires a large number of arithmetic operations. Several low complexity solutions are reported in the literature. In this work, we have presented an improved two-dimensional double successive projection (I2D-DSP) algorithm for massive MIMO detection. Simulation results show that the proposed detector performs better than the conventional 2D-DSP algorithm at a lower complexity. The performance under channel correlation also improves with the I2D-DSP scheme. We further developed a soft information generation algorithm to reduce the number of magnitude comparisons. The proposed soft symbol generation method uses real domain operation and can reduce almost 90% flops and magnitude comparisons.
Go to article

Authors and Affiliations

Sourav Chakraborty
1
Nirmalendu Bikas Sinha
2
Monojit Mitra
3

  1. Department of Electronics and Communication Engineering, Cooch Behar Government Engineering College, Coochbehar,India
  2. Principal, Maharaja Nandakumar Mahavidyalaya, Purba Medinipore, India
  3. Department of Electronics and Telecommunication, Engineering, IIEST Shibpur, Howrah, India
Download PDF Download RIS Download Bibtex

Abstract

The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the ability to be used in audio steganography techniques. Such methods are a relatively new tool for hiding and transmitting crucial information, also being used by hackers. In the following work, the publicly available software dedicated to audio steganography is examined. The aim was to provide the general operating model of the information processing in the steganographic effort. The embedding method was analyzed for each application, providing interesting insights and allowing classifying the methods. The results prove that it is possible to detect the hidden message within the specific audio file and identify the technique that was used to create it. This may be exploited further during the hacking attack detection and prevention.
Go to article

Authors and Affiliations

Piotr Marszałek
1
Piotr Bilski
2
ORCID: ORCID

  1. Doctoral School, Warsaw University of Technology, Warsaw, Poland
  2. Warsaw University of Technology, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

This research began when observations were made on any-to-any-connection services that require QoS (Quality of Service) and tunnel measurements. Tunnel is a technique to interconnect between local networks that are separated through a public network. Research questions found looping caused by traffic issues when sending data in the MPLS service layer-2 tunneling service. Furthermore, this research hypothesis proposes optimizing QoS performance in the application of the SR-TE (Segment Routing-Traffic Engineering) method in the MPLS (Multi-Protocol Label Switching) network and analyzing traffic based on MAC addresses using the looping-protection method. This research contributes to optimizing the MPLS network and is a recommended solution for simplifying control-plane operation, especially the SR-TE method and looping-protection in the L2- VPN MPLS service. The purpose of this study is to analyze the performance of MPLS networks, as well as analyze the application of L2-VPN (Layer 2 Virtual Private Network) MPLS networks. The targeted TKT (Technology Readiness Level) is 3rd-Level, which is an analytical and experimental proof of the MPLS tunnel network model on Layer-2 VPN services. The results of the research concluded that testing the SR-TE method is a solution to simplify the process of labeling data traffic that is global labelling, then the looping-protection method is a solution to eliminate looping indications. The QoS obtained has also shown an "excellent" category based on TIPHON standards.
Go to article

Authors and Affiliations

Lukman Medriavin Silalahi
1
Setiyo Budiyanto
1
Imelda Uli Vistalina Simanjuntak
1
Rukhi Ali Effendi
1
Fernando
1
Agus Dendi Rochendi
2
Irfan Kampono
2

  1. Universitas Mercu Buana, Indonesia
  2. Badan Riset dan Inovasi Nasional, Republik Indonesia, Indonesia
Download PDF Download RIS Download Bibtex

Abstract

On fifth-generation wireless networks, a potential massive MIMO system is used to meet the ever-increasing request for high-traffic data rates, high-resolution streaming media, and cognitive communication. In order to boost the trade-off between energy efficiency (EE), spectral efficiency (SE), and throughput in wireless 5G networks, massive MIMO systems are essential. This paper proposes a strategy for EE 5G optimization utilizing massive MIMO technology. The massive MIMO system architecture would enhance the trade-off between throughput and EE at the optimum number of working antennas. Moreover, the EE-SE tradeoff is adjusted for downlink and uplink massive MIMO systems employing linear precoding techniques such as Multiple -Minimum Mean Square Error (M-MMSE), Regularized Zero Forcing (RZF), Zero Forcing (ZF), and Maximum Ratio (MR). Throughput is increased by adding more antennas at the optimum EE, according to the analysis of simulation findings. Next, utilizing M MMSE instead of RZF and ZF, the suggested trading strategy is enhanced and optimized. The results indicate that M-MMSE provides the best tradeoff between EE and throughput at the determined optimal ratio between active antennas and active users equipment’s (UE).
Go to article

Authors and Affiliations

Ibrahim Salah
1
Kamel Hussein Rahouma
2 3
Aziza I. Hussein
4
ORCID: ORCID
Mohamed M. Mabrook
5 1
ORCID: ORCID

  1. CCE Department, Faculty of Engineering, Nahda University, Beni-Suef, Egypt
  2. Department of Electrical Engineering, Faculty of Engineering, Minia University, Minia, Egypt
  3. Faculty of Computer Science, Nahda University, Beni-Suef, Egypt
  4. Electrical & Computer Eng. Dept., Effat University, Jeddah, KSA
  5. Faculty of Navigation Science & Space Technology, Beni-Suef University, Beni-Suef, Egypt
Download PDF Download RIS Download Bibtex

Abstract

Wireless sensor network (WSN) plays a crucial role in many industrial, commercial, and social applications. However, increasing the number of nodes in a WSN increases network complexity, making it harder to acquire all relevant data in a timely way. By assuming the end node as a base station, we devised an Artificial Ant Routing (AAR) method that overcomes such network difficulties and finds an ideal routing that gives an easy way to reach the destination node in our situation. The goal of our research is to establish WSN parameters that are based on the biologically inspired Ant Colony Optimization (ACO) method. The proposed AAR provides the alternating path in case of congestion and high traffic requirement. In the event of node failures in a wireless network, the same algorithm enhances the efficiency of the routing path and acts as a multipath data transmission approach. We simulated network factors including Packet Delivery Ratio (PDR), Throughput, and Energy Consumption to achieve this. The major objective is to extend the network lifespan while data is being transferred by avoiding crowded areas and conserving energy by using a small number of nodes. The result shows that AAR is having improved performance parameters as compared to LEACH, LEACH-C, and FCM-DS-ACO.
Go to article

Authors and Affiliations

Shankar D. Chavan
1
Amruta S. Thorat
1
Monica S. Gunjal
1
Anup S. Vibhute
1
Kamalakar R. Desai
2

  1. Dr. D. Y. Patil Institute of Technology, Pimpri, Pune, (M.S.), India
  2. Bharati Vidyapeeth College of Engineering, Kolhapur (M.S.), India
Download PDF Download RIS Download Bibtex

Abstract

In the era of continuous advancement in wireless technologies, path loss, also known as channel attenuation, is a drop in signal strength from the transmitter to the receiver. Path loss modelling is critical in designing fixed and mobile communication systems for various applications. This paper focuses on the received power (dBm) and free space path loss (FSPL) on various distances and frequencies such as 5240 MHz for wireless local area network (WLAN) and frequency such as 2100 MHz for the mobile network such as Celcom. As a result, able to analyze the correspondence between received power (dBm) and distance of each related frequency and the correspondence between FSPL (dB) and distance of each corresponding frequency and able to analyze the effect of obstacle on received power (dBm) and frequency.
Go to article

Authors and Affiliations

Kavinesh S Radhakrishna
1
Y.S. Lee
2
K.Y. You
3
K.M. Thiruvarasu
1
S.T. Ng
1

  1. Faculty of Electronic Engineering Technology, Universiti Malaysia Perlis (UniMAP), Perlis, Malaysia
  2. Faculty of Electronic Engineering Technology and Advanced Communication Engineering, Centre of Excellence (CoE), Universiti Malaysia Perlis (UniMAP), Perlis, Malaysia
  3. Faculty of Electrical Engineering, Universiti Teknologi Malaysia, 81310 UTM Skudai, Johor, Malaysia
Download PDF Download RIS Download Bibtex

Abstract

In the paper, the BTS (Background Traffic Simulator) tool is proposed to capture network traffic and then reproduce it in a simulations using the ns-3 simulator extension module. This new method of generating background traffic allows for repetitive testing of simulation scenarios under real network conditions. The authors described the differences between the previously available methods and the proposed solution. The operation of all the most important elements of the proposed tool has been described. The influence of the generated background traffic on the simulation scenario was presented as well as the results of the operation.
Go to article

Authors and Affiliations

Szymon Stryczek
1
Mikołaj Gwiazdowicz
1
Marek Natkaniec
1

  1. Faculty of Computer Science, Electronics and Telecommunications, Institute of Telecommunications, AGH University of Science and Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

The paper focuses on the optimization of IEEE 802.11ax dense networks. The results were obtained with the use of the NS-3 simulator. Various network topologies were analyzed and compared. The advantage of using MSDU and MPDU aggregations in a dense network environment was shown. The process of improving the network performance for changes in the transmitter power value, CCA Threshold, and antenna gain was presented. The positive influence of BSS coloring mechanism on overal network efficiency was revealed. The influence of receiver sensitivity on network performance was determined.
Go to article

Authors and Affiliations

Marek Natkaniec
1
Mateusz Kras
2

  1. Faculty of Computer Science, Electronics and Telecommunications, Institute of Telecommunications, AGH University of Science and Technology, Poland
  2. AGH University of Science and Technology, Poland

This page uses 'cookies'. Learn more