- Home
- A-Z Publications
- International Journal of Sensors Wireless Communications and Control
- Fast Track Listing
International Journal of Sensors Wireless Communications and Control - Online First
Description text for Online First listing goes here...
-
-
Multiple Criteria-Based Intelligent Techniques for Efficient Handover in Next-Generation Networks
Authors: Sudesh Pahal, Priyanka Nandal, Nidhi Gupta and Neetu SehrawatAvailable online: 14 October 2024More LessBackgroundSeveral wireless technologies are assumed to be operating in cooperation for next-generation networks. These networks offer various services to mobile users; however, efficient handover between different networks is the most challenging task in high mobility scenarios. The traditional signal strength-based handover algorithms are not able to cope with mobile users' high-quality requirements.
MethodsIn this paper, multiple criteria-based intelligent techniques are proposed to deal with inefficiencies related to handover. This technique makes use of artificial neural networks that take multiple parameters as inputs in order to predict the degradation of parameters. These predictions are further used to design rules for initiating handover procedures prior to service quality degradation.
ResultsBased on the prediction results obtained by deep neural networks, the handover decisions are recommended according to the type of application: conversational or streaming.
ConclusionThe simulation results demonstrate the efficacy of the proposed method as there is an improvement of up to 40% and 25% in terms of handover rate and service disruption time, respectively, with an acceptable prediction error of 0.05.
-
-
-
Data Collection and Recharging of Sensor Node by Mobile Sink in Wireless Sensor Network
Authors: Hanif Zafor, Tasher Ali Sheikh, Nabajyoti Mazumdar and Amitava NagAvailable online: 11 October 2024More LessThe wireless sensor network (WSN) has limited battery and storage capacity. The main challenge in static sink nodes is the lack of energy and data transfer to the base station (BS). A mobile sink (MS) is an excellent way to handle these difficulties in WSN. The use of an MS solution not only ensures long-term network functionality, but also improves network performance. In this paper, the MS-based data collection and recharging, mobile device is used for data collection from sensor nodes and recharging the sensor nodes throughout the network whenever required. There are two types of MS-based solutions described as (i) Mobile devices for data collection from sensor nodes in the network. (ii) Mobile device for collecting data and recharging sensor nodes from the network. Finally, in this paper, we presented the advantages, disadvantages, and other criteria of both types. Also, a potential framework is presented for data collection and recharging of sensor nodes by MS in WSN. The core contribution of this paper is present the state of art and future roadmap for data collection and recharging of sensor nodes by MS in WSN. The identification of the main open challenges and future direction in this research area are also highlighted and discussed.
-
-
-
Deep Learning-Based Network Security Situation Prediction for Sensor-Enabled Networks
Available online: 11 October 2024More LessAims and backgroundNetwork security detection has become increasingly complex due to the proliferation of Internet nodes and the ever-changing nature of network architecture. To address this, a multi-layer feedforward neural-network has been employed to construct a model for security threat detection, which has enhanced network security protection.
Objectives and MethodsImproving prediction accuracy and real-time performance, this research suggests an optimal strategy based on Clockwork Recurrent-Neural-Networks(CW-RNNs) to handle nonlinearity and temporal dynamics in network security circumstances. We get the model to pick up on both the short-term and long-term temporal aspects of network-security situations by using the clock-cycle RNN. To further improve the network security scenario prediction model, we tune the network hyperparameters using the Grey-Wolf-Optimization(GWO) technique. By incorporating a clock-cycle for hidden units, the model can improve its pattern recognition capabilities by learning short-term knowledge from high-frequency update modules and preserving long-term memory from low-frequency update modules.
ResultsThe optimized clock-cycle RNN achieves better prediction accuracy than competing network models when it comes to extracting nonlinear and temporal characteristics of network security scenarios, according to the experimental data.
ConclusionsIn addition, our method is perfect for tracking massive amounts of data transmitted by sensor networks because of its minimal time complexity and outstanding real-time performance.
-
-
-
Optimization of Graphene-based Antenna using Metasurface for THz Applications using Ensemble Learning models
Authors: Nipun Sharma and Amrit KaurAvailable online: 11 October 2024More LessAims and BackgroundThese days, communication is governed by scaled-down devices with extremely high data transfer rates. The days of data transfer rates in megabytes are long gone and the systems are touching data speeds of hundreds of gigabytes. To cater to this requirement, the evolution of metasurface-based antennas working in the THz frequency range is gaining pace.
Objectives and MethodologyMetasurface layers in antennas have unique mechanical and electrical properties that make them feasible. Graphene is a preferred metasurface material when designing antennas. In this paper, two novel designs of graphene-based metasurface antennas are proposed. These patch antennas with graphene metasurface layers have two configurations for slotted patches. Both graphene and gold-slotted patches are tested in this paper, and results are presented and validated for various performance parameters like return loss, peak gain, peak directivity, and radiation efficiency.
ResultsThe design of the proposed Graphene Patch Antennas (GPA) is done in HFSS, and once the design is complete, the data is collected for variations in antenna parameters and is further processed via machine learning for better convergence in terms of return loss using ensemble learning. Optimal tuning of antenna components like substrate length, patch length, slot width, etc., is done using two regressor algorithms viz Histogram-based Gradient Boosting Regression Tree (HBDT) and Random Forest Tree (RFT) in machine learning. The radiation efficiencies of the two designs presented in this work are 89.04%, 97.54%, an average radiation efficiency of of 93.29%. The bandwidth of the two antenna designs is 8.63 THz and 8.69 THz, respectively.
ConclusionExperimental results indicate that the proposed designs are achieved better bandwidth, and radiation efficiencies compared to state-of-art designs.
-
-
-
BER Analysis of Underlay Cooperative Cognitive Radio-based NOMA System
Authors: Meriem Ad and Abdellatif KhelilAvailable online: 09 October 2024More LessBackgroundThe integration of Cooperative Communications (CC), Cognitive Radio (CR) technology, and Non-Orthogonal Multiple Access (NOMA) techniques, termed Cooperative Cognitive Radio used NOMA (CCR-NOMA) systems, has emerged as a promising solution to address spectrum scarcity and connectivity challenges anticipated in sixth generation (6G) networks.
AimThis studyaims to investigate the Bit Error Rate (BER) performance of underlay CCR-NOMA systems.
MethodsWe derive precise closed-form expressions for BER at distant users under perfect and imperfect Channel State Information (CSI) conditions. These mathematical formulations are validated through Monte Carlo simulations.
ResultsOur results indicate that the near user 𝐶𝑈2 exhibits superior performance compared to the far user 𝐶𝑈2. Additionally, distant users utilizing the CCR-OMA protocol demonstrate better BER performance than those employing the CCR-NOMA protocol.
ConclusionThe presence of imperfect CSI adversely affects BER performance. Moreover, the derived closed-form expressions for BER in the investigated system align well with Monte Carlo simulations. These findings provide valuable insights for optimizing the performance of CCR-NOMA systems in real-world scenarios.
-
-
-
Detection of Intrusions in Internet of Things Based Deep Auto Encoder Using Deepnets
Authors: L. Godlin Atlas, K.V. Shiny, K.P. Arjun, N.M. Sreenarayanan and J. Lethisia NithiyaAvailable online: 26 September 2024More LessAims and backgroundAs a communication paradigm that bridges the gap between virtual and physical spaces, the Internet of Things (IoT) has quickly gained popularity in recent years. In order to supplement the provisions made by security protocols, a network-based intrusion detection system (IDS) has emerged as a standard component of network architecture. IDSs monitor and detect cyber threats continuously throughout the network lifetime.
Objectives and MethodsThe main contribution is the development of a two-level neural network model that optimizes the number of neurons and features in the hidden layers, achieving superior accuracy in anomaly detection. Its include the utilization of deep anomaly detection (DAD) to protect networks from unknown threats without requiring rule modifications. The research also emphasizes the importance of feature extraction and selection, employing parallel deep models for segmenting attacks. The proposed supervised technique enables simultaneous feature selection using parallel models, enhancing the accuracy of IDS designs. A novel hybrid technique combining Deep Auto Encoders (DAEs) and DeepNets is proposed for intrusion detection.
ResultsThe research present a data preprocessing stage, converting symbolic and quantitative data into real-valued vectors and normalizing them. Feature extraction involves utilizing DAEs to learn concise representations of datasets. The deep network architecture, including multilayer perceptrons and activation functions, is employed for feature extraction and classification. The proposed approach utilizes a DeepNets in the final stage in order to improve the rate of 97% accurate outputs and make it possible to achieve greatly accelerated execution durations.
ConclusionWhen measured against the performances of other approaches to the extraction of features, the performance of the deep network platform is superior.
-