The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Archives
  • Proposals

Special Issue on Wireless & Mobile Networks

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Simulation and Evaluation of a Simple Adaptive Antenna Array for a WCDMA Mobile Communication

Abstract: This paper presents a uniform Linear Array model of a simple adaptive antenna array based on signal-to-interference and noise ratio (SINR) maximization. The SINR using the adaptive antenna array was investigated for a conventional narrowband beam former by varying the number of antenna array elements and number of interfering signals or users. The results obtained were compared with that of omni-directional antenna. The graph obtained from the results showed significant improvement in SINR as the number of antenna elements increases in the presence of large interferers for odd numbered array.

Author 1: Idigo V E
Author 2: Ifeagwu E.N
Author 3: Azubogu A.C.O
Author 4: Akpado K.A
Author 5: Oguejiofor O.S

Keywords: Smartantenna; bandwidth; SINR; adaptive beam forming.

PDF

Paper 2: Video Transmission over Cognitive Radio TDMA Networks under Collision Errors

Abstract: Cognitive Radio (CR) networks are emerging as new paradigm of communication and channels sharing in multimedia and wireless networks. In this paper, we address the problem of video transmission over shared CR networks using progressive compression source coding associated to fountain codes. We consider a TDMA-based transmission where many subscribers share the same infrastructure. Each Secondary User (SU) is assigned one time slot where he transmits with a certain probability. The given model allows each SU to transmit opportunistically in the remaining slots. Therefore, packets are not only corrupted by reason of Primary traffic interruptions, but also we consider losses caused by collisions between several SUs due to the Opportunistic Spectrum Sharing. We use a redundancy-based model for link maintenance to compensate for the loss of spectrum resources caused by the primary traffic reclaims. Moreover, we setup up many Secondary User Links to mitigate the collision effects. Numerical simulations are performed to evaluate the proposed approaches in view of the average Goodput. We conduct a stability and performance analysis of the system and we highlight the achieved gains when using our transmission model.

Author 1: Abdelaali CHAOUB
Author 2: Elhassane IBN ELHAJ
Author 3: Jamal EL ABBADI

Keywords: component; Cognitive Radio network; video transmission; TDMA; progressive compression source coding, LT codes; Collision; Goodput.

PDF

Paper 3: Scalable TCP: Better Throughput in TCP Congestion Control Algorithms on MANETs

Abstract: In the modern mobile communication world the congestion control algorithms role is vital to data transmission between mobile devices. It provides better and reliable communication capabilities in all kinds of networking environment. The wireless networking technology and the new kind of requirements in communication systems needs some extensions to the original design of TCP for on coming technology development. This work aims to analyze some TCP congestion control algorithms and their performance on Mobile Ad-hoc Networks (MANET). More specifically, we describe performance behavior of BIC, Vegas and Scalable TCP congestion control algorithms. The evaluation is simulated through Network Simulator (NS2) and the performance of these algorithms is analyzed in the term of efficient data transmission in wireless and mobile environment.

Author 1: M Jehan
Author 2: Dr. G.Radhamani

Keywords: TCP Congestion Control Algorithms; MANET; BIC; Vegas; Scalable TCP.

PDF

Paper 4: Performance Comparison of different hybrid amplifiers for different numbers of channels

Abstract: We have investigated the performance comparison of different hybrid optical amplifiers (RAMAN-EDFA,RAMANSOA, SOA-EDFA,EDFA-RAMAN-EDFA).The proposed configuration consists of 16, 32 and 64 Gbps channels at speed of 10 Gbps. We have realized the different hybrid amplifiers and their parameters like quality factor, ber, eye opening and jitter at different number of channels. The different combinations can provide a better result and better feasibility for long distance transmission. It is observed that SOA-EDFA showed good performance as it can travel max distance of 220,240,260 km at 16, 32 and 64 channels respectively. Also, RAMAN-EDFA showed a good performance as it has a high QUALITY FACTOR (24.27) and BER (1 X 10-40) at 16 channels.

Author 1: Sameksha Bhaskar
Author 2: M.L.Sharma
Author 3: Ramandeep Kaur

Keywords: RAMAN-EDFA; RAMAN-SOA; SOA-EDFA; EDFARAMAN-EDFA; QUALITY FACTOR; BER; EYE OPENING; JITTER.

PDF

Paper 5: Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network

Abstract: In mobile ad-hoc network (MANET), secure routing is a challenging issue due to its open nature, infrastructure less property and mobility of nodes. Many mobile ad-hoc network routing schemes have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in mobile ad-hoc networks, an approach significantly different from the existing ones where data packets are routed, based on a specific criterion of the nodes called “fidelity” The approach will reduce the computational overhead to a lot extent. Our simulation results show how we have reduced the amount of network activity for each node required to route a data packet and how this scheme prevents various attacks which may jeopardize any MANET.

Author 1: Himadri Nath Saha
Author 2: Dr. Debika Bhattacharyya
Author 3: Dr. P. K.Banerjee

Keywords: fidelity; sequence number; hop destination; flooding attack; black hole attack; co-operative black hole attac,routing.

PDF

Paper 6: Controlling Home Appliances Remotely Through Voice Command

Abstract: the main concern in systems development is the integration of technologies to increase customer satisfaction. Research presented in this paper focuses mainly in three things first to understand the speech or voice of user second is to control the home appliances through voice call and third is to finds intrusion in the house. The user can make a voice call in order to perform certain actions such as switching lights on/off, getting the status of any appliance etc. And when system finds intrusion it sends an alert voice message to preconfigured cell when the user is away from the place. The proposed system is implemented using voice Global System for Mobile Communications (GSM) and wireless technology based on .NET framework and Attention (AT) commands. Microsoft speech reorganization engine, speech SDK 5.1 is used to understand the voice command of user. As it is wireless so more cost effective and easy to use. The GSM technology used in system provide the everywhere access of the system for security. Experimental results show that the system is more secure and cost effective as compared to existing systems. We conclude that this system provides solution for the problems faced by home owner in daily life and make their life easy and comfortable by proposing cost effective and reliable solution.

Author 1: Marriam Butt
Author 2: Mamoona Khanam
Author 3: Aihab Khan
Author 4: Malik Sikandar Hayat Khiyal

Keywords: component; Voice GSM; Voice message; radio friquencey (RF); AT commands.

PDF

Paper 7: Efficient Traducer Tracing System Using Traffic Volume Information

Abstract: Many leading Broadband access technologies and their accessing abilities have the capability to meet the future requirements of the Broadband consumer. With the enormous growth in the broadband technologies, there is a need of applying simmering technology in many applications like video conference systems and content transmission systems. Streaming content enables users to get access the files quickly and not have to wait until the file is done downloading. Security remains one of the main challenges for Content Streaming. Digital Rights Management (DRM) system must be implemented to avoid content spreading and un-intentional content usage. Water marking technology can also be used to implement the DRM system but it has its own limitations and attacks. A control method for the steaming content delivery is required to prevent abuse of the content. For this reason, authors have proposed a contended methodology that uses traffic volume information obtained from routers. Traducer tracing is one of the essential technologies that designs DRM systems, and empowers content distributors to notice and control content acquisition. This technology utilizes the main concept of traffic contours that helps to determine who is watching the streaming content and whether or not a secondary content delivery exists i.e., mainly used to determine whether the network is being traced out by the intruder or not.

Author 1: K V Ramana
Author 2: Raghu.B.Korrapati
Author 3: N. Praveen Kumar
Author 4: D. Prakash

Keywords: Content Streaming; Traffic Contours; Traducer Tracing; Digital Rights Management.

PDF

Paper 8: Big Brother: A Road Map for Building Ubiquitous Surveillance System in Nigeria

Abstract: In this paper, we propose a method to improve the security challenges in Nigeria by embedding literally hundreds of invisible computers into the environment with each computer performing its tasks without requiring human awareness or a large amount of human intervention to monitor human behaviour, natural disasters and search for stolen or lost items. Ubiquitous Dynamic Surveillance cameras embedded with Radio frequency identification (RFID) is proposed for this security system.

Author 1: Simon Enoch Yusuf
Author 2: Oluwakayode Osagbemi

Keywords: component; Ubiquitous; Surveillance; RFID; Security; Computing.

PDF

Paper 9: NIDS For Unsupervised Authentication Records of KDD Dataset in MATLAB

Abstract: Most anomaly based NIDS employ supervised algorithms, whose performances highly depend on attack-free training data. Moreover, with changing network environment or services, patterns of normal traffic will be changed. In this paper, we developed intrusion detection system is to analyses the authentication records and separate UNFEIGNED and fraudulent authentication attempts for each user account in the system. Intrusions are detected by determining outliers related to the built patterns. We present the modification on the outlier detection algorithm. It is important problems to increase the detection rates and reduce false positive rates in Intrusion Detection System. Although preventative techniques such as access control and authentication attempt to prevent intruders, these can fail, and as a second line of defense, intrusion detection has been introduced. Rare events are events that occur very infrequently, detection of rare events is a common problem in many domains. Support Vector Machines (SVM) as a classical pattern recognition tool have been widely used for intrusion detection. However, conventional SVM methods do not concern different characteristics of features in building an intrusion detection system. Also evaluate the performance of K-Means algorithm by the detection rate and the false positive rate. All result evaluate with the new model of KDD dataset. Result generates in ROC Curves and compared both result of K-Means and SVM in Matlab.

Author 1: Bhawana Pillai
Author 2: Uday Pratap Singh

Keywords: Anomaly detection; Intrusion Detection; Expectation Maximization; MATLAB; UNSOUND authentication; UNFEIGNED; reduce false.

PDF

Paper 10: RSS based Vertical Handoff algorithms for Heterogeneous wireless networks - A Review

Abstract: Heterogeneous networks are integrated in fourth generation. To have seamless communication and mobility between these heterogeneous wireless access networks, support of vertical handoff is required. Vertical handover is convergence of heterogeneous networks for e.g.:- handover between WLAN and cellular networks. In this paper, three algorithms on RSS based vertical handoff are discussed. First, algorithm is adaptive lifetime based vertical handoff, which combines RSS and estimated lifetime (expected duration after which the MT will be able to maintain its connection with WLAN) to decide the vertical handover. Second algorithm, is based on dynamic RSS threshold which is more suitable for handover from WLAN to 3G network. Third algorithm is a traveling distance prediction method, which works well for WLAN to cellular networks and vice versa. This avoids unnecessary handoff and also minimizes failure robability.

Author 1: Abhijit Bijwe
Author 2: C.G.Dethe

Keywords: RSS; WLAN; 3G; VHD.

PDF

Paper 11: A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network

Abstract: Today’s wireless networks are vulnerable in many ways including illegal use, unauthorized access, denial of service attacks, eavesdropping so called war chalking. These problems are one of the main issues for wider uses of wireless network. On wired network intruder can access by wire but in wireless it has possibilities to access the computer anywhere in neighborhood. However, securing MANETs is highly challenging issue due to their inherent characteristics. Intrusion detection is an important security mechanism, but little effort has been directed towards efficient and effective architectures for Intrusion Detection System in the context of MANETs. We investigate existing Intrusion Detection Architecture design Issues, challenges and proposed a novel architecture based on a conceptual model for an IDS agent that lead to a secure collaboration environment integrating mobile ad hoc network and the wired backbone. In wireless/mobile ad hoc network, the limited power, weak computation capabilities of mobile nodes, and restricted bandwidth of the open media impede the establishment of a secure collaborative environment.

Author 1: Atul Patel
Author 2: Ruchi Kansara
Author 3: Paresh Virparia

Keywords: Ad hoc network; Intrusion Detection System; Mobile Network.

PDF

Paper 12: Agent based Congestion Control Performance in Mobile ad-hoc Network:A Survey paper

Abstract: A Congestion control is a key problem in mobile adhoc networks. The standard TCP congestion control mechanism is not able to handle the special properties of a shared wireless channel. Many approaches have been proposed to overcome these difficulties. ideas and show their interrelations. mobile agent based congestion control Technique routing is proposed to avoid congestion in ad hoc network. Some mobile agents are added in ad hoc network, which carry routing information and nodes congestion status. When mobile agent travels through the network, it can select a less-loaded neighbor node as its next hop and update the routing table according to the node’s congestion status. With the aid of mobile agents, the nodes can get the dynamic network topology in time. In this paper, we give an verview over existing proposals, explain their key ideas, TCP Issues, Reduce the Congestion, delay in mobile ad-hoc network and proposed solution

Author 1: Vishnu Kumar Sharma
Author 2: Sarita Singh Bhadauria

Keywords: Mobile Ad hoc Networks (MANETs); mobile agents (MA); TCP.

PDF

Paper 13: 32 x 10 and 64 × 10 Gb/s transmission using hybrid Raman-Erbium doped optical amplifiers

Abstract: We have successfully demonstrated a long-haul transmission of 32 × 10 Gbit/s and 64 × 10 Gbit/s over singlemode fiber of 650 km and 530 km respectively by using RAMANEDFA hybrid optical amplifier as inline and preamplifier amplifiers. The measured Q-factors and BER of the 32 and 64 channels after 650 and 530 km respectively (16.99–17 dB) and (10-13) were higher than the standard acceptable value, which offers feasibility of the hybrid amplifiers including EDFA optical amplifiers for the long-haul transmission.

Author 1: Shveta Singh
Author 2: M.L.Sharma
Author 3: Ramandeep Kaur

Keywords: HOA; RAMAN; EDFA; BER; Q-FACTOR; EYEOPENING; DISPERSION; TRANSMISSION DISTANCE; WDM and DWDM.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org