The necessity for an efficient algorithm for resource allocation is highly urgent because of increased demand for utilizing the available spectrum of the wireless communication systems. This paper proposes an Enhanced Bundle-based Particle Collision Algorithm (EB-PCA) to get the optimal or near optimal values. It applied to the Orthogonal Frequency Division Multiple Access (OFDMA) to evaluate allocations for the power and subcarrier. The analyses take into consideration the power, subcarrier allocations constrain, channel and noise distributions, as well as the distance between user's equipment and the base station. Four main cases are simulated and analyzed under specific operation scenarios to meet the standard specifications of different advanced communication systems. The sum rate results are compared to that achieved with employing another exist algorithm, Bat Pack Algorithm (BPA). The achieved results show that the proposed EB-PAC for OFDMA system is an efficient algorithm in terms of estimating the optimal or near optimal values for both subcarrier and power allocation.
Many technical approaches were implemented in the antenna manufacturing process to maintain the desired miniaturiza- tion of the size of the antenna model which can be employed in various applied systems such as medical communication systems. Furthermore, over the past several years, nanotechnology science has rapidly grown in a wide variety of applications, which has given rise to novel ideas in the design of antennas based on nanoscale merits, leading to the use of antennae as an essential linkage between the human body and the different apparatus of the medical communication system. Some medical applications dealt with different antenna configurations, such as microstrip patch antenna or optical nanoantenna in conjugate with sensing elements, controlling units, and monitoring instruments to maintain a specified healthcare system. This study summarizes and presents a brief review of the recent applications of antennas in different medical communication systems involving highlights, and drawbacks with explores recommended issues related to using antennas in medical treatment.
A considerable work has been conducted to cope with orthogonal frequency division multiple access (OFDMA) resource allocation with using different algorithms and methods. However, most of the available studies deal with optimizing the system for one or two parameters with simple practical condition/constraints. This paper presents analyses and simulation of dynamic OFDMA resource allocation implementation with Modified Multi-Dimension Genetic Algorithm (MDGA) which is an extension for the standard algorithm. MDGA models the resource allocation problem to find the optimal or near optimal solution for both subcarrier and power allocation for OFDMA. It takes into account the power and subcarrier constrains, channel and noise distributions, distance between user's equipment (UE) and base stations (BS), user priority weight – to approximate the most effective parameters that encounter in OFDMA systems. In the same time multi dimension genetic algorithm is used to allow exploring the solution space of resource allocation problem effectively with its different evolutionary operators: multi dimension crossover, multi dimension mutation. Four important cases are addressed and analyzed for resource allocation of OFDMA system under specific operation scenarios to meet the standard specifications for different advanced communication systems. The obtained results demonstrate that MDGA is an effective algorithm in finding the optimal or near optimal solution for both of subcarrier and power allocation of OFDMA resource allocation.
Adaptive filtering constitutes one of the core technologies in digital signal processing and finds numerous application areas in science as well as in industry. Adaptive filtering techniques are used in a wide range of applications such as noise cancellation. Noise cancellation is a common occurrence in today telecommunication systems. The LMS algorithm which is one of the most efficient criteria for determining the values of the adaptive noise cancellation coefficients are very important in communication systems, but the LMS adaptive noise cancellation suffers response degrades and slow convergence rate under low Signal-to- Noise ratio (SNR) condition. This paper presents an adaptive noise canceller algorithm based fuzzy and neural network. The major advantage of the proposed system is its ease of implementation and fast convergence. The proposed algorithm is applied to noise canceling problem of long distance communication channel. The simulation results showed that the proposed model is effectiveness.
Although the advanced technology in satellites and optical fiber communication systems exists now a day, but the researches in HF sky wave propagation for Mesopotamia (Iraq) area is suffered from shortage. In this paper, the novelty is that the communication path from Baghdad to any distance out of Iraqi border had been predicted, calculated and measured experimentally by using real data (Ionogram) supplemented by Nicosia Ionosound station 1000Km from Baghdad and a radio station model TS-130SE as a transmitter. The Predicted results generated by using MATLAB and NTIA/ITS software package like VOACAP. Radio communication using TS-130SE with 36 countries had been done experimentally. A comparison between the theoretical and experimental results was done. The experimental results were in the range of the predicated results which emphasis proposed method Presented in this paper .
Cryptography is one of the technological means to provide security to data being transmitted on information and communication systems. When it is necessary to securely transmit data in limited bandwidth, both compression and encryption must be performed. Researchers have combined compression and encryption together to reduce the overall processing time. In this paper, new partial encryption schemes are proposed to encrypt only part of the compressed image. Soft and hard threshold compression methods are used in the compression step and the Advanced Encryption Standard (AES) cipher is used for the encryption step. The effect of different threshold values on the performance of the proposed schemes are studied. The proposed partial encryption schemes are fast, secure, and do not reduce the compression performance of the underlying selected compression methods.
Lately, image encryption has stand out as a highly urgent demand to provide high security for digital images against use and unauthorized distribution. A lot of existing researches use chaotic systems, symmetric or asymmetric schemes for image encryption, but cryptosystem based on one encryption technique only, faces many challenges like weak security and low complexity. Therefore, incorporating two or more different ciphering methods yields a secure and efficient algorithm to protect image information. In this work, a new image cryptosystem is suggested by joining zigzag scan technique, RSA algorithm and chaotic systems. These three security factors introduce Triple Incorporated Ciphering stages system (TIC). Initially, the plaintext image is divided into 8 × 8 non-overlapping blocks, then the odd blocks are isolated from the even blocks. After that, a new modified zigzag scan in two different directions is adopted for shuffling pixels in the odd and even blocks. This operation effectively enhances the shuffling degree. Next, the RSA algorithm is utilized after combining the scrambled blocks in one matrix. Finally, chaotic systems are implemented on the resultant encrypted matrix to complete the ciphering process. The chaos is implemented in two steps; confusion and diffusion. Duffing map is exploited in the confusion stage, whereas L¨u system is adopted on the shuffled matrix in the diffusion stage. The simulation results show the superiority of TIC in both security and attacks robustness compared to other cryptographic algorithms. Therefore, TIC can be exploited in real-time communication systems for secure image transmission.
Recently, Jones matrix parameter shift keying (JMPSK) technique has been proposed in the literature to achieve phase noise and polarization state insensitive optical communication systems. The aim of this paper is to examine the performance of this system in the presence of system impairments, namely channel dichroism. A comprehensive analysis is presented to assess the effect of dichroism on the bit-error-rate (BER) characteristics of JMPSK receiver.
The reliance on networks and systems has grown rapidly in contemporary times, leading to increased vulnerability to cyber assaults. The Distributed Denial-of-Service (Distributed Denial of Service) attack, a threat that can cause great financial liabilities and reputation damage. To address this problem, Machine Learning (ML) algorithms have gained huge attention, enabling the detection and prevention of DDOS (Distributed Denial of Service) Attacks. In this study, we proposed a novel security mechanism to avoid Distributed Denial of Service attacks. Using an ensemble learning methodology aims to it also can differentiate between normal network traffic and the malicious flood of Distributed Denial of Service attack traffic. The study also evaluates the performance of two well-known ML algorithms, namely, the decision tree and random forest, which were used to execute the proposed method. Tree in defending against Distributed Denial of Service (DDoS) attacks. We test the models using a publicly available dataset called TIME SERIES DATASET FOR DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION. We compare the performance of models using a list of evaluation metrics developing the Model. This step involves fetching the data, preprocessing it, and splitting it into training and testing subgroups, model selection, and validation. When applied to a database of nearly 11,000 time series; in some cases, the proposed approach manifested promising results and reached an Accuracy (ACC) of up to 100 % in the dataset. Ultimately, this proposed method detects and mitigates distributed denial of service. The solution to securing communication systems from this increasing cyber threat is this: preventing attacks from being successful.