Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for throughput

Article
Saturation Throughput and Delay Performance Evaluation of the IEEE 802.11g/n for a Wireless Lossy Channel

Salah A. Alabady

Pages: 51-64

PDF Full Text
Abstract

Non-ideal channel conditions degrade the performance of wireless networks due to the occurrence of frame errors. Most of the well-known works compute the saturation throughput and packet delay for the IEEE 802.11 Distributed Coordination Function (DCF) protocol with the assumption that transmission is carried out via an ideal channel (i.e., no channel bit errors or hidden stations), and/or the errors exist only in data packets. Besides, there are no considerations for transmission errors in the control frames (i.e., Request to Send (RTS), Clear to Send (CTS), and Acknowledgement (ACK)). Considering the transmission errors in the control frames adds complexity to the existing analysis for the wireless networks. In this paper, an analytical model to evaluate the Medium Access Control (MAC) layer saturation throughput and packet delay of the IEEE 802.11g and IEEE 802.11n protocols in the presence of both collisions and transmission errors in a non-ideal wireless channel is provided. The derived analytical expressions reveal that the saturation throughput and packet delay are affected by the network size (n), packet size, minimum backoff window size (W min ), maximum backoff stage (m), and bit error rate (BER). These results are important for protocol optimization and network planning in wireless networks .

Article
Performance of Non-Orthogonal Multiple Access (NOMA) with Successive Interference Cancellation (SIC)

Ali K. Marzook, Hayder J. Mohammed, Hisham L. Swadi Roomi

Pages: 152-156

PDF Full Text
Abstract

Non-Orthogonal Multiple Access (NOMA) has been promised for fifth generation (5G) cellular wireless network that can serve multiple users at same radio resources time, frequency, and code domains with different power levels. In this paper, we present a new simulation compression between a random location of multiple users for Non-Orthogonal Multiple Access (NOMA) and Orthogonal Multiple Access (OMA) that depend on Successive Interference Cancellation (SIC) and generalized the suggested joint user pairing for NOMA and beyond cellular networks. Cell throughput and Energy Efficiency (EE) are gained are developed for all active NOMA user in suggested model. Simulation results clarify the cell throughput for NOMA gained 7 Mpbs over OMA system in two different scenarios deployed users (3 and 4). We gain an attains Energy Efficiency (EE) among the weak power users and the stronger power users.

Article
Traffic Offloading in LTE System Based Heteroge- neous Networks

Mahmood F. Mosleh

Pages: 152-160

PDF Full Text
Abstract

The continuous growing developments in the traffic of mobile data limits the data throughput and capacity of cellular networks. “Heterogeneous Networks (HetNets)” are efficient solution to realize such demands. However, in HetNets, the congestion on the overloaded cellular network can be increased when the traffic of data is pushed from a cellular network to the Wi-Fi. In practice, offloading the cellular data traffic to a Wireless Local Area Network (WLAN) depending on the signal quality is a broadly deployed method to solve such problem. The use of Device to Device (D2D) communication further enhances the traffic offloading in WLAN systems and helps to obtain better throughput, end-to-end delay and network load. However, the critical offloading potential and its impacts on the whole performance is not totally understood. In this paper, the offloading of Long Term Evolution (LTE) traffic is presented using a WLAN for voice and video applications. A comparison is performed among two WLAN mecha- nisms; Distributed coordination function (DCF) and Point Coordination Function (PCF). As well, the effect of add- ing a D2D technology to the PCF is discussed. The WLAN effectively offloaded nodes at their Signal to Interference and Noise Ratio (SINR) becomes more than a specific threshold. Results presented that the PCF mechanism outper- forms the DCF one in terms of packet loss ratio, throughput and the maximum load of the entire network. In addi- tion, the use of a D2D serviced in the PCF helps in further reduction in the network load.

Article
New Energy Efficient Routing Protocol in Wireless Sensor Networks Using Firefly Algorithm

Safaa Khudair Leabi

Pages: 1-7

PDF Full Text
Abstract

Energy constraint has become the major challenge for designing wireless sensor networks. Network lifetime is considered as the most substantial metric in these networks. Routing technique is one of the best choices for maintaining network lifetime. This paper demonstrates implementation of new methodology of routing in WSN using firefly swarm intelligence. Energy consumption is the dominant issue in wireless sensor networks routing. For network cutoff avoidance while maximize net lifetime energy exhaustion must be balanced. Balancing energy consumption is the key feature for rising nets lifetime of WSNs. This routing technique involves determination of optimal route from node toward sink to make energy exhaustion balance in network and in the same time maximize network throughput and lifetime. The proposed technique show that it is better than other some routing techniques like Dijkstra routing, Fuzzy routing, and ant colony (ACO) routing technique. Results demonstrate that the proposed routing technique has beat the three routing techniques in throughput and extend net lifetime.

Article
Taguchi Method Based Node Performance Analysis of Generous TIT- for-TAT Cooperation of AD-HOC Networks

Noor Kareem Jumaa, Auday A.H. Mohamad, Abbas Muhammed Allawy, Ali A. Mohammed

Pages: 33-44

PDF Full Text
Abstract

Ad-Hoc networks have an adaptive architecture, temporarily configured to provide communication between wireless devices that provide network nodes. Forwarding packets from the source node to the remote destination node may require intermediate cooperative nodes (relay nodes), which may act selfishly because they are power-constrained. The nodes should exhibit cooperation even when faced with occasional selfish or non-cooperative behaviour from other nodes. Several factors affect the behaviour of nodes; those factors are the number of packets required to redirect, power consumption per node, and power constraints per node. Power constraints per node and grade of generosity. This article is based on a dynamic collaboration strategy, specifically the Generous Tit-for-Tat (GTFT), and it aims to represent an Ad-Hoc network operating with the Generous Tit-for-Tat (GTFT) cooperation strategy, measure statistics for the data, and then analyze these statistics using the Taguchi method. The transfer speed and relay node performance both have an impact on the factors that shape the network conditions and are subject to analysis using the Taguchi Method (TM). The analyzed parameters are node throughput, the amount of relay requested packets produced by a node per number of relays requested packets taken by a node, and the amount of accepted relay requested by a node per amount of relay requested by a node. A Taguchi L9 orthogonal array was used to analyze node behaviour, and the results show that the effect parameters were number of packets, power consumption, power constraint of the node, and grade of generosity. The tested parameters influence node cooperation in the following sequence: number of packets required to redirect (N) (effects on behaviour with a percent of 6.8491), power consumption per node (C) (effects on behaviour with a percent of 0.7467), power constraints per node (P) (effects on behaviour with a percent of 0.6831), and grade of generosity (ε) (effects on behaviour with a percent of 0.4530). Taguchi experiments proved that the grade of generosity (GoG) is not the influencing factor where the highest productivity level is, while the number of packets per second required to redirect also has an impact on node behaviour.

Article
A Simulation of AODV and GPSR Routing Protocols in VANET Based on Multimetrices

Israa A. Aljabry, Ghaida A. Al-Suhail

Pages: 66-72

PDF Full Text
Abstract

Vehicular Ad hoc Networks (VANETs), a subsection of Mobile Ad hoc Networks (MANETs), have strong future application prospects. Because topology structures are rapidly changing, determining a route that can guarantee a good Quality of Service (QoS) is a critical issue in VANETs. Routing is a critical component that must be addressed in order to utilize effective communication among vehicles. The purpose obtained from this study is to compare the AODV and GPSR performance in terms of Packet Delivery Ratio, Packet Drop Ratio, Throughput, and End-to-End Delay by applying three scenarios, the first scenario focuses on studying these protocols in terms of QoS while changing the number of vehicles at a constant speed of 40Km/h, and for the second scenario changing the speed value while keeping a constant number of vehicles which is 100, the third involves changing the communication range at a constant speed and vehicle number. This study represents a foundation for researchers to help elaborate on the strength and weaknesses of these two protocols. OMNeT++ in conjunction with SUMO is used for simulation.

Article
Color Image Hiding In Cover Speech Signal By Using Multi-resolution Discrete Wavelet Transform

Lecturer Dr. Samir J.AL- Muraab, Asst. lecturer Haider I. AL-Mayaly

Pages: 28-37

PDF Full Text
Abstract

Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, security, and copyright. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. Digital audio provides a suitable cover for high-throughput steganography. In this paper a high robustness system against the attackers in hiding of color images is presented. We used the multi-resolution discrete wavelet transform in hiding process. The JPEG format type for color images and WAV format for speech cover signal that used in test of system. Programs and graphics are executed by using MATLAB version 6.5 programs.

1 - 7 of 7 items

Search Parameters

Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering, University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.