This paper proposes an improved configuration of Cellular Antennas for terrains like hills where network coverage is poor and a number of black spots are very high. The proposed solution delivers efficient and much robust antenna structure which provides better network coverage by using 90-degree sector antennas. The radio spectrum of the 90-degree sector antenna is also shown to give the idea of cell coverage in order to build aseamless network in the region.This paper also proposes different channel allocation schemes that can be used with the proposed antenna configuration to deliver better network coverage and low call dropping probability.
This is achieved by analyzing the terrain of the region and also the cellular traffic in the region. In areas where network traffic is almost constant or have low population, strategies like fixed channel allocation can be used effectively and efficiently. While in the areas where traffic is unpredictable or is subject to regional festivals or tourism, channel strategies like dynamic channel allocation are very useful to fulfill the demand of the overall network. The simulations and validations for the proposed methodology are done using MATLAB.
Gives you the complete knowledge of different channel allocation techniques, reverse and forward CDMA, GSM Frame Structure, GSM channel Types, cellular concepts, handoff strategies, Frequency reuse and GSM call structure.
This PDF provides a in-depth explanation for all the concepts and practices used before.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
PERFORMANCE ENHANCEMENT OF DYNAMIC CHANNEL ALLOCATION IN CELLULAR MOBILE NETW...ijcseit
In cellular mobile communication system the existing dynamic channel allocation scheme suffer from
high blocking probability and forced termination probability. To mitigate this problem, in this paper we
evaluated the performance of dynamic channel allocation scheme based on carrier-to-noise interference
ratio. In our system model, uplink power strength from a call-initiating user to the base station is
examined. This power is provided by the carrier-to-noise ratio (C/N). The channel search is conducted in
the repeated channel numbers of that cell based on the carrier-to-noise ratio so that this system provides
the low blocking probability and initiates large number of calls in dynamic channel allocation
environment. We have presented the momentous performance in blocking probability and forced
termination probability through this research.
GENERAL DESCRIPTION OF THE PROBLEM , CONCEPT OF FREQUENCY CHANNELS, CO-CHANNEL iNTERFERENCE REDUCTION FACTOR , DESIRED C/I FROM A NORMAL CASE IN A OMNI DIRECTIONAL ANTENNA SYSTEM , CELL SPLITTING , CONSIDERATION OF THE COMPONENTS OF CELLULAR SYSTEM.
Gives you the complete knowledge of different channel allocation techniques, reverse and forward CDMA, GSM Frame Structure, GSM channel Types, cellular concepts, handoff strategies, Frequency reuse and GSM call structure.
This PDF provides a in-depth explanation for all the concepts and practices used before.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
PERFORMANCE ENHANCEMENT OF DYNAMIC CHANNEL ALLOCATION IN CELLULAR MOBILE NETW...ijcseit
In cellular mobile communication system the existing dynamic channel allocation scheme suffer from
high blocking probability and forced termination probability. To mitigate this problem, in this paper we
evaluated the performance of dynamic channel allocation scheme based on carrier-to-noise interference
ratio. In our system model, uplink power strength from a call-initiating user to the base station is
examined. This power is provided by the carrier-to-noise ratio (C/N). The channel search is conducted in
the repeated channel numbers of that cell based on the carrier-to-noise ratio so that this system provides
the low blocking probability and initiates large number of calls in dynamic channel allocation
environment. We have presented the momentous performance in blocking probability and forced
termination probability through this research.
GENERAL DESCRIPTION OF THE PROBLEM , CONCEPT OF FREQUENCY CHANNELS, CO-CHANNEL iNTERFERENCE REDUCTION FACTOR , DESIRED C/I FROM A NORMAL CASE IN A OMNI DIRECTIONAL ANTENNA SYSTEM , CELL SPLITTING , CONSIDERATION OF THE COMPONENTS OF CELLULAR SYSTEM.
The Management of Information Systems and Its Impact on the Quality of Servic...Eswar Publications
This study aimed to identify the impact of management information systems (MIS) techniques on the quality of services provided at the University of Tabuk from the perspective of students. To achieve the goals of the study, one question were developed and distributed on a random sample of 244 students at the University of Tabuk in the Kingdom of Saudi Arabia. The Statistical Package of Social Sciences (SPSS, V.16) was used to analyze the data of the question.
Review of Considerations for Mobile Device based Secure Access to Financial S...Eswar Publications
The information technology and security stakeholders like CIOs, CISOs and CTOs in financial services organization are
often asked to identify the risks with mobile computing channel for financial services that they support. They are also asked
to come up with approaches for handling risks, define risk acceptance level and mitigate them. This requires them to
articulate strategy for supporting a huge variety of mobile devices from various vendors with different operating systems and hardware platforms and at the same time stay within the accepted risk level. These articulations should be captured in
information security policy document or other suitable document of financial services organization like banks, payment service provider, etc. While risks and mitigation approaches are available from multiple sources, the senior stakeholders may find it challenging to articulate the issues in a comprehensive manner for sharing with business owners and other technology stakeholders. This paper reviews the current research that addresses the issues mentioned above and articulates a strategy that the senior stakeholders may use in their organization. It is assumed that this type of comprehensive strategy guide for senior stakeholders is not readily available and CIOs, CISOs and CTOs would find this paper to be very useful.
The Management of Information Systems and Its Impact on the Quality of Servic...Eswar Publications
This study aimed to identify the impact of management information systems (MIS) techniques on the quality of services provided at the University of Tabuk from the perspective of students. To achieve the goals of the study, one question were developed and distributed on a random sample of 244 students at the University of Tabuk in the Kingdom of Saudi Arabia. The Statistical Package of Social Sciences (SPSS, V.16) was used to analyze the data of the question.
Review of Considerations for Mobile Device based Secure Access to Financial S...Eswar Publications
The information technology and security stakeholders like CIOs, CISOs and CTOs in financial services organization are
often asked to identify the risks with mobile computing channel for financial services that they support. They are also asked
to come up with approaches for handling risks, define risk acceptance level and mitigate them. This requires them to
articulate strategy for supporting a huge variety of mobile devices from various vendors with different operating systems and hardware platforms and at the same time stay within the accepted risk level. These articulations should be captured in
information security policy document or other suitable document of financial services organization like banks, payment service provider, etc. While risks and mitigation approaches are available from multiple sources, the senior stakeholders may find it challenging to articulate the issues in a comprehensive manner for sharing with business owners and other technology stakeholders. This paper reviews the current research that addresses the issues mentioned above and articulates a strategy that the senior stakeholders may use in their organization. It is assumed that this type of comprehensive strategy guide for senior stakeholders is not readily available and CIOs, CISOs and CTOs would find this paper to be very useful.
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...Eswar Publications
Due to the lack of accurate evaluation of the transmission characteristics of the wireless communication links, routing algorithms in wireless sensor networks may result in poor network performance. In order to avoid sending packets over the unstable link, routing protocol has to rely on noble metrics to choose better routing path. Better estimation of link reliability between neighboring nodes could permit the selection of a more reliable route. Since the routing metrics play an important role as they have a direct impact on the efficiency and robustness of routing protocols. Different routing metrics will provide different performances to routing protocols when used to compute weight of paths. This paper presents a study on various hardware and software link quality metrics that
help network protocol designers can choose an efficient Link Quality Estimator to develop reliable routing techniques for WMSNs. Additionally a classification tree of different routing metrics is presented which helps in understanding the strengths and weaknesses of these LQ metrics, thus enabling the designer of the routing protocol to make an informed choice.
음성인식 기반 홈IoT 제품서비스 동향 및 시사점 스마트홈산업협회 (순천향대학교 김학용 교수)Hakyong Kim
한국스마트홈산업협회의 이슈리포트에 게재된 글입니다. 아마존 에코, 구글의 구글홈, SKT의 누구 등 다양한 음성인식 기반의 개인비서 서비스 장치를 소개하고 있고, 이런 기술들이 등장하게 된 배경 및 향후 고려해야 할 이슈 사항들에 대해서도 함께 언급하고 있습니다. Amazon Echo, Google Hom
최근 한국인터넷진흥원에서 "사물인터넷 보안 사례 및 대응 방안"이라는 주제로 발표자료를 공유합니다. 강연을 요청했던 곳과의 관계를 생각해서 원래 자료에서 일부 디테일한 내용들을 삭제하고 공개하는 점에 대해서는 양해 부탁드립니다.
.
자료의 구성은 다음과 같습니다. 먼저, 기존의 인터넷 보안과 사물인터넷 보안의 차이를 설명한 후 CPS 보안, 즉 사물인터넷 보안은 인터넷 보안뿐만 아니라 Cyber Physical Systems 관점에서 사물인터넷 보안을 생각해야 한다는 내용을 소개하고 있습니다.
.
그리고, 다양한 사물인터넷 보안 사고의 사례들을 소개하고 있습니다. 실제 강연에서는 조금 더 구체적으로 설명을 하는데, 간단한 설명만 있어서 도움이 될 지 모르겠지만, 관련 링크를 찾아보시면 될 것 같습니다.
.
마지막으로, 사물인터넷 보안이 중요한 문제가 되는 이유에 대해서 살펴보고 대응 방안, 대응 기술에는 어떤 것들이 있는지 살펴보고 있습니다. 참고로 무선 기술에서의 보안 기법은 소개하지 않습니다.
A DISTRIBUTED DYNAMIC CHANNEL ALLOCATION IN CELLULAR COMMUNICATIONcscpconf
Now a days, mobile users are growing rapidly and the available frequency spectrum is limited.
Therefore the available spectrum must be efficiently utilized. In response a large number of
channel assignment and allocation policies have been proposed. Mostly Dynamic Channel
Allocation (DCA) has become an important subject of research and development for cellular
networks. In this paper, we propose a distributed dynamic channel allocation (DDCA)
algorithm for originating calls. This algorithm is executed at each base station and to allocate
the channel to mobile station, base station communicates with each other. In DDCA, the total
number of channels is divided into three groups. Any cell in the cluster can acquire the channel
group as long as no one of its adjacent cells is holding the same group. Due to this the cochannel
interference is avoided. The result show blocking rate of distributed dynamic channel allocation is reduced as compared to dynamic channel allocation algorithm with non-uniform traffic distribution
Beamforming with per antenna power constraint and transmit antenna selection ...sipij
In this paper, transmit beamforming and antenna selection techniques are presented for the Cooperative
Distributed Antenna System. Beamforming technique with minimum total weighted transmit power
satisfying threshold SINR and Per-Antenna Power constraints is formulated as a convex optimization
problem for the efficient performance of Distributed Antenna System (DAS). Antenna Selection technique is
implemented in this paper to select the optimum Remote Antenna Units from all the available ones. This
achieves the best compromise between capacity and system complexity. Dual polarized and Triple
Polarized systems are considered. Simulation results prove that by integrating Beamforming with DAS
enhances its performance. Also by using convex optimization in Antenna Selection enhances the
performance of multi polarized systems.
This presentation contains the basic of cellular system.
in which direction the cellular system works and how it changes the network from one bast station to another is simply explained.
how Hand-off occur between two base station is shown via figure to understand well.
the cell system in mobile network and the cell spliting, sectoring, microcell zone concept is also explained well.
Please take a look.
may be it is helpfull for you.
Thank you.
Channel feedback scheduling for wireless communicationseSAT Journals
Abstract Opportunistic scheduling can significantly improve wireless network performance by exploiting the underlying channel condition. There has been a lot of work on opportunistic scheduling, but the problem of finding the right feedback mechanism to convey channel information has largely been untouched. In emerging multichannel systems, the per-channel feedback induces a substantial amount of feedback overhead and requires high computational complexity. To reduce the feedback overhead, we consider an opportunistic feedback strategy that activates the channel feedback opportunistically according to the channel condition. Then, we combine the opportunistic feedback with the best-n channel feedback scheme where a mobile user chooses the best n channels and transfers this information to the base station. We analyze the throughput and the amount of channel feedback information for proportionally fair opportunistic scheduling under Rayleigh fading i.i.d. channels. The numerical results confirm that our partial feedback schemes achieve a remarkable reduction in the amount of feedback information without significant throughput degradation, thereby saving the scarce wireless bandwidth and limited battery power.
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...Eswar Publications
In a wireless communication cellular network, call activity can be more intensive in some regions than others. These high-traffic regions are called hot spot regions. In typical deployments of wireless cellular networks, traffic hot spots can arise from the non-uniform geographic distribution of the mobile users, and the heavy-tailed nature of their network usage patterns. These hot spots of activity can degrade system performance, by increasing network utilization, wireless interference, call blocking, and even call dropping from failed handoffs for mobile users. In this paper, a hierarchical cellular communication wireless network is characterized by overlapping the service area for managing the new calls users having different mobility speed. The overlapping property of the hierarchical-network provides the advantages that share the traffic load to improve the performance of wireless
cellular networks in the highly populated area where both slow speed users and high speed users are available.
Picocells are created that are underlaid to two-tier networks for handling the slow or staying speed visitor (outside registered) users. The hierarchical-networks with picocells, microcells and macrocells provide the secondary resource, which provide the services to new calls as well as handoff calls with guard channels by overflow the slow speed visitor users in picocells, slow speed local users in macrocell by sharing the frequency in
vertical as well as in horizontal directions. The picocell is installed on four wheeler vehicle may be moved at any place as per necessity and may be utilized to create picocell to handle the load of hot spot area. Such kind of picocell is known as Portable-Picocell (P-Picocell/ P2cell). The call loss probability of new calls is developed through numerical analysis. The proposed schemes are compared with the existing schemes of CAC. Results show that new proposed schemes are more efficient and handle more visitor calls by redirecting calls and sharing of load in P2cell.
Frequencies management,Channel assignments,
Frequency reuse, System capacity and its improvement: Cell spliting and sectoring, Handoffs & its types, prioritizing handoff, Umbrella cell approach, Cell dragging, Roaming, Co channel and adjacent channel interference, Improving coverage- Repeaters for range extension and microcell zone concept, Examples
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...cscpconf
User mobility in wireless data networks is increasing because of technological advances and the
desire for voice and multimedia applications. These applications, however, require fast handoffs
between base stations to maintain the quality of the connections. In this paper, the authors
describe the use of novel and efficient data structure which dynamically allocates guard channel
for handoffs and introduces the concept of channel borrowing strategy. The proposed scheme
allocates the guard channels for handoff requests dynamically, based on the traffic load for
certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and handoff calls. This approach maximizes the channel utilization. The simulation results prove that the channel borrowing scheme improves the overall throughput.
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Improved Cell Coverage in Hilly Areas using Cellular Antennas
1. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 06 Pages: 2953-2957 (2016) ISSN: 0975-0290
2953
Improved Cell Coverage in Hilly Areas using
Cellular Antennas
Mridul Mohan Bharadwaj
Department of Computer Science& Engineering, Manipal University Jaipur, Jaipur
Email:mridulmbharadwaj@gmail.com
Jyotirmoy Karjee
Department of Computer Science & Engineering, Manipal University Jaipur, Jaipur
Email :jyotirmoy.karjee@jaipur.manipal.edu
----------------------------------------------------------------------ABSTRACT-----------------------------------------------------------
This paper proposes an improved configuration of Cellular Antennas for terrains like hills where network
coverage is poor and a number of black spots are very high. The proposed solution delivers efficient and much
robust antenna structure which provides better network coverage by using 90-degree sector antennas. The radio
spectrum of the 90-degree sector antenna is also shown to give the idea of cell coverage in order to build
aseamless network in the region.This paper also proposes different channel allocation schemes that can be used
with the proposed antenna configuration to deliver better network coverage and low call dropping probability.
This is achieved by analyzing the terrain of the region and also the cellular traffic in the region. In areas where
network traffic is almost constant or have low population, strategies like fixed channel allocation can be used
effectively and efficiently. While in the areas where traffic is unpredictable or is subject to regional festivals or
tourism, channel strategies like dynamic channel allocation are very useful to fulfill the demand of the overall
network. The simulations and validations for the proposed methodology are done using MATLAB.
Keywords: Antenna Configuration, Cellular Network, Channel Allocation Schemes, Coverage Black Spots, Hill, S
Sector Antenna, Terrain
-------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: May 15, 2016 Date of Acceptance: May 30, 2016
-------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Technologicaladvancements and recent development in
wireless and mobile devices were huge in the last decade.
These developments have facilitated the growth of
Wireless Communications and Mobile Computing. There
are numerous applications of Wireless Mobile Networks
which includes communications, entertainment, military,
etc.On analyzing the recent trend in the growth of Mobile
devices, it is expected to grow even more in the future.
This results in limited bandwidth requirements for
servicing all the users on the network. Thus leading the
industry to develop more efficient network model. To
provide efficient network model, more focus is needed
towards Antenna Configurations of the Base Station and
the Channel Allocation Strategies that are used to allocate
channels in a given cell.[1] [2]
In every cellular system, thewhole geographical area is
divided into regularly shaped cells, which can either be
hexagonal, square, circular or some other regular shapes.
Out of these, hexagonal cells are widely used everywhere.
Every cell has a base station (BS) located at the center of
the cell. Mobile stations (MS) in each cell are serviced by
the base station of the cell. Every base station is
interconnected via underlying wired network which is also
known as Backbone network. Base stations are also known
as Mobile Service Station (MSS). Every wired network,
many base stations are connected to a mobile switching
center (MSC). Cellular Networks are connected to the
Internet through MSCs.
In Wireless Communication System, frequency
bandwidth is divided into channels. As a specific
frequency band is allocated to every mobile carrier,
thenumber of channels available to a cell are very limited.
There are various multiplexing techniques which are used
to service more users with limited channels available
namely, Frequency-Division Multiple Access (FDMA),
Code-Division Multiple Access (CDMA) and Time-
Division Multiple Access (TDMA). Furthermore, the same
channel is allowed to be reused in a number of different
cells provided that the minimum reuse distance constraint
is followed. In minimum reuse distance, the current cell
should at least be a minimum distance away from those
cells which provide the channel to the current cell so as to
minimize channel interference. The cells which use the
same channel are known as co-channel cells. [2]The
limitation in terms of channel allocation to a cell accounts
for the development of Channel Allocation Strategies.
Channel Allocation means allocating a set of channels to
each cell in a cellular network while minimizing the
interference in adjacent cells by allocating channels
appropriately. When the channels are allocated to cells,
MSs may then be allowed within the cell to communicate
via the available channels. There are three categories for
the allocation of channels to cells (or MSS) which are as
2. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 06 Pages: 2953-2957 (2016) ISSN: 0975-0290
2954
follows: Fixed Channel Allocation, Dynamic Channel
Allocation, Hybrid Channel Allocation.
(A). Fixed Channel Allocation:
Fixed Channel Allocation Strategy (FCA) allocates a set
of channels to each cell for use. These channels assigned
are static and cannot be changed at any time. Channels are
allocated in such a way that the channel reuse constraint
can never be violated even if all the channels of all cells
are used simultaneously. FCA is easy to implement but it
is not adaptive to changing traffic conditions. If all the
channels are occupied then no new call is served, even if,
the neighboring base stations have free channels. FCA
maximizes frequency reuse by allocating channels under
minimum reuse distance constraint. In Basic Fixed
Channel Allocation, a new call can only be served if there
are channels free in the predetermined set, otherwise call
will be blocked. In Simple Channel Borrowing Scheme,
when all the available channels in a given cell are used, an
available channel from the neighboring cell can be
borrowed provided it does not interfere with the existing
channel set. In Borrowing with Channel Ordering Scheme,
all nominal channels are ordered such that the first
channel has thehighest priority of being assigned to next
local call and the last channel has given highest priority of
being borrowed by the neighboring cell. FCA is inefficient
when traffic varies in every cell.[4]
(B) Dynamic Channel Allocation
In Dynamic Channel Allocation (DCA), there is no fixed
relationship between channels and cells. All free channels
are kept in a central pool, channels are allocated
dynamically when a new call arrives and is returned to the
pool after the call is completed. In DCA, voice channels
are not permanently allocatedinstead, they are requested
by the base station to the MSC. The evaluation of the cost
for using a channel from thedifferent base station and to
select the one with minimum cost must be provided while
keeping the channel interference constraint satisfied.
Selecting a candidate channel depends onthe future
blocking probability in the vicinity of the cell, the reuse
distance and the current traffic conditions. DCA scheme
can be centralized or distributed. In Centralized DCA, a
single controller is involved for selecting a channel for
each cell. While in distributed DCA, a number of
controllers are involved across the network (MSCs). DCA
is highly complex and is less efficient as it involves real-
time computation for allocating channels [5] [6].
(C) Hybrid Channel Allocation
Hybrid Channel Allocation (HCA) is a combination of
fixed and dynamic channel allocation schemes where
channels are divided into fixed and dynamic sets. Every
cell is assigned a fixed number of cells as in the FCA
scheme. When all the channels in a cell are used up, a
request for a channel is initiated from the dynamic set. The
channels in the dynamic set are shared by all users in the
system to increase the flexibility. When a call arrives in a
cell and all of its allocated channels are busy, then a
channel is assigned from the dynamic set to service the
call. The procedure for assigning the channel to the user of
thedifferent cell can be any of the DCA strategies.
II. MOTIVATION
Although most of the technological advancements in the
field of Channel Allocation Strategies are more prominent
nowadays, but there are areas where these advancements
fail to show their presence. Terrains like Hills are those
areas where network coverage is very scarce and channel
allocation strategies become a thing of future. That’s why
it is equally important to review the Antenna
Configuration of the underlying network. There are two
types of antenna used in Cellular Systems namely, Omni-
directional Antenna and Sector Antenna.
Omni-directional Antennas provides equal coverage in
all directions. These antennas provide a horizontal
radiation pattern of 360-degree. These antennas are used
when network coverage is required in all the directions
(horizontally). An Omni-directional antenna has a
spherical coverage pattern ideal cases but generally the
coverage is less in thevertical direction and more in
thehorizontal direction. As theomnidirectional antennas
radiate the energy in all the directions, less area is covered
by theomnidirectional antenna.
Sector Antennas are directional antennas. Their
radiation pattern is sector-shaped. They are generally used
to increase or widen a specific sector of an area, that’s
why the gain of Sector antenna is more than that of the
Omni-directional antenna. Sector Antennas usually
illuminates a 120-degree portion but 90-degree and 60-
degree sector antennas are also in use. General
applications of sector antennas include areas like long
corridor where the network coverage is required in an
extended but narrow area. as it would be inefficient to
used Omnidirectional antennas in these cases as the most
of the radiating energy is wasted in other directions. [7]
Fig. 1 shows the horizontal radiation pattern of a 90-
degree Sector Antenna[8].
3. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 06 Pages: 2953-2957 (2016) ISSN: 0975-0290
2955
III. PROPOSED WORK
In this section, a scheme is proposed to ensure seamless
coverage in terrains such as Hills so as to minimize the
number of black spots in the region. To do this, we
propose to use Sector Antenna as Base Station (BS) in a
cell. For this scheme, four 90-degree antenna model used
to cover all the areas of the region. The main idea is to
divide the region into hexagonal cells in which the sector
antenna will be installed. As viewed from the top of the
hill, it looks like a cone-shaped structure. Before designing
the cell configuration, it is important to design the antenna
to be used in the proposed model. The Table I, lists some
of the parameters that we have used for the simulation:
Table I. Default Parameter values used for simulation
1 Frequency Range 2.4-2.5 GHz
2 Gain 15.0-17.0 dBi
3 Horizontal Beamwidth 91°
4 Vertical Beamwidth 90°
5 Max. Input Power 100 Watts
6 Max. Output Power 200 Watts
To calculate the Reference Gain GRef,
GRef =
���
4�
�
2 (1)
where GRX is the gain of the user antenna and λ is the
wavelength.Taking frequency f = 2.3 GHz, calculating
wavelength λ:
λ =
�
�
= 0.1304 m (2)
where c is the speed of light.To calculate GRX, we use
the equation:
G = 10 log10 (GRX) = 31.62277 (3)
Using the result from Equation (3), we find out the value
of GRef:
GRef = 3.405 × 10-3
(4)
GRef, dB = 10 log10 (GRef) = -24.67 dB (5)
According to the proposed work, Figure 2 depicts the
radiation pattern of 90-degree sector antenna used in a
hexagonal cell in the hilly region. This coverage is based
on one sector antenna. Therefore, by using four 90-degree
sector antennas, most of the area in the cell is covered. The
directivity of a sector antenna is a very important property.
It is important while choosing the antenna for a specific
application. If the need is to transmit or receive energy
from a wider variety of applications, anantenna with low
directivity should be used. Similarly, if power is
transmitted to a specific region, anantenna with high
directivity should be used. Fig 3 shows the directivity of
the 90-degree sector antenna [8].
Fig. 3 Directivity of 90-degree Sector Antenna
To explain the installation of the antennas, we propose
to install four antennas at the top of the hill to cover a
circular region in a cell. As the hill is elevated, it makes a
conical shape structure with its point being the top of the
hill. As one starts moving in adownwards direction, the
coverage area begins to increase. To cover all the area of
the region, we divide the area into hexagonal cells but the
structure is not a regular hexagonal layout of the cell. This
is because the area is not in a “flat” shape.
4. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 06 Pages: 2953-2957 (2016) ISSN: 0975-0290
2956
Fig. 4. Hexagonal Cell Layout for Hilly Terrain
The proposed model as shown in Figure. 4, depicts the
hexagonal structure which can be used to provide
coverage in all the areas. The reason for not using regular
hexagonal structure or “beehive” structure is that the it is
not possible to allocate cells in the hilly terrain according
to the regular hexagonal structure. So, to accommodate the
change, the revised hexagonal structure as shown in
Figure. 4 is used in the model. The area that is left-over by
the four sector antennas in a cell is actually covered by the
neighboring cell antennas. Hence, there are fewer chances
for the presence of any black spot regions.The high terrain
areas like hill have two types of regions. One is where a
human population exists like city or villages. And the
other is where there are only roads connecting different
towns. So, on the basis of this, different channel strategies
can be used. For areas like small towns situated on hill
stations, Dynamic Channel Allocation Strategy is better
suitable for the sudden rise or fall in the cellular traffic
which can be due to many reasons like tourism, social
gathering, etc. For those areas where there is negligible
population or are basically surrounded by roads, astrategy
like Fixed Channel Allocation can work better there. This
is because there will be no sudden rise or fall in the
cellular traffic so a fixed amount of channels can be
allocated to each cell based on a survey of the region. This
facilitates for channels being utilized efficiently and
increasing the Quality of Service.
The sector antenna which is used for simulating the
scenario produces a gain of 15 dBi at the frequency of
2.45 GHz. This tells that when operating on this
frequency, this antenna will transmit 15 dBi more power
in the direction of peak radiation than a lossless isotropic
antenna. Figure 5 shows the relative gain at thedifferent
frequency of the operating sector antenna.VSWR (Voltage
Standing Wave Ratio) is the function of the reflection
coefficient which is the power reflected back from the
antenna. Lower the VSWR, the better is the antenna
matched to the transmission line and therefore more power
is transmitted to the antenna in ahilly area. The sector
antenna which is used in simulation produces a VSWR of
less than 2 dB at a frequency of 2.42 GHz. This shows that
at this frequency, maximum power is delivered to the
antenna and less power is reflected back. These results are
shown to justify that the antenna used is highly efficient
for the simulation purpose and meets the purpose for the
network coverage model. Figure 6 shows the VSWR
comparison with different frequency.
Fig. 5 Gain vs Frequency comparison of a sector antenna
Fig. 6 VSWR at different operating frequency
IV. CONCLUSION
With the Mobile Cellular Networks evolving at a very fast
pace, the wireless resources such as Antennas and Channel
Allocation Strategies are receiving tremendous attention.
As a result, a lot of work is already done in the field of
Channel Allocation Strategies. The difference that comes
is their applications which depend mainly on the
geography of the region as well as the network traffic in
the region. In this paper, the authors proposed a new
antenna configuration for High Terrain Areas such as Hills
which suffers network coverage problem. The aim of the
scheme is to increase the network coverage by designing
the cells in a rather odd but efficient fashion in case of
hexagonal cells. With the appropriate kind of antenna
being used, network coverage problem which is basically a
Black Spot Problem is rectified. Sector Antennas are being
5. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 06 Pages: 2953-2957 (2016) ISSN: 0975-0290
2957
used everywhere but still they’re not being used efficiently
according to the geography of the area. The proposed
solution promises the coverage using a combination of
better antenna configuration, antenna types, and
appropriate channel allocation strategies.
REFERENCES
[1] Arafat Abu Mallouh, Christian Bach and Abdullah
A. Abdullah, Dynamic Channel Allocation in
Cellular Networks, International Journal of
Innovation and Applied Studies, 2013.
[2] Swati M. Khandare, R. R. Sedamkar, Efficient
Scheme for Dynamic Channel Allocation Using
Intelligent Agent in Mobile Communication,
International Journal on Advanced Computer
Engineering and Communication Technology.
[3] M. P. Mishra, P. C. Saxena, Survey of Channel
Allocation Algorithms Research for Cellular
Systems, International Journal of Networks and
Communications, 2012.
[4] Jayshri Joshi, Girish Mundada, A Hybrid Channel
Allocation Algorithm to Reduce Call blocking
probability using Hot-spot Notification, IEEE, 2010
[5] I. Katzela and M. Naghshineh, Channel Assignment
Schemes for Cellular Mobile Telecommunication
Systems, IEEE Personal Communications, Vol:3,
Issue:3, 1996.
[6] Alagu S, Meyyappan T, Dynamic Channel
Allocation Scheme To Handle in Wireless Mobile
Network, AIRCC Publishing Corporation, 2012.
[7] C. Beckman, B. Lindmark, The Evolution of Base
Station Antennas for Mobile Communications,
Electromagnetics in Advances Applications, 2007,
ICEAA 2007.
[8] Mathworks,http://in.mathworks.com/help/antenna/e
xamples/sector-antenna-for-2-4-ghz-wifi-tm.html
Author’s Biography
Mridul Mohan Bharadwajis
pursuing his B. Tech in Computer
Science from Manipal University
Jaipur and is currently in thefinal
year. His areas of interest are Mobile
Computing, Data Structure, and
Android Application Development.
He got his motivation in
the7th
semester from the subject named “Mobile
Computing” and therefore thought of doing research in the
field of Cellular Antennas, Handoff and Network
Coverage.
Jyotirmoy Karjee received his
Ph.D. in Engineering from Indian
Institute of Science, Bangalore,
India. He did his Post-Doctoral
Research from Technical
University of Munich, Germany.
Presently, he holds the position
of Associate professor in the
Department of Computer Science and Engineering,
Manipal University Jaipur, Rajasthan. He is interested in
Machine Learning and Statistical Data Processing applied
in Wireless Communications and Network Security. He is
focused on designing efficient intelligent adaptive learning
algorithms to develop data models for acquisition,
extraction, estimation and manipulation of data. He has
developed data management algorithms in distributed
communication networks to analyze, predict and reduce
the dimensionality of large-scale data sets in wireless
networks.