International Journal of Wireless and Microwave Technologies (IJWMT)

IJWMT Vol. 5, No. 4, Jul. 2015

Cover page and Table of Contents: PDF (size: 138KB)

Table Of Contents

REGULAR PAPERS

Dynamic Request Set based Mutual Exclusion Algorithm in MANETs

By Ashish Khanna Awadhesh Kumar Singh Abhishek Swaroop

DOI: https://doi.org/10.5815/ijwmt.2015.04.01, Pub. Date: 26 Jul. 2015

Mutual Exclusion (ME) problem involves a group of processes, each of which intermittently requires access to the only resource present in the environment. Handling ME problem becomes difficult due to the dynamic nature of the ad hoc environment. This paper presents a token-based solution to ME problem in the mobile ad hoc environment. The proposed token based algorithm is sensitive to link forming and link breaking and thus is suitable for MANET. The algorithm uses the concept of dynamic request set (DRS). As the request set is dynamically updated, the average size of request set is reduced resulting in less number of messages exchanged per critical section. The algorithm satisfies mutual exclusion, starvation freedom, and freedom from deadlock. The present algorithm has been compared with DRS based ME algorithms for static distributed systems. The results show that the concept of DRS in MANETs can be successfully used. Token loss problem has also been handled separately in the present exposition.

[...] Read more.
GSM based Monitoring and Control of Systems

By Saima Maqbool Sajaad Ahmed Lone

DOI: https://doi.org/10.5815/ijwmt.2015.04.02, Pub. Date: 26 Jul. 2015

In this paper we have proposed a method to make a base for the monitoring and Control of systems. The monitoring and Control of systems could be from monitoring of movements in any particular area to the monitoring of any external electrical, mechanical device. Every person is pocketed with the cell. So, taking the advantage of the same we developed the system for the monitoring and Control system using GSM technology. This will provide the owner, manager of the system to know about the working or any kind of default in the system. Also the system is controlled which is needed in special circumstances and is be implemented with the help of complete circuitry which is a different module (DTMF module) has a specific code as input through GSM encoder that is processed by decoder circuitry of our system. The goal is to find an improvement over the previous surveillance systems .The maintainability of the new and improved is quite efficient as it is easy to handle it by simple software demo. The facilities provided by it such as easy handling, a secrecy support, an immediate action are granted. A prototype is built in the Windows platform using C# to demonstrate the functioning of the entire system.

[...] Read more.
Performance Evaluation of Channel Codes for High Data Rate Mobile Wireless System

By Samridhi Jyoteesh Malhotra

DOI: https://doi.org/10.5815/ijwmt.2015.04.03, Pub. Date: 26 Jul. 2015

Mobile wireless system incorporates dual sphere in terms of mobility as well as computing. Such systems have revamped momentously resulting in expedient wireless devices. Current wireless communication requires enormous data rates, streaming audio/video, asymmetric access/multiple access, fully-integrated, low cost, reliable seamless systems with the capability of providing voice, high speed data, and video with minimum latency and long battery life to enhance error free communication. However, there are many obstacles and bottlenecks to achieving this in practice. These bottlenecks include limited spectrum, limited energy, multipath fading and propagation loss, cost, standardization processes. This paper focuses on coding and modulation techniques for wireless communications so as to reduce/overcome many of these obstacles. To put the discussion in perspective, a short background on the coding and modulation approaches of wireless communication systems is provided. The turbo coding is mainly chosen to facilitate the wireless communication. The paper enlightens the impetus behind using turbo codes for high data rate mobile wireless systems. Paper explains how better out-turns can be yielded when approaches like cyclic redundancy check and scrambling are embedded with coding. The BER performance and SNR ratio are observed for illustrating variance between convolution and turbo coding for different rates and modulations. Simulation results are plotted using Matlab software.

[...] Read more.
E-band Microwave Radios for Mobile Backhaul

By Saad Z. Asif

DOI: https://doi.org/10.5815/ijwmt.2015.04.04, Pub. Date: 26 Jul. 2015

This article explores the emerging high capacity microwave radios that operate in 70-90 GHz frequency band to address the mobile backhaul challenge of the cellular industry of Pakistan. The challenge will be look from both technical and business perspectives covering topics like frequency assignments, radio capacity, and experimental results. In hindsight these millimeter wave microwave radios provide an alternative (particularly to optical fiber) to address the said challenge of one of the lowest ARPU (average revenue per user) markets of the world.

[...] Read more.
Enhanced Techniques for Filtering of Wall Messages over Online Social Networks (OSN) User Profiles

By Nikhil Sanyog Choudhary Himanshu Yadav Anurag Jain

DOI: https://doi.org/10.5815/ijwmt.2015.04.05, Pub. Date: 26 Jul. 2015

Online Social Networks enables various users to connect and share their messages publicly and privately. On one hand it provides advantages to the users to connect and share but on the other hand it provides disadvantage of being attacks or post messages which contains negative or abuse words. Hence OSN provides various filtering rules for security against these wall messages. Although there are various filtering rules and classifiers implemented for the filtering of these users wall messages in popular OSN such as Twitter and Facebook. But in the proposed methodology not only filtering of these wall messages is done but the categorization of normal or negative messages are identified and hence on the basis users can be blacklisted. The proposed methodology is compared with FCM and SVM for clustering and classification of messages. This approach efficiently categorizes the messages but restricts for generating filtering rules and blacklist management. Thus the approach with FCM and J48 first initializes clustering using FCM followed by generation of rules using J48 based decision tree. Hence on the basis of the rules generated message are classified and message which doesn't contain attacks is then filtered on the basis of dictionary which contains a list of abuse words. The methodology is implemented by applying FCM and SVM and a comparison is done with FCM and J48 for the performance on the basis of accuracy to detect abnormal messages.

[...] Read more.
Digital Wallet

By Harshal R. Kanhekar Sayali N. Mane

DOI: https://doi.org/10.5815/ijwmt.2015.04.06, Pub. Date: 26 Jul. 2015

As the world is getting digital there are few things which are used as it is for a long time. The most important thing which we do in our daily life is the transaction of money. Money transaction is a process which should be digitized for more security and the ease of the individual. So, by making a digital wallet the money transaction can be made much simpler and effortless. Using digital wallet we can keep all our important cards such as health card, driving license and other important papers in only one place with much more security.
The digital wallet can be our transaction medium which can be used anywhere such as shops, malls or for giving money to someone else. And with such high security such as finger print scanning our money and all the information which the wallet is carrying will be safe. In case, if the wallet is lost GPS will help to detect the location of our device and that what makes the wallet a digital safe.

[...] Read more.