International Journal of Wireless and Microwave Technologies (IJWMT)

IJWMT Vol. 9, No. 5, Sep. 2019

Cover page and Table of Contents: PDF (size: 892KB)

Table Of Contents

REGULAR PAPERS

Interoperability in Connected Vehicles – A Review

By Shaik Mazhar Hussain Kamaludin Mohamad Yusof Shaik Ashfaq Hussain

DOI: https://doi.org/10.5815/ijwmt.2019.05.01, Pub. Date: 8 Sep. 2019

The introduction of automated transportation system and implementation of connected vehicle system has made interoperability even more critical than before in order to ensure effective connectivity , consistency , accuracy and reliable performance.Connected vehicles are employed with in vehicle sensor networks to collect , store , process and communicate with neighbouring vehicles to help drivers making life saving decisions. Connected vehicle systems enable the exchange of communication between a vehicle and world. Some vehicles may only receive communication, other vehicles may only send data and some may receive and send data. Hence it is essential that all systems , devices need to work together in a safe, trusted , efficient manner. Devices/Sensors embedded in vehicles follow different communication protocols as the sensors or devices are manufactured by different vendors. Hence management of coordination between devices is of much importance in Dynamic, Mobile, Heterogeneous environments such as connected vehicles. Hence, there is a need to create seamless interoperability to enable connected vehicles. It is required to enable intelligent transportation system (ITS) system/devices in Vehicles to effectively connect and communicate with other systems/devices. The adaptability of Interoperability when the devices are adhere to dynamics and mobile in nature becomes tedious and cumbersome. Solutions to interoperability is not much explored in literature. Existing interoperability solutions does not guarantee to articulate for high mobile environments such as connected vehicles where vehicles are highly mobile in nature and moving at varying speeds. The paper summarizes connected vehicles issues and challenges, current interoperability solutions, the impact of interoperability in connected vehicle scenario and demonstrates the effect of conversion time delay when exchanging data between source and destination pairs.

[...] Read more.
Detection and Extraction of OFDM Parameters Using Difference of Gaussians

By Amin Naemi

DOI: https://doi.org/10.5815/ijwmt.2019.05.02, Pub. Date: 8 Sep. 2019

Signals type detection is very important in telecommunication. Telecommunication signals can be divided into two major groups: single-carrier signals and multi-carrier signals. The first step in extracting data in multi-carrier communication signals is to detect signals and their subcarriers. OFDM signals are one of the most popular multi-carrier signals that are used widely. This paper will introduce a blind detection method for OFDM signals, subcarriers, and the central frequency of them based on the Difference of Gaussians (DoG) technique which is applied for blob detection in machine vision. Performance of our method is compared with high-resolution spectral estimation such as Capon, Borgiotti-Lagunas, and MUSIC. Results showed that it has less computational complexity than the others. Also, there is no need to learn parameters, so the response time of the system is appropriate. Furthermore, many tests have been done on real and artificial signals corrupted with noise and fading and the results showed our proposed method has better performance and cause the lower error in the severe condition like SNR=0.

[...] Read more.
Remote Sensing Global Ranged Door Lock Security System via Mobile Communication

By Md Mostafizur Rahman Komol Amit Kumer Podder Abdullah Arafat Tanzim Nabeed

DOI: https://doi.org/10.5815/ijwmt.2019.05.03, Pub. Date: 8 Sep. 2019

In this paper, a door locking system with some remarkable features is proposed which makes the locking or unlocking of a door more reliable to the user than the conventional system. Robust security access with accurate detection system is provided here. It’s a global ranged operation process that can be operated by simple mobile phone through short message service (SMS) transferring operation from any corner of the world where mobile network is available. A smooth and durable locking mechanism is provided and the inscrutable door moving control device is used for the efficient operation of controlling the door. This developed system provides a notification to the user if any person is intended to pass the door. The system also has the ability to provide information about the current condition of the door by sending simple text messages. Also, the user will be able to operate the system with more than one subscriber identity module (SIM) card. Most advantageously, this device is proposed with lowest cost estimation benefit.  Finally, the performance of the designed system is analyzed by performing some real-time operation of it and found satisfactory performance.

[...] Read more.
An Energy Efficient Clustering-based Load Adaptive MAC (CLA-MAC) Protocol for Wireless Sensor Networks in IoT

By Atul Kumar Pandey Nisha Gupta

DOI: https://doi.org/10.5815/ijwmt.2019.05.04, Pub. Date: 8 Sep. 2019

Recent advancement in microelectronics and sensor devices have led to the development of a new family of networks called Internet of things (IoT). One of the challenges of IoT is the integration of autonomous and smart devices with multiple constraints specific to the wireless sensor network (WSN) environment. Among these constraints, the most important constraint is the energy efficiency of medium access control (MAC) protocol. To solve this problem, we propose an improved protocol called clustering based load adaptive MAC (CLA-MAC) for WSNs in IoT scenario, which involves mainly traffic load balancing  within each cluster to provide a tuneable trade-off between energy consumption, delay, and throughput. The proposed solution makes the MAC protocol more energy efficient by reducing competition between sensor nodes with the adoption of clustering scheme and traffic distribution, which can significantly reduce the probability of collision and idle listening. Simulation results indicate that the proposed approach performs better compared with load adaptive MAC (LA-MAC) protocol in typical IoT scenario.

[...] Read more.
ZBLE: Zone based Leader Selection Energy Constrained AOMDV Routing Protocol

By Rani Sahu Sanjay Sharma M. A. Rizvi

DOI: https://doi.org/10.5815/ijwmt.2019.05.05, Pub. Date: 8 Sep. 2019

In today's life, wireless networks (WNs) are being used very fast in every area. Wireless networks have been used in various applications, but finding some of its weaknesses, such as mobility, diversity, lack of resources and so on, finding an optimum route is very complex and problematic. By reducing the energy consumption on each node, the quality of the network can be ensured. Need to increase the battery life of the node to increase the network lifecycle. Therefore, reducing the energy consumption can extend the battery life of the node. To find and maintain routes between nodes, multi-path routing is a fundamental research issue for such networks. This paper discusses the zone-based routing protocol, which uses the energy, distance and power of the node to maintain high circulation and accelerate the path search process and maintain high search. The Zone-based Leader Selection Routing Protocol (ZBLE) is one of the new protocols, which is a modified form of the famous Ad Hoc on Demand Distance Vector Routing Protocol (AOMDV). Zone Leader Node and Zone Members are selected using the value of energy, position and power of the node. The performance of the proposed communication protocol is evaluated with other existing protocols such as AODV and AOMDV. The simulation result is that when it receives the best path for data communication with proper energy conservation. Network simulator version 2.35 is used for simulation purpose. To support our ideas, we used the 5 quality of service parameters such as packet distribution ratio, energy consumption, network lifetime, and throughput.

[...] Read more.