International Journal of Sensors Wireless Communications and Control
Latest Publications


TOTAL DOCUMENTS

465
(FIVE YEARS 190)

H-INDEX

6
(FIVE YEARS 2)

Published By Bentham Science

2210-3279

Author(s):  
Uche A.K. Chude-Okonkwo

Aims: To model molecular signal propagation in confined environment. Background: Molecular communication (MC) is rooted in the concepts of understanding, modeling, and engineering information exchange among naturally and artificially synthesized nanosystems. To develop or analyze an MC system, there is the need to model the communication channel through which the molecular signal diffuse, from the transmitter to the receiver. Many models for the diffusion-based MC channel have been proposed in the literature for evaluating the performance of MC systems. Most of the contemporary works assume, and rightly so for some scenarios, that the MC channels under consideration have infinite boundaries. However, this assumption becomes invalid in bounded domains such as the interiors of natural cells and artificially synthesized nanosystems. Objective: In this paper, the model of molecular propagation in a confined. microenvironment is employ to explore the effect of such an environment on the MC system. Method: The mutual information of the channel and specifically the closed-form expression of the channel capacity of the molecular signaling in the confined geometry is derive. Result: Numerical results showing the variation in the channel capacity as the function of the channel dimension are presented. Conclusion: Results showed that the channel capacity increases with the decrease in the channel dimension. Subsequently, as the dimension of the channel tends to the nanoscale range typical of many artificially synthesized nanosystems, the effect of the channel width on the capacity and by induction on many other system metrics increases.


Author(s):  
Ajitesh Kumar

Background: Nowadays, there is an immense increase in the demand for high power computation of real-time workloads and the trend towards multi-core and multiprocessor CPUs. The real-time system needs to be implemented upon multiprocessor platforms. Introduction: The nature of processors in an embedded real-time system is changing day by day. The two most significant challenges in a multiprocessor environment are scheduling and synchronization. The popularity of real-time multi-core systems has exploded in recent years, driving the rapid development of a variety of methods for multiprocessor scheduling of essential tasks, on the other hand, these systems have constraints when it comes to maintaining synchronization in order to access shared resources. Method: This research work presents a systematic review of different existing scheduling algorithms and synchronization protocols for shared resources in a real-time multiprocessor environment. The manuscript also presents a study based on various metrics of resource scheduling and comparison among different resource scheduling techniques. Result and Conclusion: The survey classifies open issues, key challenges, and likely useful research directions. Finally, we accept that there is still a lot of capacity in getting better resource management and further maintaining the overall quality. The paper considers such a future path of research in this field.


Author(s):  
Jibran Rasheed Khan ◽  
Shariq Mahmood Khan ◽  
Farhan Ahmed Siddiqui

Background: The last few decades bring an astonishing revolution in technology and electronics which enabling small pieces of electronic devices into handy equipment, called sensors. The sensors enable 75% area of the world covered by water. Which is hardly 5% been explored and has numerous applications. The security of underwater wireless sensors network (UWNS) communication is a prime concern to protect advantages from technology and application purpose. This paper explores UWSN architecture, vulnerabilities, attacks, and possible factors that challenge UWSN security and its applications. Objectives: The primary objective of this work is to analyze the vulnerable factors that cause security challenges and threats to UWSN applications. This study focuses on the intermediate uplink point of UWSN architecture and evaluates it in three different test cases. This would be beneficial to build a better solution by devising an appropriate scheme in the future. Method: The denial of service (DoS) attack is simulated using ns-3 and Aquasim-ng simulator to determine which factor(s) threatening to the UWSN environment. The simulation is performed under three idealized underwater scenarios; 1) depicts general UWSN (a hybrid architecture), 2) a special case depicts UWSN environment with only underwater components, ands 3) depicts another special case with underwater sink UWSN environment. Assuming all three test case environments are vulnerable and threats to UWSN security. Result: In all three scenarios, the average network performance in the normal transmission is 88% and about ± 3% deviation is observed. Also, it observed that scenarios 1 and 2 are influenced by the adversary interference or malicious activity while there are no such effects that occur in scenario 3 in the absence of intermediate radio link or surface sink node(s). Thus, experiments found that among others, the intermediate radio link(s) of the onshore surface sink(s) or surface buoy(s) are vulnerable and threats to UWSN. Conclusion: The simulation results and observations found that the intermediate up-link in UWSN architecture found to be more vulnerable which makes it insecure. While, in a pure underwater environment, seem to be more secure compared to the general UWSN environment. In the future, more factors will be evaluate in the same or different cases to determine the UWSN issues and other vulnerable factors


Author(s):  
Gbolahan Aiyetoro ◽  
Pius Owolawi

Background: The massive amount of deployment of Internet of Things (IoT) devices via wireless communications has presented a new paradigm in next generation mobile networks. The rapid growth in the deployment of the IoT devices can be linked to the diverse use of several IoT applications for home automations, smart systems, and other forms of innovations in businesses and industry 4.0. Methods: There is need for a robust network infrastructure to actualize the huge traffic demand of the IoT communications in this new paradigm across the globe including rural and remote areas. However, due to technical and economical constraints, the terrestrial network infrastructure is not able to fulfil this requirement. Hence, the need for satellite network infrastructure. This solution will be of inmense benefit to the provision of remote health care, disaster management, remote sensing, and asset tracking and environmental monitoring to name a few. While this remain an interesting solution, the packet scheduling which is one of the key radio resource management functions is still a challenging issue that remains undefined especially in a satellite network scenario that has its own peculiarities and challenges. Results: Hence, the goal of this research work is to design a new packet scheduling scheme that will be suitable for machine type communications and also mixed use case scenario in satellite network scenario. The performance evaluation of the proposed packet scheduler is conducted through simulations. Conclusion: The newly proposed packet scheduling scheme provides at an improvement of approximately 7 Mbps and 0.5 bps/Hz in terms of throughput and spectral efficiency performances respectively in mixed use case scenario, when compared to known throughput optimal packet schedulers, without serious compromise to other performance metrics.


Author(s):  
Ivan Izonin

Nowadays, the fast development of hardware for IoT-based systems creates appropriate conditions for the development of services for different application areas. As we know, the large number of multifunctional devices, which are connected to the Internet is constantly increasing. Today, most of the IoT devices just only collect and transmit data. The huge amount of data produced by these devices requires efficient and fast approaches to its analysis. This task can be solved by combining Artificial Intelligence and IoT tools. Essentially, AI accelerators can be used as a universal sensor in IoT systems, that is, we can create Artificial Intelligence of Things (AIoT). AIoT can be considered like a movement from data collection to knowledge aggregation. AIoT-based systems are being widely implemented in many high-tech industrial and infrastructure systems. Such systems are capable of providing not only the ability to collect but also analyse various aspects of data for identification, planning, diagnostics, evaluation, monitoring, optimization, etc., at the lower level in the entire system's hierarchy. That is, they are able to work more efficiently and effectively by generating the knowledge that is needed for real-time analytics and decision-making in some application areas.


Sign in / Sign up

Export Citation Format

Share Document