<![CDATA[Universal Journal of Communications and Network(CEASE PUBLICATION)]]>
After consideration, we have decided to cease publication of this journal at the end of 2022. This journal will no longer accept submissions and subscriptions from 2023. All published articles will remain available in Archive at /journals/jour_archive.php?id=27]]>
en-us 2025-11-03 01:20:48 2025-11-03 01:20:48 ZWWY RSS Generator <![CDATA[ICT Adoption in the Educational Management of Primary Schools in Kenya]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  8  Number  1  

Mary Walowe Mwadulo   and Collins Otieno Odoyo   

Information Communication Technology (ICT) plays an important role in enhancing the quality of education. The adoption of ICT for educational management in developed countries has significantly transformed the education sector in terms of data storage, resource management, and decision making. In African countries, initially, the use of ICT in management of schools was low compared to other fields such as business and engineering, however, in recent times, school managers have embraced ICT in the education sector. In the case of Kenya, through the ministry of education, the Kenyan government has made deliberate attempts to encourage the use of ICT to revolutionize the management of schools, which is evident through the introduction of National Education Management Information System (NEMIS), putting in place an ICT policy and creation of institutional websites. However, very few primary schools have effectively adopted ICT for management with a majority using it for teaching and learning. This is attributed to a myriad of challenges facing most schools and consequently resulting in slow and low adoption rates despite its promise and potential for improving educational management in schools. As such, this paper analyses the slowness that has surrounded the adoption of ICT in the management of Kenyan schools. The focus is on the benefits of introducing ICT in educational management, the current status of ICT adoption in educational management in Kenya and barriers to the adoption of ICT in educational management of primary schools in Kenya.

]]>
Mar 2020
<![CDATA[Determination of Wireless Communication Links Optimal Transmission Range Using Improved Bisection Algorithm]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  7  Number  1  

Enyenihi Henry Johnson   Simeon Ozuomba   and Ifiok Okon Asuquo   

In this paper, an improved bisection algorithm for computing the optimal transmission range of wireless communication links was presented. The optimal path length is based on the link budget equation for line-of-sight wireless communication links. Specifically, free space path loss model was used for the clear-air path loss while multipath fading and rain fading were the two fade mechanisms considered in the determination of the expected fade margin. Sample numerical example was carried out for a frequency of 10 GHz and a site located in the International Telecommunication Union (ITU) rain zone N. The result showed that at 10 GHz and with the given network and link parameters, the improved bisection algorithm converged at the 7th cycle while the classical bisection method converged at the 12th cycle. Further numerical examples were examined for frequencies ranging from 10 GHz to 200 GHz. In all, the improved bisection method had at least 41 % reduction in the convergence cycle when compared with that of the classical bisection method. A similar study with the classical Newton-Raphson method converged at the 4th cycle for a 12 GHz signal while the improved bisection method converged at the 6th cycle. Essentially, the Newton-Raphson method converges faster than the bisection and the improved bisection methods. However, it is very difficult to apply the classical Newton-Raphson method when several clear-air path losses are to be considered or when complex path loss model such as the Hata model is used in the path loss computation. As such, the improved bisection method is preferred due to its simplicity and also it offers convergence performance that is comparable to that of the classical Newton-Raphson method.

]]>
Mar 2019
<![CDATA[Push-to-Talk over LTE Modeling and Performance Evaluation]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  7  Number  1  

Hisham Zorghani   and Ivica Kostanic   

Public Safety organizations play a vital role in disaster recovery and public protection. First responders rely on their communication systems to perform their mission. Their communication systems are considered mission critical which puts special requirements on their underlying enabling technologies. Nowadays, most of the communication systems used in public safety are narrowband and were mainly developed for voice communication. Push-to-Talk is a multicast (group call) half-duplex type of communication that emergency first responders heavily rely on. When first responders request to speak by pushing the button on their handset, during emergencies, they must be confident that their requests will go through and not blocked. LTE technology has been chosen in many countries, including the US, to be the platform for the next generation public safety communication systems. LTE is a broadband wireless communication technology that public safety communication may benefit from the high data rates LTE technology offers. This paper proposes an analytical model of Push-to-Talk over LTE networks to study their performance by using queueing theory. The model is validated against a discrete event simulation (SimEvents). The study provides some guidelines to improve the Grade of Service (GOS) of Push-to-Talk over LTE systems.

]]>
Mar 2019
<![CDATA[Application of Weissberger Model for Characterizing the Propagation Loss in a Gliricidia sepium Arboretum]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  6  Number  2  

Simeon Ozuomba   Enyenihi Henry Johnson   and Emmanuel Nsese Udoiwod   

In this paper, the Weissberger and the Early ITU propagation loss models were used to characterize the propagation loss for a 3G cellular network. Particularly, the 3G network operates at a frequency of 1800 GHz and the case study site is a Gliricidia sepium arboretum which is a Gliricidia sepium Tree Park planted and maintained mainly for scientific study in the annex campus of University of Uyo. Cellmapper app installed on Tecno i5 mobile phone was used to capture the received signal strength; the latitude and longitude of the data capture points, as well as the time and the key cellular network base station data. The relevant mathematical models used to process the measured data and for tuning the Weissberger and the Early ITU propagation loss models were also presented. The Weissberger and the Early ITU propagation loss models were tuned using foliage depth tuning constant. The tuned models prediction performances were evaluated using cross-validation dataset. With the training dataset, the un-tuned Weissberger model had a root mean square (RMSE) value of 21.098 dB while the tuned Weissberger model had a RMSE of 3.375 dB. Similarly, with the training dataset, the un-tuned Early ITU model had a RMSE of 21.970dB while the tuned Early ITU model had a RMSE of 4.019dB. The tuned Weissberger model with the lowest RMSE was adopted for the prediction of the propagation loss in the case study Gliricidia sepium arboretum. Furthermore, the Weissberger model was evaluated using the cross-validation dataset and it had RMSE of 4.507dB.

]]>
Dec 2018
<![CDATA[Security Threats and Solutions in Mobile Ad Hoc Networks; A Review]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  6  Number  2  

Mutuma Ichaba   

Compared to wired-infrastructure dependent networks, Mobile Ad Hoc Networks (MANETs) are more vulnerable to attacks. Because of their dynamic topology and the absence of centralized network administration, MANETs face more security threats than centralized networks. Initial literature review on MANETs' security issues indicates that while there have been attempts to identify security threats and solutions on MANETs, comprehensive reviews are very little or lacking. In an attempt to address this gap, this article offers an up-to-date literature on security issues and solutions in MANETs. By limiting the review to 21st Century research on this topic, this review paper is able to offer a comprehensive presentation of the issues concerning security in MANETs.

]]>
Dec 2018
<![CDATA[Motion Capture Systems Using Optimal Signal Processing Algorithm: A State-of-the-art Literature]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  6  Number  1  

Md Masud Rana   and Nazia Halim   

Motion capture system is a promising research area but the availability of the state-of-the-art literature review on this topic is limited. This research provides a comprehensive literature review for motion capture systems with Kalman filtering algorithms. The summarized state-of-the-art literature review of motion capturing system is being analyzed considering the advantages and the disadvantages of motion capture systems using Kalman filtering algorithm. Afterwards, the human body incorporating noises is represented by system of equations where the system states are unknown. The Kalman filter is adopted to estimate the human body orientations. Simulation results show that the proposed algorithm can be used to track human body orientation accurately.

]]>
Sep 2018
<![CDATA[Insights into Different Energy Efficient Routing Protocols for Wireless Sensor Networks]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  5  Number  2  

Ayda Valinezhad Orang   

Wireless Sensor Networks (WSNs) have become popular due to their adaptability and independency where direct human interventions are risky and impossible. WSNs consist of small sensor nodes powered with battery devices and have limited lifetime. Therefore, the most crucial concern in WSNs is their energy consumption and accumulating studies have proposed strategies for WSN designs by clustering the networks into small sub-groups, mainly called clusters. This review summarizes some of the most well-known clustering protocols that have been developed in the last few years. Furthermore, this survey classifies the clustering protocols into three clustering sub-groups including centralized, distributed and hybrid algorithms. Finally, a comparison between the proposed protocols is investigated based on their advantages and disadvantages as well as the considered parameters for clustering.

]]>
Dec 2017
<![CDATA[Investigation of Factors that Determine the Performance of Wireless Sensor Systems for Large-scale on Demand Deployment]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  5  Number  1  

Tajudeen O Olasupo   and Kehinde O Olasupo   

Most of the studies done so far consider just one or two factors that determine network behavior during experiment or analysis and reach a conclusion with that. Thereby making wireless sensor system deployment design to incur variability and non-conformance to target requirements, and increase in development time and cost. This study proposes an approach to improve deployment plan for wireless sensor network by considering the most appropriate factors that could contribute significantly to deployment performance. The study specifies some factors and demonstrates how they influence network performance using factorial coding. It also provides demonstration of an optimization approach of implementing the factors-"EASY algorithm – Eliminate, Adjust, Simulate and Yield result" on experimental measurements. This research uses factorial design, polynomial analysis, and hypothesis testing for an experiment to investigate the factors that could determine the performance of the system. Result shows that inclusion of more significant factors in a design model will enhance the model by 26%. Using this approach during pre-deployment design and pre-knowledge of performance factor will help in improving the quality of service and achieve desired aim of system. It will ensure that reliable accurate models are being used in network design, planning, and implementations for improved performance.

]]>
Apr 2017
<![CDATA[Sliding Mode Observer-based Actuator Fault Reconstruction for a Continuous Reactor]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  4  Number  3  

Mohammad-Hossien Khooban   and Emad Mohammadi   

The problem of fault detecting subject to external disturbances has been a topic of considerable interest. In this paper, a sliding mode observer for fault detection and isolation is applied to a continuous reactor. Additionally, a general review has been done on dynamic model of continuous reactor along with detailed study of the mathematical model of these kinds of systems. Then, sliding mode observer is investigated with detailed comment. In order to isolate and estimate the possible actuator faults a bank of Sliding Mode Observer (SMO) is designed. Also a simple canonical form for sliding mode observer is presented. A design procedure is described and linear simulation results are presented to demonstrate the approach.

]]>
Dec 2016
<![CDATA[Analytical Modeling of LTE-based Network Capacity for Public Safety Communications]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  4  Number  3  

Kehinde O Olasupo   Ivica Kostanic   and Tajudeen O Olasupo   

In this paper, an analytical approach for estimating the network capacity for voice communications on LTE-based public safety networks is presented. The network is modeled using Markov birth and death process. In order to provide the required Grade of Service for LTE-based public safety users, the minimum number of channels required for different levels of users' priority is calculated. The results for some performance metrics such as throughput, delay probability, and channel utilization are obtained. The results obtained from the simulation is compared with the existing network model such as Erlang C. Results show that the existing network model show similarities and differences in predicting the channel estimation of the deployed LTE networks for public safety communications. The results can help the network designer in the proper dimensioning of LTE-based public safety network.

]]>
Dec 2016
<![CDATA[On Bistable Region of Slotted-ALOHA Systems with Delay Constraints]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  4  Number  2  

Takayuki Horiuchi   Katsumi Sakakibara   and Jumpei Taketsugu   

Bistable behavior of slotted ALOHA systems has been extensively investigated. It is proved that bistable region can be eliminated by limiting the number of allowable transmission attempts per packet to eight or less. In this paper, we investigate bistable behavior of slotted ALOHA systems with delay constraints in terms of the catastrophe theory. A lifetime of a packet is confined within D slots, that is, a packet will be discarded after timer of D time-slots expired, unless packet transmission succeeds. Letting r be the packet transmission probability in a slot, we indicate that there exists bistable region, if the product Dr is greater than approximately 8.30, and that the system can operate with the unique stable equilibrium point, if Dr is less than approximately 8.30.

]]>
Sep 2016
<![CDATA[Non Contiguous Tri-band Receiver for Carrier Aggregation RF System]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  4  Number  1  

Kaissoine Abdou   and Bernard Huyart   

The carrier aggregation technique will allow an increase of capacity of the 4th Generation mobile communication networks (LTE-A: Long Term Evolution Advanced). The probability to find carriers that occupy a continuous spectrum in frequency is very low. The challenge is to demodulate an RF signal where the information is distributed on non-contiguous frequency bands. The technique presented in this paper concerns the mixing of n modulated carriers with n Continuous Wave (CW) signals by using a single three phase demodulator circuit. This technique allows reducing the conversion band of the Analog to Digital Converter (ADC) to 100 MHz. The principle is theoretically demonstrated for three non-contiguous carriers and validated by measurements results. The test was made for modulated carriers of 10 MHz or 15 MHz bandwidth by using the same QPSK modulation format or two different modulation formats (QPSK and 16-QAM). The demodulation performance is evaluated by measuring the Error Vector Magnitudes (EVM) of the transposed signals in baseband. This test shows that it is possible to demodulate a distributed non–contiguous multi-carriers RF signal in the band 2-3 GHz with a bit rate more than 300 Mbps.

]]>
Feb 2016
<![CDATA[Short Film and Video Producers and Film Policy Developments in Anglophone Sub-Saharan Africa]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  4  Number  1  

Patrick Edem Okon   

This paper examines the interventionist role of independent short film producers and alternative film foundations in film policy developments of Anglophone Sub-Saharan Africa. The work is broadly located within the framework of the debates about ‘shapers' of film policy developments and covers only the last two decades (1990-2010). Empirical data are drawn from three countries: South Africa, Ghana, and Nigeria. The data are based on a study I conducted between 2011 and 2014. The study deploys mixed method approach (oral interviews, participant observation, documentary studies, and questionnaire) in a qualitative way, to enable data triangulation and comparative analysis. Jürgen Habermas and David Sholle's configurations of the public spheres concept are used to aid interpretation and analysis. The overall ambition is to critically articulate and interpret the sociopolitical dynamics of film policymaking, reconceptualize film policy along an ‘ethical-political' framework to align with the vision of alternative cultural producers, as well as ascertain the degree and platform of participation of short filmmakers in the film policymaking processes. The paper argues in favour of greater academic and public recognition of the crucial role of low-budget film producers as policy activists.

]]>
Feb 2016
<![CDATA[Security Protocols with Privacy and Anonymity of Users]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  3  Number  4  

Nazri bin Abdullah   and Sead Muftic   

Security is very important for many Internet and mobile applications, but with the recent proliferation of tracking and profiling of users and unauthorized distribution of their personal data, user privacy is also becoming a very important issue. In addition, new technologies are introducing the possibility of innovative applications that require user anonymity. Privacy means that user identities and transactions are revealed and known only to transaction partners and only during the execution of the transaction. Anonymity, on the other hand, means that even transaction partners do not have access to that information. The requirements for providing standard security services, that require sharing of user identities and security credentials, are contrary to the requirements of privacy and anonymity. This paper describes an innovative solution to this problem: a design of extensions of standard security protocols – user authentication, key exchange protocol, and authorization protocol – to include privacy and even anonymity of users. The solution is based on the concept of a secure application proxy server, special cryptographic protocols, and encapsulated security objects.

]]>
Nov 2015
<![CDATA[Energy Efficient Coverage Optimization in Wireless Sensor Networks based on Genetic Algorithm]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  3  Number  4  

Ali Norouzi   and Ahmet Sertbas   

There has been a great deal of attention paid to Genetic Algorithm (GA). The algorithm, as a methodology, is a multi objective methodology which can be used in different fields such as self-organizing wireless sensor network. The technique examines the applied parameters and at the same time takes into consideration the fitness function by the way of or considering the whole operational modes in produced feasible states. Majority of the GA implementations in clustering algorithm only deal with optimization of few parameters including coverage and energy consumption with noticeable effect on network quality. Keeping network coverage can be modeled as mathematical programming problem which is featured with heavy load of computation. On the other hand, wireless sensor networks (WSNs) can be of dynamic nature, if so it needs to have proper reaction to events; so that slightest management decision may lead to considerable problems on the quality of the network. This problem is dealt with in this study through a hybrid method in MATLAB with the help of Genetic Algorithm toolbox and custom codes. The optimum solution was obtained by mathematical algorithm that conforms to all the mentioned parameters.

]]>
Nov 2015
<![CDATA[Towards Rule-based System for the Assembly of 3D Bricks]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  3  Number  4  

Sanguk Noh   

This paper concentrates on the design and preliminary implementation of an intelligent inference system for the assembly of 3D bricks. We model the 3D assemblage as the output of the assembly of 3D bricks. To intelligently guide the assembly of 3D bricks to the completion of a specific 3D assemblage, our system must be equipped with the component of identifying the necessary parts needed to complete the final product, and the component of checking whether the steps needed for completion are followed. Towards this end, we formulate logical rules represented as if-then rules into knowledge base. The knowledge base, thus, contains facts about the intermediate components of building bricks and their sequences given a specific domain. Our system then uses the logical rules in knowledge base and entails new facts from the knowledge base to provide a final assemblage with proper building components. Based upon the design of our system, we will develop and construct various knowledge bases for 3D assemblages, which are made for creative science education.

]]>
Nov 2015
<![CDATA[Design and Implementation of Walking Incentive Game Base on Cloud Service]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  3  Number  3  

Liwei Fu   and Hirohide Haga   

In this article, we focus on the proposal, design, and implementation of a mobile game for walking. Walking is a simple, unobtrusive, and effective sport that can help people stay healthy. Researchers have pro- posed that games, rather than being simply entertaining, can provide incentive to accomplish work that people are less willing to do. Such a game is called a serious game." In our proposed game, the player's walking steps in the real world are counted as the unique re- source and are transformed into their game character's achievement, called the territory. From an implementation point of view, we chose the iOS platform and Windows Azure cloud service as the front-end and back-end, respectively. On the iOS platform, a pedometer based on the iPhone's three-dimensional accelerator was developed to count the players' steps. In addition, Google Maps was used to represent the game situation. Azure was applied as a server to enable multi-user and interaction features. The cloud server maintains low development cost, as well as efficient usability, stability, and scalability.

]]>
Sep 2015
<![CDATA[Energy Aware Routing Using Improved LEACH Protocol]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  3  Number  3  

Mehwish Mumtaz   Aleena Mumtaz   and Muhammad N. Khan   

In this research paper, we propose an energy efficient routing protocol low energy adaptive clustering hierarchy (LEACH) for wireless sensor networks. There are many sensing nodes and sink nodes in wireless sensor network system. Routing protocol and its improvement is a major issue in wireless sensor networks. Our proposed protocol is the modification of LEACH. The main idea is to increase the network life and maximizes the throughput. In this research paper, residual energy is to be considered for the selection of cluster head from various nodes. Time division multiple access (TDMA) technique is used for the communication between common nodes and cluster head. Cluster head (CH) chooses code to be used in its cluster and code division multiple access (CDMA) technique is used between clusters. The comparison between improved versions of LEACH protocol shows that multi-hop LEACH shows significant improvement than energy LEACH (E-LEACH).

]]>
Sep 2015
<![CDATA[Economic Model for FTTH Access Network Design]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  3  Number  3  

Z. Havic   and B. Mikac   

Many telecom operators nowadays are gradually increasing their bandwidth offers, by either shortening the copper lengths to the user (e.g. to introduce VDSL) or by reducing the shared service areas for HFC (e.g. to adopt DOCSIS 2.0/3.0). This policy brings the fibre closer to the user, and it is one of the strategies taken by BH Telecom Sarajevo. However, there is an intention to perform the switchover to FTTH. In the paper are evaluated rollout scenarios for FTTH in Bosnia & Herzegovina in rural, suburban and urban area. The intention is to determine the general feasibility of a nationwide FTTH rollout in Bosnia & Herzegovina together with a thorough comparison between the different areas. In addition an analysis and estimation are presented showing the influence and importance of parameters in the final evaluation of an FTTH rollout. Model proposed one can use in other countries, taking into account specific local conditions. In all analyses cost evaluation is carried out.

]]>
Sep 2015
<![CDATA[A New Decentralized Cryptographic Access Control Solution for Smart-phones]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  3  Number  2  

Ernst Piller   and Fernando Moya de Rivas   

As the wireless technologies are becoming more and more popular and the number of cloud providers increases due to the growing demand of services and new emerging concepts like "Cloud computing", security concerns are gaining a leading role. Data storage follows deprecated systems which make the cloud more vulnerable to data leakage. Besides, commmon cellphones have evolved to small pocket computers known as smart-phones, running their own Operating System. These devices are suffering every year an increment of cyber-attacks owing to weaknesses regarding the Operating System policy and the fact of using wireless standards such as GSM, UMTS, LTE, Wifi or Bluetooth. Over this document, we propose a new access control solution based on a cryptographic system managed by the end-user to add extra security to one's personal information on the cloud. It is orientated to smart-phones and takes into account the computational limitations these devices may have.

]]>
May 2015
<![CDATA[Improvement of Lafortune-Lacrous Indoor Propagation Model at 1900 MHz Band]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  3  Number  2  

Ali Bendallah   and Ivica Kostanic   

A new improvement approach to Lafortune-Lecours indoor propagation model is presented. Taking into consideration; different types of walls that have been not considered in the model. The concrete and brick walls cause considerable severe signal deterioration when they obstruct the transmission path of the signal. Improvement of the above mentioned model is achieved by computing the path loss through those kinds of obstructions by adding some parameters and terms to the existing model.

]]>
May 2015
<![CDATA[Practical Attack on Wi-Fi Protected Access Version 2 Authentication Protocol]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  3  Number  2  

Vincent N. Omollo   and Ruth K. Chweya   

Wireless networks provide convenient and low cost mechanism for connecting network devices. They are ideal since they do not require physical connections. They therefore help to overcome the port limitations of the physical hardware. Any device that has radio receiver can detect these wireless signals. This is because a wireless router transmits the signals uniformly in all directions. The ease with which connections can be established forms one of the weaknesses of wireless networks. They are therefore exposed to many attacks as these attacks can be launched from a remote location, unlike in wired networks where one needs physical connections to the network of interest. To overcome this challenge, authentication protocols have been developed to deter any illicit access to wireless networks. These protocols include Wired Equivalent Privacy(WEP) and Wi-Fi Protected Access (WPA). Wi-Fi Protected Access version 2 (WPA2) is the later version of WPA. The objective of this research paper was to demonstrate that WPA2 can still be broken, hence compromising on the Confidentiality, Integrity and Availability (CIA) of the data being transmitted in wireless networks. Data Confidentiality, Integrity and availability has been referred to as the CIA triad in this paper. The set up was implemented in Ubuntu 12.04 operating system using Ettercap, File2air, Khexedit, Wireshark and Airodump-ng from Aircrack-ng suite. The results indicated that WPA2 does not actually protect data in transit in wireless networks, and therefore there is need to explore other technologies that can secure wireless networks.

]]>
May 2015
<![CDATA[The Usage Analysis of Web and Email Traffic on the University Internet Backbone Links]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  3  Number  1  

Shwan Dyllan   Dilip Saravanan Ganeshacumar   and Perry Xiao   

We present our latest study on monitoring and analyzing the behavior of the LSBU (London South Bank University) data network traffic as well as identifying and understanding the usage of http traffic, mail traffic and overall traffic. This analysis of the network activity allows us to calculate accurately the importance of the network traffic characteristics, on a continuous basis, which can identify the data traffic patterns on the overall gateway and highlight the end-to-end performance of the network path. In this paper, the PRTG network monitoring tool (Paessler AG, Germany) has been chosen as this provides the capabilities of SNMP, port utilisation as well as sFlow. The objectives of the study are to point out the impact of the LSBU network performance and its congestions current state; to predict the future data network traffic and congestions; to focus on the usage of mail against the mostly used protocol such as http and https; to identify the venerability of the network, due to high usage in particular time of the day; and to check the capacity usage of the current resources to maximize performance and network utilization.

]]>
Feb 2015
<![CDATA[Detection of Sybil Attacks in Vehicular Ad Hoc Networks]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  3  Number  1  

Muhammad Saad Naveed   and M Hasan Islma   

Until recently vehicles and transportation systems were considered as the realm of mechanical engineers, but the need for the road safety and desire to be connected to the world, has broaden the industry scope. In order to do so Intelligent Transport System has been introduced and for few years, Vehicular Ad hoc Networks are getting much attention. The advance developments, wireless communication and life safety point towards to take into consideration the need of security in VANETs. In VANET, many attacks are possible and can cause serious damages to life. One such attack is Sybil attack. Sybil attacks have been regarded as a serious security threat to Ad hoc Networks and Sensor Networks. They may also damage the potential applications of Vehicular Ad hoc Networks (VANETs) by creating a deception of traffic congestion. Here we look on how the Sybil attack works and possible ways that an attacker can cause harm by launching these types of attacks in VANETS, along with the detection schemes that can be used to identify Sybil nodes and prevent the network from various hurtful effects.

]]>
Feb 2015
<![CDATA[Effect of Variable Cyclic Prefix Length on OFDM System Performance over Different Wireless Channel Models]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  3  Number  1  

Amar A Al-jzari   Ivica Kostanic   and Khalid Hassan Mohamed Mabrok   

A Cyclic Prefix (CP) is a significant feature of an OFDM waveform. It is used to completely eliminate both Inter-Symbol Interference (ISI) and Inter-Carrier Interference (ICI) as long as the CP length is greater than the channel delay spread. By eliminating both ISI and ICI, the CP compensates for the effect of the multipath dispersion; but it consumes a considerable amount of the scarce spectrum and the power. Conventional OFDM uses a fixed and large CP length to overcome the ISI caused by channel delay spread under wireless mobile environment. This approach may degrade the overall spectral efficiency as well as consumes relatively more transmitter energy. Therefore, there is a need to adopt the CP length according to instantaneous channel parameters. In this paper, we presented a method for investigating the effect of varying the CP length on OFDM system performance over different multipath channel models. We estimated the variable CP length based on the RMS delay spread of the channels’ power delay profile (PDP). According to this method, the estimated CP length optimizes the system capacity and improves the overall system performance. We showed that this approach could lead to a mathematical formula presenting the relationship between the CP length and the RMS delay spread of the channels.

]]>
Feb 2015
<![CDATA[Grey Wolf Optimization for Multi Input Multi Output System]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  3  Number  1  

Ahmed A. M. El-Gaafary   Yahia S. Mohamed   Ashraf Mohamed Hemeida   and Al-Attar A. Mohamed   

Grey wolf optimizer (GWO) is a new technique, which can be applied successfully for solving optimized problems. The GWO indeed simulates the leadership hierarchy and hunting mechanism of grey wolves. There are four types of grey wolves which are alpha, beta, delta and omega. Those four types can be used for simulating the leadership hierarchy. In order to complete the process of GWO a three main steps of hunting, searching for prey, encircling prey and attacking prey are implemented. This work describes a novel meta-heuristic based on grey wolf optimization for optimum allocation of STATCOM devices on power system grid to minimized load buses voltage deviations and system power losses. Bus voltages have been solved by controlling the reactive power of shunt compensator. The Contingency management problem (such as system over-loading and a single line outages) by optimum installation of STATCOM devices, has been presented. Simulations are performed on IEEE 30-bus power system indicate that the proposed approach is a powerful search and optimization technique that may yield better solutions to engineering problems than those obtained using traditional algorithms.

]]>
Feb 2015
<![CDATA[A Model to Determine Quantitative Savings that Can be Achieved through an IXP Via Peering-A Case Study of ISPs in Kenya]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  7  

Esther Makori    and Cyrus Wekesa Wabuge   

Internet Service Providers (ISPs) in developing countries are incurring high operating costs. Developing countries local Internet traffic is billed at the same rate with internationally accessible content hence high operating cost for the ISPs. If ISPs use the right interconnection models they can be able to reduce the high Internet cost, reduce latency and increase access speed. In this paper the author has developed a model to determine quantitative savings that can be achieved through an Internet Exchange Point (IXP) via peering. Peering model is preferred when there is high ratio of local traffic to international traffic while the Transit model is preferred when there is high ratio of international traffic to local traffic. Savings increase when the ratio of local traffic increases and savings decline when the ratio of international traffic increases.

]]>
Dec 2014
<![CDATA[Hybrid Cryptography Enhanced Adaptive Acknowledgment (HCEAACK) Intrusion Detection System]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  7  

Baseem Adnan AL-Twajre   and Wilson Jeberson   

A mobile Ad-hoc network (MANET) is a wireless network that does not rely on any fixed infrastructure (i.e., routing facilities, such as wired networks and access points), and whose nodes must coordinate among themselves to determine connectivity and routing. The traditional way of protecting networks is not directly applicable to MANETs. Many conventional security solutions are ineffective and inefficient for the highly dynamic and resource-constrained environments where MANETs use might be expected. Since prevention techniques are never enough, intrusion detection systems (IDSs), which monitor system activities and detect intrusions, are generally used to complement other security mechanisms. So, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. To provide high security for information on MANETs, Intrusion Detection Systems (especially that based on acknowledgment packets) used different types of cryptographic algorithms to protect the acknowledgment packets from attacks of intruder. These cryptographic algorithms are required to provide data security and user's authenticity. In this paper we proposed an intrusion-detection model to protect MANETs from attacks named Hybrid Cryptography Enhanced Adaptive Acknowledgment (HCEAACK) based on acknowledgment packets. In order to ensure the integrity and high level of security of the proposed model, acknowledgment packets encrypted and digitally signed by its sender before they are sent out and verified by its receiver until they are accepted, for this purpose we use hybrid cryptography Technique. This hybrid cryptography Technique has been used to detect hacking on the acknowledgment packets in intrusion detection systems like RSA hacking problem that appears in other pervious system. We used two algorithms to implement our Hybrid Cryptography technique, Advanced Encryption Standard (AES) algorithm and RSA algorithm. The two algorithms are cooperated to give more security to acknowledgment packets. The proposed model has been compared with other popular mechanisms like watchdog, Two Acknowledgment (Two-ACK), Adaptive Acknowledgment (AACK) and Enhanced Adapted Acknowledgment (EAACK) through simulation by Network Simulator NS 2.34. To evaluate the performance of IDS for existing and proposed technique we estimated the values of three performance metrics Packet delivery factor (PDF), Routing Overhead (OH) and Average end-to-end delay (D) in many scenarios. Compared to contemporary approaches, our proposed model demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.

]]>
Dec 2014
<![CDATA[On the Dynamic Flows in Networks]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  6  

Erusalimskiy Iakov   

Considered dynamic network flows identically zero on the negative time axis. The concept of the frontal flow is introduced for such flow. The article contains the theorem about the decomposition of the dynamic flow on an arbitrary time interval on the sum of two flows, the first of which is equivalent to the original flow on the interval and equals to zero outside the interval, the second flow is equivalent to zero on the interval and coincides with the initial flow outside of the interval. The first is minimum flow which equals the original flow at a given time interval.

]]>
Sep 2014
<![CDATA[LTE-Advanced: Techno Economical Perspective]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  6  

Usman Zareen   

The purpose of this research paper is to have the high level knowledge of LTE-Advanced and to study techno-economic perspective of LTE-Advanced. LTE is the predecessor of LTE-Advanced and is release 8 and release 9 of 3GPP. LTE-Advanced is release 10 of 3GPP and also Release 11 which is the more improved version of LTE-Advanced. In release 11 improvements are made and some new features are introduced to further enhance the capabilities of LTE-Advanced. The main aim of LTE-Advanced is to support the higher data rates, improved cell edge throughput and quality of service. To achieve the goals set for LTE-Advanced new technological features are introduced. These features include relay, Comp heterogeneous networks Advanced heterogeneous network feature is new and other features were taken from LTE, as LTE-Advanced is the improved version of LTE.

]]>
Sep 2014
<![CDATA[User Profiles and Identifing User Behaviour in the Cloud Computing Environment]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  5  

Rasim Alguliev   and Fargana Abdullaeva   

In this paper, for the detection of the masquerade attacks in the cloud infrastructure collaborative filtering algorithm based on the cloud model is proposed. One of the advantages of this model is the identification of the similarity between the users on the basis of the cloud model. While using the similarity measurement method based on the cloud model, it does not require a strict comparison between the score value of operations used by different users. Here we provide the calculation of the statistic features of the score values of all operations used by the user at the access point, then we provide a comparison of statistics features of the input data and based of these we determine the similarity between the input data.

]]>
Jul 2014
<![CDATA[A Survey on Dynamic Spectrum Access via Cognitive Radio: Taxonomy, Requirements, and Benefits]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  4  

Jide Julius Popoola   and Rex van Olst   

Conventionally, interference protection among radio spectrum users is guaranteed through a policy of spectrum licensing that provides exclusive access to licensed users. However, as it is becoming extremely difficult to satisfy the growing demand for radio spectrum with this conventional policy, a flexible policy that can improve radio spectrum access and utilization without causing interference amongst users has recently gained increasing interest. In this context, this paper presents a comprehensive survey on flexible radio spectrum management with full focus on a cognitive radio technology application for dynamic spectrum access. The study approach involves analytical evaluation of the performance of the current fixed radio spectrum allocation policy examining both technical and economic perspectives. The result of which shows that the current fixed radio spectrum management policy is too rigid, inefficient and out-dated and needed to be replaced with a flexible radio spectrum management policy. Based on this analytical result, an in-depth survey on innovative technology and standards for a dynamic spectrum management model that can enhance an increase in spectral utilization and coexistence of multiple radios with adequate interference free communication was carried out. The paper also discusses the interrelationship between technologies, business and policies for cognitive radio standardization for seamless wireless communication. In addition, the paper presents both the technical and economic benefits of the dynamic radio spectrum management model over the current fixed radio spectrum allocation policy. The paper was finally concluded recommending the commercial adoption of dynamic spectrum access worldwide keeping in mind all the benefits of the dynamic spectrum access model and standards in place to ensure interference free communication in a cognitive radio environment.

]]>
May 2014
<![CDATA[The Impact of Critical IPTV Factors on Customer Satisfaction]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  4  

Abdul Nasir   and Shahzada Alamgir Khan   

The aim of this paper is to find out and check critical factors, which have a great impact over IPTV Customer Satisfaction. The research studied factors like Quality of Services, Channel Zapping Time and Repairing Packet Loss in network for Customer Satisfaction. The research is based upon primary data, which was collected through a questionnaire from the respondents of IPTV customers. The correlation analysis was applied to get the research results. The correlation showed positive significant relationship among all the variables. This research will help the telecommunication managers and engineers to reengineer and design their IPTV services strategies, which is helpful to maximize IPTV Customer Satisfaction.

]]>
May 2014
<![CDATA[Performance Enhancement of LTE through Interference Reduction Techniques]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  3  

M.Sugacini   and N.Kumaratharan   

Long Term Evolution (LTE) is the standard for wireless communication of high speed data and mobile terminal. Among the current emerging technologies like LTE based on orthogonal frequency division multiple access (OFDMA) technique, it found to be more attractive for high speed wireless communication. However co-channel interference (CCI) from the neighbouring cells is one of the limiting factors that degrade the LTE system. Fractional frequency reuse (FFR) technique is proposed to overcome the same as it is suitable for idealized cellular layout since power is not considered in this scheme. In this paper FFR is generalized and sub band allocation among user is made in optimal manner which increases the performance of the system.

]]>
Mar 2014
<![CDATA[Traditional Frequency Selective Surface versus Substrate Integrated Waveguide Frequency Selective Surface]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  3  

I. El-Mongy   and A. M. M. A. Allam   

This paper is devoted to analysis design and fabrication of both traditional and substrate integrated waveguide (SIW) frequency selective surfaces (FSS) of square elements and square lattice. The transmission loss is studied for different angle of incidence; normal, thirty, forty five and sixty degrees. Moreover the common band for different angle of incidence is determined. The FSS is fabricated on Rogers RO4350 (lossy) of relative permittivity 3.33, thickness 1.524mm and loss tangent 0.004. The arrays provide different resonance due to different current modes. It is simulated using CST MWS and measured using the network analyzer. There is a good agreement between the transmission loss of both the simulated and measured results.

]]>
Mar 2014
<![CDATA[Secure Hybrid Routing Protocol Based on Unobservable Identity in MANET]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  3  

A.Menaka   and N.Kumaratharan   

Mobile Ad-hoc Networks (MANETS) are particularly useful and well-suited for critical scenarios, including military, law enforcement as well as emergency rescue and disaster recovery. An unobservable secure hybrid routing protocol (USHR) scheme achieves content unobservability by employing anonymous key establishment based on group signature for improving the performance of a routing protocol in terms of packet delivery ratio (PDR) is proposed in this paper. USHR is efficient it uses a novel combination of group signature and ID-based encryption for route discovery. The main objective of this work is to develop a privacy preserving routing protocol scheme that consumes low network delay, minimum packet loss, and maximize the network capacity. By implementing a USHR protocol using advanced hashing technique in NS2 and designed by using spread spectrum technique, the performance of USHR Protocol is improved and the same is proved through NS2 simulation compared with USOR protocol. Due to incomplete content protection complete unlinkability and unobservability are not guaranteed. The simulation results show that USHR not only has performance compared to USOR, and also achieves stronger privacy protection than existing schemes like USOR.

]]>
Mar 2014
<![CDATA[Diagnosing Salem University Lokoja Network for Better Network Performance]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  2  

Onwudebelu Ugochukwu  Datukun Kalamba Aristarkus  and S. E. Adewumi  

With the increasing levels of deployment of various forms of high-speed (or broadband) services within today's Internet, there is new impetus to find some usable answers that allow both providers and users to place some objective benchmarks against the service offerings. Furthermore, with the lift in access speed with broadband services, there is an associated expectation on the part of the end user or service customer about the performance of the Internet service. It should be "better" in some fashion, where "better" relates to the performance of the network and the service profile that is offered to network applications. And not only is there an expectation of "better" performance, it should be measurable. This paper is concerned with the measurements of the network (IP Network) performance in Salem University and its necessary measurement results.

]]>
Feb 2014
<![CDATA[Performance with MIMO for the Downlink 3GPP LTE Cellular Systems]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  2  

Yaser Barayan   Ivica Kostanic   and Kusay Rukieh   

High spectrum efficiency is one of the goals for 3GPP Long-term Evolution (LTE) cellular networks. This paper provides evaluation of the downlink (DL) transmission in LTE. The evaluation is performed for a regular hexagonal multi-cell deployment, universal frequency reuse scheme2x2 Multiple Input Multiple Output (MIMO) antenna configuration and varying packet scheduling algorithm. This study evaluates the advantages and benefits of combining several spectrum efficiency improvement techniques over multipath selective fading channel conditions and various bandwidth sizes (BW). The proposed paper compares MIMO improvements to Single Input Single Output (SISO) scenario in terms of cell and user throughputs. The evaluation is performed through a custom simulation package developed for this purpose. .

]]>
Feb 2014
<![CDATA[Technical Configuration of Portable/Mobile TV White Space Devices: A Conceptual View]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  2  

Igor Gepko   

As is known, to eliminate interference, the frequency reuse approach is followed in Digital TV planning similar to cellular network, avoiding the use of the same channel in two neighboring allotments. There are large areas where a certain group of TV channels are deliberately not used. They are called white spaces in TV spectrum (TVWS). Considering the great economical value of TV spectrum, it was proposed to use TVWS for low-power wireless networking on non-interfering (secondary) basis with the licensed (primary) DTV service. At the same time, restrictions imposed on white space devices (WSDs) to protect primary users should not devaluate spectrum for secondary use. The lack of knowledge about the locations of primary receivers as well as unreliability of estimation of the aggregate interference impact caused by the large number of secondary devices accessing the spectrum are reported to be among the key challenges for the use of TVWS. In our view, parameters for protection of primary system should be based on the determination of minimum separation distance, observance of which at a certain area could be ensured. The required shadow margin as well as multi-user margin will be calculated for such minimum safety range. To reuse spectrum efficiently mobile/portable WSDs should support dynamic power control ability which has to be a key role of sensing and operate with the lower power where TV signal is weak. Except of providing WSDs with a list of available channels, the geolocation database should contain recommended parameters for path loss calculations as well as minimum distances which could be ensured for a certain inhabited locality.

]]>
Feb 2014
<![CDATA[Performance Analysis of Priority Schemes for IEEE 802.11e Wireless Local Area Networks Using Multiple Flows Distributed Weighted Fair Queuing Algorithm]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  1  

Chien-Erh Weng   and Ho-Lung Hung   

In this paper, a novel and simple search algorithm called distributed weighted fair queuing (DWFQ) algorithm is proposed for the quality-of-service (QoS) in IEEE 802.11e wireless local area networks (WLANs). We first propose that the IEEE 802.11e enhanced distributed coordination function (EDCF) is an efficient algorithm to support the QoS in WLANs, although it can provide more bandwidth to packets with higher priority. However, when the system under heavy traffic load situation, IEEE 802.11e EDCF can’t guarantee the fair allocation of excess bandwidth of each access categories (ACs), i.e., under heavy traffic load, EDCF guarantees the QoS of packets with higher priority by reducing the QoS of packets with lower priority. This paper discuses an EDCF scheme, in order to distribute bandwidth fairly among different ACs under heavy traffic load situation in WLAN, we propose multiple flows DWFQ algorithm. This algorithm not only supports the concept of differentiating ACs with different priorities but also guarantees the fair allocation of each ACs according to their relative weights. Furthermore, in this propose a mechanism to resolve the overload situation problem and doubling contention window (CW) method to reduce the collision probability. The simulations performed show that multiple flows DWFQ with doubling CW method which can perform an attractive performance even under heavy traffic load.

]]>
Jan 2014
<![CDATA[A Novel Method Intrusion Detection Based on Sending and Checking Packet for Neighbored Nodes in MANET]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  1  

Dina sadat Jalali   and Alireza Shahrbanoonezhad   

Mobile Ad hoc network is a constant infrastructure wireless network whose installation and use are easy and in progress. In this network, nodes in each other’s radio range can directly communicate. Furthermore, this network has such properties as nature of transfer medium, finite power and energy, low bandwidth and restricted resources which facilitate intrusion to and destructive action in it. Mobile Ad hoc network does not have special defense mechanisms, resulting in the competition to give strategies and make security and intrusion detection possible. Routing is the most important problem that with this network which is done by nodes. Existence of a malicious node is a problem the routing can handle. This paper will present one new method of intrusion detection that precisely identifies malicious nodes which change the received packets or prevent them through surveying adjacent nodes in a simple way. Through this method, rate of false alarm will be reduced as simulation procedures indicate its superiority.

]]>
Jan 2014
<![CDATA[Preferences and Distribution of Cloud Computing Approaches and Types by Industry Players]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  2  Number  1  

Ducn Wga   and Kefa Rabah   

Cloud Computing (CC), a utility mode of distribution of automation resources is fast becoming popular with industry practitioners who adopt by subscribing with cloud vendors or providers on particular approaches or “flavor”. There are many iterations that companies look to in order to actually use the technology. However, clients of cloud computing services currently have no direct means of verification as to the best or most popular flavor of cloud to adopt. This has led to users adopting expensive and less popular flavors of CC. Four approaches of cloud are considered in this paper namely private, public, hybrid and community clouds in which are three types of services i.e. Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). This study groups Enterprises as small size, midsize, and large while industries as service industry, government and manufacturing. Past studies are considered and findings analyzed to achieve the objective of this paper. An attempt is made to find out the distribution of the various cloud types in various enterprises with a view to finding the most popular and reasons for the popularity thereby guiding new entrants to the cloud market.

]]>
Jan 2014
<![CDATA[On the impact of the initial peer list in P2P live streaming applications: the case of Sopcast]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  4  

Imane Mnie-Filali   Soufiane Rouibia   Dino Lopez-Pacheco   and Guillaume Urvoy-Keller   

The acronym P2PTV, which stands for Peer-to-Peer Television, refers to P2P applications that enable multimedia contents broadcasting through the Internet. These applications have become very popular due to their capability of delivering material with or without copyright protection to a large audience. In P2PTV applications, the start-up phase – from the moment the client joins an existing channel to the moment she can start viewing the content – is crucial. A long time before showing the first images of a video, can make a user switch to another channel or to an alternative P2P application. Later on, the same user behavior is expected in case of frozen images. In this paper, we consider the case of Sopcast, which is currently one of the most popular P2PTV applications. Sopcast recently modified its start-up algorithms. We uncover the details of the new strategy adopted by Sopcast and evaluate its performance as a function of the swarm size and the geographic source of the content.

]]>
Dec 2013
<![CDATA[Severe Performance Effects of Combined Jamming Interferences and Rayleigh Fading with Mitigation using Joint Complex Spreading and MIMO]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  4  

Ric A. Romero   and Tri T. Ha   

In communications systems under jamming interference, it is customary to employ spread spectrum techniques to combat performance degradation. In systems with fading, spatial diversity techniques such as MIMO schemes are usually used to mitigate the problem. Here, we analyze and show the extremely severe effects on BER performance of the combined jamming signals and Rayleigh fading of a system undergoing both conditions at the same time. Then, we analyze and derive the performance of systems employing joint MIMO and complex spreading schemes to combat both Rayleigh fading and jamming and note the significant mitigation improvements.

]]>
Dec 2013
<![CDATA[Path Loss Models for LTE and LTE-A Relay Stations]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  4  

Masoud Hamid   and Ivica Kostanic   

Relaying technology is an essential part of 3GPP LTE-Advanced (3rd Generation Partnership Project Long Term Evolution - Advanced). This paper evaluates the path loss encountered on the backhaul link of relaying systems. The evaluation is based on an extensive measurements performed in 1900 MHz frequency band. The validity of different propagation models for multiple relay antenna heights is examined. The results of the analysis reveal that the applicability of commonly advocated models for relaying environment is still questionable. Some modifications of the original forms of the discussed models are introduced to make their predictions more reliable. With the proposed modifications, the analyzed models show good agreement with measurements. The prediction error is smaller than 0.37 dB, on average, and the accuracy ranges from 2.23 to 6.40 dB.

]]>
Dec 2013
<![CDATA[Evaluation of Quality of Service in 4th Generation (4G) Long Term Evolution (LTE) Cellular Data Networks]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  3  

Fahad Alomary   and Ivica Kostanic   

The area of study proposed in this paper is the evaluation of the Quality of Service (QoS) provided by a Long Term Evolution (LTE) cellular data network. It is aimed to address the gap between the technical capabilities and the QoS experienced by the user. The analysis is based on the live data that are collected on commercial cellular network and compared against broadband wireless LAN. A methodology for QoS assessment based on a relatively small set of Key Performance Indicators (KPIs) is devised. The measured data are used to verify the proposed methodology.

]]>
Nov 2013
<![CDATA[Learners' Preparedness for Digital Learning Materials as Supplement of Self-Learning Materials of Open School of Bangladesh Open University]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  3  

Khan Ferdousour Rahman   and Sabina Yeasmin   

Despite the imperatives of policy and rhetoric about integration of Information and Communication Technologies (ICTs), the Open School of Bangladesh Open University often uses digital learning materials as an ‘add-on’ in few courses of programs. Current government’s agenda of implementing ‘Digital Bangladesh’ provides a key to harnessing the educational potential of digital resources, Internet communications, virtual interactive classroom and interactive multimedia to engage the interest, interaction, and knowledge construction of disadvantaged learners of the Open School at Bangladesh Open University. To the extent that such approaches go beyond and transform traditional open schooling model. This paper investigates the changing requirements and new possibilities represented by the challenges of integrating ICTs in open school programs in a way which at the same time connects more effectively with both the specific contents of the curriculum and the various stages and elements of the learning process. Case studies from Open School of Bangladesh Open University courses provide an exemplary focus of inquiry in order to better link relevant new theories or models of learning with digital materials, to see learner’s preparedness related learner-centered strategies for integrating ICTs resources and tools, and to incorporate interdependent functions of learning as information access, communication, and applied interactions. This study suggests that designers should provide “ICTs supported learning activity” keeping the preparedness of the learners so that it becomes effective.

]]>
Nov 2013
<![CDATA[Engaging Disaster Prone Communities; Pre-impact Media Blitzing]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  3  

Dr Douglas Goudie   

Recent research shows fire-prone residents and regional fire managers in SE Australia converge in wanting more local, detailed information available to the threatened, and that this does not happen in a vacuum. Communities in hazard zones need to be and feel engaged with the realities of their local threats, empowered and supported to act, maximising their own and their community’s safety. This paper shows that engaged, informed communities can be fostered through emerging use of the internet and Common Alert Protocols. More geographically targetted pre-impact media exposure about the likely extent and impacts of the threat is recommended.

]]>
Nov 2013
<![CDATA[An Enhanced Algorithm for MANET Clustering Based on Weighted Parameters]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  3  

Wojciech Bednarczyk   and Piotr Gajewski   

Mobile Ad-Hoc network (MANET) is a type of communication network which is used for data communication between a mobile nodes using wireless channels. Clustering has evolved as an important research topic in MANETs as it improves the system performance of large MANETs. Clustering is a process that divides the network into nodes groups, called clusters. Each cluster has a Cluster Head (CH) as coordinator within the substructure. This paper proposes a clustering technique for MANETs, which is weighted clustering algorithm. The performances of this algorithm is evaluated through simulation and the results are encouraging.

]]>
Nov 2013
<![CDATA[BER Enhancement of MC-CDMA through B-STTC Based STBC and STBC Based B-STTC Site Diversity Techniques]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  3  

M.Pushpakodi   and N. Kumaratharan   

The combination of multiple antennas and multi-carrier code division multiple access (MC-CDMA) is a strong candidate for the downlink of future mobile communications. The advancement of such systems, in scenarios that model real life transmissions is an additional step towards an optimised achievement. Nevertheless, when transmitting over fading channel multi-cell interference occurs and this degrades the performance of the system. Site diversity technique is applied to the system to overcome multi-cell interference. Due to non orthogonality of spreading codes multi-cell interference is not completely eradicated. To overcome this problem, space time block code (STBC) based space time trellis code (STTC) site diversity technique was introduced to reduce multi-cell interference. In this paper, balanced STTC (B-STTC) based STBC site diversity is proposed to further improve the performance of MC-CDMA system by mitigating multi-cell interference and is extended to STBC based B-STTC site diversity technique. Simulation result shows that STBC based B-STTC site diversity outperforms B-STTC based STBC site diversity technique.

]]>
Nov 2013
<![CDATA[Performance Analysis of Finite Population Cellular System Using Channel Sub-rating Policy]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  2  

P. K. Swain and V. Goswami 

This paper illustrates a channel sub-rating allocation policy for finite population cellular system. In this policy, certain channels are permitted to transiently divide into two channels at half the original rate to adapt handoff calls. As a result, one half can be employed to serve the existing call and the other half to serve the handoff request so that we can get rid of forced termination of calls. We propose two system models based on fractional guard channel and sub-rating channel allocation policies with and without queuing of handoff calls which give a significant improvement in the QoS of the cellular network. New call blocking probability, handoff call forced termination probability and the degraded call quality are also investigated to examine the effects of the sub-rating on the QoS. Our policies have the least forced termination probability and the call incompletion probability when compared with the other policies.

]]>
Sep 2013
<![CDATA[Design of Pattern Reconfigurable Linear Array Antenna for Multi-band Application]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  2  

D.Rama Krishna and V.M. Pandharipande 

The design of Tri-Band, 1X8 Linear Antenna Array that operates in three bands 5.4GHz, 6.2GHz, 9.2GHz with the perspective that the antenna array has multiple resonating frequencies and is able to modify its radiation pattern as well, using Micro-strip Patch Antenna elements in combination with PIN Diodes and beam can be steered in each iteration by controlling the supply of PIN Diodes.

]]>
Sep 2013
<![CDATA[Modified LLMS Algorithm for Channel Estimation in Noisy Environment]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  2  

Dinesh B.Bhoyar C.G. Dethe and M.M. Mushrif 

Intersymbol interference caused by multipath in band limited frequency selective time dispersive channels distorts the transmitted signal, causing bit error at receiver. ISI is the major obstacle to high speed data transmission over wireless channels. Channel estimation is a technique used to combat the intersymbol interference. The objective of this paper is to improve channel estimation accuracy in MIMO-OFDM system by using modified variable step size leaky Least Mean Square (MLLMS) algorithm proposed for MIMO OFDM System. So we are going to analyze Bit Error Rate for different signal to noise ratio, also compare the proposed scheme with standard LMS channel estimation method

]]>
Sep 2013
<![CDATA[The OSA-MIMO Technologies for Future Wireless Communications]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  2  

J. Pawelec M. Suchański K. Kosmowski and T. Szymczyk 

The article analyses the role of Multiple Input - Multiple Output (MIMO) and Opportunity Spectrum Access (OSA) technologies in future Cognitive Radio (CR). The model of two networks operating in the same frequency band under Rayleigh fading conditions is studied in detail. The network of licensed users called the primary operates in SISO mode, while the secondary one - in MIMO mode. The results of the analysis are encouraging. For the future it is proposed that the networks should be equipped with a dense grid of spectrum sensing detectors and OSA-routers.

]]>
Sep 2013
<![CDATA[Performance Enhancement of MC-CDMA System through Turbo Block Codes]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  2  

Parvathy S Kumar and N. Kumaratharan 

Multi carrier code division multiple access (MC-CDMA), a strong contender for future mobile communication is a combination of orthogonal frequency division multiplexing (OFDM) and code division multiple access (CDMA). Turbo coding technique can be used for improving the performance of MC-CDMA system in terms of bit error rate (BER). The objective of this work is to form a coding scheme that reduces BER of MC-CDMA system. In this paper a time domain turbo block code (TBC) designed using powerful low density parity check (LDPC) code is used in MC-CDMA system for improving the BER performance and the same is proved through simulation. This code also has error correction capability along with high performance efficiency in terms of BER.

]]>
Sep 2013
<![CDATA[Effective E-government Management Mechanisms: Conceptual Approaches]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  2  

Rasim Alguliev and Farhad Yusifov 

Principals of development of e-government formation and management mechanisms are researched. Application of web-technologies and social networks in administration of e-government is reviewed. Approaches related to transformation of government administration are analyzed and feedback mechanisms are proposed for effective management of e-government.

]]>
Sep 2013
<![CDATA[Performance Analysis of Essential Modulation Techniques]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  2  

D.M. Motiur Rahaman 

The process of changing some characteristics (e.g. amplitude, frequency or phase) of a carrier wave in accordance with the intensity of the signal is known as modulation. This process is needed to reduce practical antenna length, to increase operating range, and efficient radiation of an antenna. Generally this modulation involves amplitude modulation, frequency modulation, and phase modulation. Only this is not enough study in communication in deep we need more modulation sub classes such as PAM, QAM, PSK, BPSK etc which is useful in communication system . But those systems have some complexity and various relative disadvantages. Most powerful relative disadvantage is symbols error rate. So for less error free communication we need analysis PAM, QAM, PSK, and BPSK.

]]>
Sep 2013
<![CDATA[Elevation Variation with Low Earth Orbiting Search and Rescue Satellites for the Station Implemented in Kosovo]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  1  

Shkelzen Cakaj 

NOAA's (National Oceanic and Atmospheric Administration) - LEO (Low Earth Orbit) environmental satellites provide continuous coverage of Earth, supplying high-resolution global meteorological, oceanic and space observation data what are too important in aerospace and maritime. In addition, these satellites are part of the international Search and Rescue Satellite Aided Tracking (SARSAT) system. SARSAT is a satellite system designed to provide distress alert and location data in order to assist on search and rescue operation. The position of the satellite within its orbit considered from the ground station point of view is defined by Azimuth and Elevation angles. There is a direct relationship between communication duration and maximal elevation. Higher maximal elevation provides longer communication between the satellite and a Local User Terminal (LUT). Longer communication provides more Doppler events providing higher accuracy on location determination. Passes with too short communication duration, consequently with no data provided are considered as missed passes. Under assumption that the LUT is implemented in Kosovo, it is simulated the variation of elevation for different orbits for a period of one month. Simulation about elevation variations, among SARSAT satellites and local user terminal dedicated for search and rescue services is provided through this paper.

]]>
Jul 2013
<![CDATA[A Survey on Rural Broadband Wireless Access Using Cognitive Radio Technology: IEEE 802.22 Wireless Regional Area Networks]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  1  

M.Ravi Kumar S.Manoj Kumar and M. balajee 

The previous and most popular broadband wireless technology i.e. WiMAX which is limited about to 10 miles, there are power and line of sight issues yet to be resolved for a broader coverage area. WiMAX deployment is therefore limited to densely populate metropolitan areas. What about rural and sparsely populated, geographically dispersed regional areas? Here is the upcoming solution for that which is implemented by IEEE .The IEEE 802.22 standard defines a system for a Wireless Regional Area Network i.e. WRAN that uses unused or white spaces within the television bands between 54 and 862 MHz, especially within rural areas .The 802.22 standard is the first standard to adopt cognitive radio spectrum sensing as a means of gaining greater use of the radio spectrum. Cognitive radios are to provide broadband wireless access (BWA) in the licensed TV bands on a secondary access basis. This concept is examined to see under what conditions BWA could be viable. Rural areas require long range communication which cognitive radios may not be able to support with enough secondary spectrum. By using cognitive radio networking techniques, it is able to sense the environment and adjust the network to accommodate any changes. In this paper we present the complete overview and broad survey of this CR based WRAN technology, how it will be fulfill the upcoming challenges and other factors and some survey based comparisons between and IEEE 802.16 WiMAX and IEEE 802.22 WRAN. Also we list some of the minor and major security issues regarding to this IEEE 802.22 standard technology.

]]>
Jul 2013
<![CDATA[PAPR Reduction for 3FPP LTE OFDMA System]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  1  

D.M. Motiur Rahaman 

LTE (long term evolution) is come to meet our desired high speed data communication.LTE is the last step toward the 4th generation (4G) of radio technologies designed to increase the capacity and speed of mobile telephone networks. Where the current generation of mobile telecommunication networks are collectively known as 3G (for "third generation"), LTE is marketed as 4G. LTE uses Orthogonal Frequency Division Multiplexing (OFDM) for the downlink – that is, from the base station to the terminal. OFDMA meets the LTE requirement for spectrum flexibility and enables cost-efficient solutions for very wide carriers with high peak rates. However, one of the main drawbacks of the OFDMA modulation technique is the large peak-to-average power ratio (PAPR) of the transmitting signals. This high PAPR causes interference when the OFDM signals are passed through an amplifier which does not have enough linear range. Several PAPR reduction techniques such as magnitude clipping, block coding, and partial transmit sequence (PTS) and pulse shaping have been proposed to reduce the PAPR. In this paper, we evaluate a clipping based PAPR reduction technique. The complementary cumulative distribution function (CCDF) of the PAPR, which can be used to evaluate the PAPR reduction performance, is derived for OFDMA signals.

]]>
Jul 2013
<![CDATA[Least Mean Square (LMS) for Smart Antenna]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  1  

Md. Moswer Hossain Md. Motiur Rahman and Md. Masud Rana 

The demand for increased capacity in wireless communication networks has motivated recent research activities toward wireless systems that exploit the concept of smart antenna and space selectivity. Efficient utilization of limited radio frequency spectrum is only possible to use smart/adaptive antenna system. Smart antenna radiates not only narrow beam towards desired users exploiting signal processing capability but also places null towards interferers, thus optimizing the signal quality and enhancing capacity. We analysis the performance of adaptive (LMS) algorithm for smart antenna systems which is very important for smart antenna design. The SA incorporates this algorithm in coded form which calculates complex weights according to the signal environment. The performance of LMS algorithm is compared on the basis of normalized array factor and Mean Square Error (MSE) for SA systems. It is observed that an LMS algorithm is converging after 50 iteration.

]]>
Jul 2013
<![CDATA[Femto Cells-A New Generation Cellular Stations]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  1  

Nagashree .N Vibha Rao and Hameem Shanavas .I 

This paper provides a cost effective method for cellular telecommunications base stations that can be installed in residential or business environments either as single stand-alone items or in clusters to provide improved cellular coverage within a building. Data transmission, good signal strengths within buildings, increase in system capacity and data rates are some of the issues been discussed in this review work. The increasing demand for higher data rates in cellular networks has resulted in a trend to smaller cell sizes (Femto cells) and Pico-cellular hot spot coverage. As a result the user can have the advantage of better coverage for additional services, cost benefits and also the network operator, the use of Femto cells provides a very cost effective means of improving coverage, along with linking users to the network, and providing additional revenue from the provision of additional services. Femto cells deployed in the macro cell significantly improve the indoor coverage and provide better user experience. This article summarizes about the network architecture of Femto cells and the issues involved with it. Also it describes about the methods to overcome the issues

]]>
Jul 2013
<![CDATA[Internet Marketing of Universities: Opportunities and Challenges of Using Soсial Networks]]> Source:Universal Journal of Communications and Network(CEASE PUBLICATION)  Volume  1  Number  1  

Liubov Ryashko and Jan Chromý 

Increasing competition in the higher education in the global crisis produces new challenges to universities. An adequate response to these challenges depends primarily on the competent management of a university, an important task of which is to develop a promising marketing strategy. Currently, in addition to traditional ways of promoting educational services, social networks as a new channel of communication with existing and potential clients are starting to play an increasingly important role. The purpose of this paper is to analyze the options and challenges of social networking in the marketing policy of an educational sphere.

]]>
Jul 2013