Bandwidth Estimation in Network Probing Techniques Utilizing Min-Plus Algebraic Methods
Diagnosis of Anemia using Non-Invasive Anemia Detector through Parametrical Analysis
The Effectiveness of Jaya Optimization for Energy Aware Cluster Based Routing in Wireless Sensor Networks
Stress Analysis and Detection from Wearable Devices
Intrusion-Tolerant Sink Configuration: A Key to Prolonged Lifetime in Wireless Sensor Networks
Channel Estimation and It’s Techniques: A Survey
Impact of Mobility on Power Consumption in RPL
FER Performance Analysis of Adaptive MIMO with OSTBC for Wireless Communication by QPSK Modulation Technique
Implementation of Traffic Engineering Technique in MPLS Network using RSVP
Performance Evaluation of Advanced Congestion Control Mechanisms for COAP
DGS Based MIMO Microstrip Antenna for Wireless Applications
A Review on Optimized FFT/IFFT Architectures for OFDM Systems
Balanced Unequal Clustering AlgorithmFor Wireless Sensor Network
HHT and DWT Based MIMO-OFDM for Various ModulationSchemes: A Comparative Approach
Study and Comparison of Distributed Energy Efficient Clustering Protocols in Wireless Sensor Network: A Review
Diagnosis of Anemia using Non-Invasive Anemia Detector through Parametrical Analysis
Addition of devices of different form factors to the network has resulted to high demand for broadband access. To improve the network capacity, Frequency spectrum regulators have recommended fifth generation (5G) network for deployment on one of the high frequency bands due to their huge contiguous bandwidth. Since such bands have already been allocated to satellite networks by the regulatory bodies, 5G must coexistence with the satellite systems. As a result, feasibility study for coexistence of 5G with the incumbent satellite systems is needed. This paper studied coexistence feasibility of a 5G terrestrial base station (BS) with fixed satellite service (FSS) terminal at 28GHz considering only interference from the satellite terminal into the 5G terrestrial BS. The study used signal to interference plus noise ratio (SINR) available at sectors of a 3-sector cell 5G terrestrial BS as a protection parameter. The available SINR on each sector was used in estimating the impact of the FSS terminal transmit power on the deployment parameters of the 5G system. Moreover, the study was conducted using a more realistic path loss model and 5G antenna pattern recently released by 3rd generation partnership project (3GPP). The results show that the transmission power and elevation angle of the FSS terminal affect deployment parameters of the 5G terrestrial BS. Finally, the results suggested that coexistence of the two systems is feasible in residential areas with only one FSS terminal if the deployment parameters of the 5G BS are carefully selected.
In this paper a problem of finding optimal buffer filling strategy in form of mixed strategy was considered for P2P-TV networks. In such networks, the popularly used strategies are the Rarest First (RF) and Greedy (Gr) strategies, however, studies have shown that RF strategy outperforms Gr strategy in terms of playback continuity and Gr strategy outperforms RF strategy in terms of startup delay, hence there is a need to find an optimal buffer filling strategy inform of mixed strategy with which viewers will experience better playback continuity with short startup delay. The idea of the mixed strategy is to divide the buffer with total of M buffer positions into two parts via demarcation point x, and apply one strategy to fill one part of the buffer and then the other strategy is applied to fill the other part of the buffer. For M = 40 buffer positions, an optimal demarcation point x* was found for each of the proposed mixed strategies. The results of the analysis have shown that mixed strategy where RF is firstly applied for buffer positions from m = 0,…,10, then Gr for m = 11,…,39 is the optimal strategy, with high probability of playback continuity and very low startup delay.
The study was designed to investigate the use and effect of Radio Frequency Identification (RFID) technology on theft detection for library management in two private universities in Abuja, Nigeria. Three objectives and three research questions guided the study. The study adopted descriptive research design. The population of the study comprises of 234 postgraduate students and 9 librarians in the two private universities in Abuja metropolis. Total enumeration method was employed and a self-designed closed ended questionnaire was used to collect data from respondents. Frequency counts, tables, percentages, mean and standard deviation were used for data analysis. The results indicated that the tags, readers, handheld readers, servers, antennae, RFID label printer, and external book return kiosk were available, installed and in use in the libraries, except for handheld readers that are rarely in use. The study further revealed that despite the positive effect of RFID technology in reducing book theft in the library, much still needed to be done to revamp, upgrade and make functional RFID equipment that are obsolete as well as boost manpower development through training to enhance librarian’s productivity and efficiency in using the RFID technology to check library theft. Based on the findings it was recommended that the management of Nile University of Nigeria (NUN) and African University of Science & Technology (AUST) should invest more in other technologies to compliment RFID technology through upgrade and periodic maintenance; it also recommended that training and retraining of librarians should be advanced in the use of rarely used facilities such as handheld readers, in order to boost their morale and productivity toward a more efficient and effective service delivery.
Wireless networks are expensive to build and maintain but are best option for rural communities because of the nature of rural environments. The absence of affordable Internet services in such communities continues to impact negatively on socio-economic growth. The aim of this study was to design an enhanced wireless network for rural dwellers. Qualitative and quantitative data were collected for the design and evaluation of wireless network infrastructure in five rural locations. The results showed that for more than a year, the system performance is optimal with an average of 200 users per month and good quality of service. The transmit/receive rate of 300Mbps was three times faster than the normal Ethernet specification with an average throughput of 1 Mbps of strong signal strength. The point-to-multipoint network design increased the network throughput and the distance of signal reach and penetration, and with quality of service and affordable service.
In order to safeguard a University’s networked assets, a network administrator must decide how to harden the network. To aid the decision-making process, network administrators may use network hardening suggestions. A critical drawback of currently available analyses is the lack of consideration for the network administrator on identified vulnerabilities, risk figure, risk priority level classification and network security mechanism. Nessus and Nmap are network vulnerability scanner used for this research. Internal and external scan results tabulated. The result shows that firewall constitute 81 on scale of 1-100 risk priority level classification of university information and technology service (ITS) network with high risk security level and open email relay constitute 2 with low risk level. Thus, the research establish a university secure network architecture model that contributed towards understanding risk priority level and also overcome shortcoming in choosing appropriate security measures.