Wireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). The simulation results showed how the multi-hop protocol was more energy efficient than single hop protocol.
Globally, the COVID-19 pandemic’s development has presented significant societal and economic challenges. The carriers of COVID-19 transmission have also been identified as asymptomatic infected people. Yet, most epidemic models do not consider their impact when accounting for the disease’s indirect transmission. This study suggested and investigated a mathematical model replicating the spread of coronavirus disease among asymptomatic infected people. A study was conducted on every aspect of the system’s solution. The equilibrium points and the basic reproduction number were computed. The endemic equilibrium point and the disease-free equilibrium point had both undergone local stability analyses. A geometric technique was used
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreEstablishing coverage of the target sensing field and extending the network’s lifetime, together known as Coverage-lifetime is the key issue in wireless sensor networks (WSNs). Recent studies realize the important role of nature-inspired algorithms in handling coverage-lifetime problem with different optimization aspects. One of the main formulations is to define coverage-lifetime problem as a disjoint set covers problem. In this paper, we propose an evolutionary algorithm for solving coverage-lifetime problem as a disjoint set covers function. The main interest in this paper is to reflect both models of sensing: Boolean and probabilistic. Moreover, a heuristic operator is proposed as a local refinement operator to improve the quality
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MorePhotonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and the characterization of a relative humidity sensor based on a polymer-coated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) transmission mode. The fabrication of the sensor involved splicing a short (1 cm) length of Photonic Crystal Fiber (PCF) between two single-mode fibers (SMF). It was then coated with a layer of agarose solution. Experimental results showed that a high humidity sensitivity of 29.37 pm/%RH was achieved within a measurement range of 27–95%RH. The sensor also showed good repeatability, small size, measurement accuracy and wide humidity range. The RH sensitivity o
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreThe hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre
... Show MoreThe traditional voice call over Global System for Mobile Communications (GSM) and Public Switched Telephone Network (PSTN) is expensive and does not provide a secure end to end voice transmission. However, the growth in telecommunication industry has offered a new way to transmit voice over public network such as internet in a cheap and more flexible way. Due to insecure nature of the public network, the voice call becomes vulnerable to attacks such as eavesdropping and call hijacking. Accordingly, protection of voice call from illegal listening becomes increasingly important.
To this end, an android-based application (named E2ESeVoice application) to transmit voice in a secure way between the end users is proposed based on modified R
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.
An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo
... Show More