Implementation of Discrete Fourier Transform and Orthogonal Discrete Wavelet Transform in Python |
Author : Tariq Javid Ali, Syed Saood Zia |
Abstract | Full Text |
Abstract :This paper presents implementation of Discrete Fourier Transform and Orthogonal Discrete Wavelet Transform in Python computer programming language. The Fourier Transform is a fundamental signal processing tool whereas the Wavelet Transform is a powerful and advanced signal processing tool. Both have applications in numerous scientific and engineering disciplines. Our implementation aims to develop a deeper understanding of these transformations by presenting detailed coding steps to generate the frequency-domain and wavelet-domain outputs for selected example time-domain input signals. The results generated from developed program code are compared using built-in functions with similar matches have shown the successful implementation. |
|
Analytical Comparison of RSA and RSA with Chinese Remainder Theorem |
Author : Ankur Mantri, Tariq Rahim Soomro |
Abstract | Full Text |
Abstract :RSA encryption algorithm is one of the most powerful public key encryption algorithm. The problem with RSA algorithm is that RSA decryption is relatively slow in comparison to RSA encryption. Chinese Remainder Theorem (CRT), a modulo based mathemati- cal theorem, is proposed by researchers as a way to enhance the performance of decryption. CRT minimizes the mathematical computation to large extent, thus improving the speed. CRT is well known for improving RSA’s decryption speed, but it has some drawbacks which limits its usage. The problem is that the limitations or drawbacks of CRT are not highlighted. The goal of this research paper is to address disadvantages of CRT when used for RSA decryption. Apart from the social and economic impacts, this paper covers the effects of research on current cryptographic protocols used by different browsers as well as organizations. In order to achieve goal, we are comparing several factors between RSA decryption with RSA-CRT decryption. We are using JAVA programming language to analyze the decryption algorithms. The significance of this research paper is to serve as the foundation for further research on RSA-CRT decryption. In addition, this paper addresses situations where CRT decryption is faster and beneficial to use by stating its advantages and disadvantages. |
|
Performance Analysis of TCP and UDP over Mobile Ad hoc Network |
Author : Kashif Laeeq, Jalal Bhayo |
Abstract | Full Text |
Abstract :In the network computing domain, mobile ad hoc networks (MANETs) have gained promi- nence during the recent years. These networks have been used in almost all domains of today’s life; especially in military and emergency operations. However, these application areas demand higher performance. It has been observed that better performance can’t be achieved without improved network management and the detailed network performance awareness. In this direction, this research work investigates the behavior of mobile ad hoc network under two transport protocols i.e. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). The work analyzes various parameters such as bandwidth, throughput, jitter and out of order delivery etc. A test-bed has been established in university campus and the data transferred over the network is analyzed using iperf performance monitoring tool. |
|
Smart Bandwidth Friendly Buffer: Handling Overflow in Wireless Mesh Networks |
Author : Abdul Razaque, Tariq Rahim Soomro |
Abstract | Full Text |
Abstract :With breakthrough of technological advancement, the significance of data transmission has been in highly demanding. On the other hand, limited buffering capacity has been great challenge that limits the Quality of Service (QoS) and degrade the performance of the network particularly in Wireless Mesh Networks (WMNs). Thus, it is important to provide an efficient utilization bandwidth and buffer management. Further- more, the QoS in WMNs depends immensely on intelli- gent buffer management to avoid unexpected congestion and data loss. Some algorithms have been introduced to improve the buffer capacity and management. However, these suffer from high latency, even the loss of data because of congestion in the buffers, eventually resulting in low throughput. To address these issues we introduce the scheme “Smart Bandwidth Friendly Buffers (SBFB) for Wireless Mesh Networks. The SBFB is inspired by the features of existing schemes like the EZ Flow, WRED (Weighted Random Early Detection, and Back-off mechanism algorithms. The SBFB scheme contributes to prioritize the packets, allowing the down link nodes to perceive the buffer capacity prior to transmission and it also hunts for alternative routes in case of buffer buildup. Our proposed algorithm is validated using Network simulator-3 (NS3). Based on the experimental results, we have determined that SBFB has lesser congestion and packet loss probability when compared to other known contemporary schemes. |
|
The Impending 5G Era and Its Likely Impact on Society |
Author : Abel Nyamapfene |
Abstract | Full Text |
Abstract :This paper looks at the emergence of the fifth generation of wireless networks, commonly referred to by the acronym 5G, from a perspective informed by the literature on digital divides and digital inequality. 5G has been designed with the goal of minimising inequalities in physical access, in particular differences in access that arise as a consequence of the rural-urban divide. Together with the Internet of Things, 5G is likely to usher in a new era of economic growth, and to lead to general improvements in quality of life. However, the impact of 5G on socio-economic status is not so clear cut. In some instances, 5G is likely to magnify social inequality, while in other instances it is likely to narrow social inequality. 5G also has the potential to alter existing socio-economic hierarchies, and this paper cautions policy makers and social elites to minimise the negative impacts of attendant social transformations. |
|
Online Optical Tomography System Application of Charge-Coupled Device (CCD) for Object Detection in Crystal Clear Water |
Author : Juliza Jamaludin, Jemmy Mohd Rohani |
Abstract | Full Text |
Abstract :This research presents an application of Charge-Coupled Device (CCD) linear sensor and laser diode in an optical tomography system. These optoelec- tronic sensors are believed to detect solid objects rather than transparent objects. Based on the research results, the development of optical tomography system using CCD and laser diode has helped to enhance the potential of these sensors in detecting low opacity objects. Experiments for detecting a solid rod, transparent rod and air bubbles in non-flowing crystal clear water were conduct- ed in this study. From the image reconstruction results, it clearly shows a cross-sectional image of a pipeline system with the existence and the exact location of opaque and transparent objects in multiphase flow detected by the orthogonal projection of CCD sensors and lasers. The information details of real-time multiphase flow that observed by this system can be transmit via wireless or wired data communication system. |
|
Prospects of 5G Communications |
Author : Mastaneh Mokayef, Yasser Zahedi |
Abstract | Full Text |
Abstract :The next generation of wireless communication is going to meet human demands beyond today’s trend. This study sets the frame on the future of wireless communication that requires real time responses which pushes this technology towards lower latency and conflict- ing required band for whole system. Moreover, the challenges for this hot topic are highlighted. So this study had shed light on the important studies that had been done to get to the bottom of these issues. |
|