A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Arputharaj, Vijay
- Assessment of Some Basic Empirical Path Loss Model for Vhf and Uhf in Kano City Nigerian Environment
Authors
1 Faculty of Computer Science, School of Computer Science & Information Technology, Skyline University Nigeria, NG
2 HOD - Computer Science, School of Computer Science & Information Technology, Skyline University Nigeria, NG
3 Lecturer, Department of Software Engineering, Institute of Technology, Jigjiga University, ET
Source
International Journal of Advanced Networking and Applications, Vol 13, No 3 (2021), Pagination: 4971-4978Abstract
High demands of wireless data service are increase globally and this makes Empirical path loss models of great interest. Path loss Propagation models are useful as predictive tools for receiving signal intensity at any particular distance between the transmitter and the receiver at that particular point, it is important in many ways, such as Base Transceiver Stations (BTS) location, radio coverage area estimation, frequency assignments, interference analysis, optimization transfer, power adjustment and connection budget. This paper presents an assessments and evaluation of five widely used empirical path loss models in predicting signal in the VHF and UHF bands in Kano City, Nigeria. In the work, five error analysis methods are used and a large scale field strength measurement was conducted within Kano State metropolis using specially configured dual band handset, GPS and GENEX® Probe software, data samples were collected along a predefined route Measurement of the drive test was carried out in Kano, Nigeria to obtain path loss data from various base station transmitters at varying distances. The routes covered are Zaria highway through eastern bypass road Dan Agundi to Bayero University, Kano old site, Hotoro GRA, Badawa Layout to SabonGari along MM way and Kabuga to Bayero University New site.It was found that HATA model provides the best results in terms of minimum mean Error, RMSE and SCRMSE. HATA model has the best fit which falls within the acceptable range of ±10dB.
Keywords
Wireless data, path loss, VHF Bands, UHF Bands, Kano City.References
- Parson,J. D., (1992) Mobile Radio Propagation Channel, Wiley, Chichester, West Sussex, England,.
- Adetiba, E., Iweanya, V. C., Popoola, S. I., Adetiba, J. N., & Menon, C. (2017). Automated detection of heart defects in athletes based on electrocardiography and artificial neural network. Cogent Engineering, 4(1), 1411220.
- Anderson,E., Phillips, C., Sicker, D. & Grunwald, D. (2008) “Modeling= environmental effects on directionality in wireless networks,” in Proceedings of the 5th International Workshop on Wireless Network= Measurements (WiNMee),.
- Faruk,N., A. Ayeni, amd Y. A. Adediran, (2013). “On the study of empirical pathloss models for accurate prediction of Tv signal for secondary users,” Progress In Electromagnetics Research B, Vol. 49,155-176,.
- E. Greenberg, E. Klodzh (2005), “Comparison of deterministic, empirical and physical propagation models in urban environments”, Microwaves, Communications, Antennas and Electronic Systems (COMCAS), IEEE 2005. PIMRC 2005. IEEE 16th Int. Symp. on, vol. 1, no., pp. 659-663, 11-14 Sept. 2005.
- Abhayawardhana, V.S., Wassell, I.J., Crosbsy, D., Sellars, M.P. and Brown, M.G. (2005) ‘Comparison of empirical propagation path loss models for fixed wireless access systems’, IEEE Vehicular Technology Conference, Vol. 1, pp.73–77.
- Adetiba,E., & Olugbara, O. O. (2015). Lung cancer prediction using neural network with histogram of oriented gradient genomic features. The Scientific World Journal, 2015.
- Faruk, N.; Adediran, Y. A.; Ayeni A. A. and Surajudeen Ba-kinde, N.T. (2014). Improved path-loss model for predicting TV coverage for secondary access. International journal of mobile and wireless computing, Vol 7. pp.565-576.
- Abuonji Paul (2021), Discovery and Diminution of Variance between Actual and Expected Outsourced Bandwidth Supply in Corporate Network Infrastructure, Int. J. Advanced Networking and Applications Volume: 13 Issue: 01 Pages: 4833-4838(2021) ISSN: 0975-0290
- Kayalvizhi, E. & Gopalakrishnan, B., (2021), Adaptive Resource Optimization for Cognitive Radio Networks; Int. J. Advanced Networking and Applications Volume: 12 Issue: 06 Pages: 4793-4799(2021) ISSN: 0975-0290
- Tanenbaum, A. S. (2011). Computer Networks; 4 th ed. Prentice-Hall, Inc: New Jersey.
- Vaneeta& Rani, S. (2021). A Perspective for Intrusion Detection &Prevention in Cloud Environment; Int. J. Advanced Networking and Applications, Volume: 12 Issue: 06 Pages: 47704775(2021) ISSN: 0975-0290
- Cocca, P. (2004). SANS Institute InfoSec Reading Room: Email Security Threats. Retrieved on 17th November, 2012 from: http://www.sans.org/reading_room/whitepapers/email/email-security-threats_1540
- Hamdy H. Elsayed,Hassan ShabanHassan ,‘Performance Comparison of Various HierarchicalWSN Routing Protocols’, Int. J. Advanced Networking and Applications,Volume: 11 Issue: 02 pp. 4218-4223, ISSN: 0975-0290, 2019.
- Hamdy H. Elsayed, ‘Effects of Number of Nodes and Network AreaSize Parameters on WSN Protocols Performances’, Int. J. Advanced Networking and Applications,Volume: 11 Issue: 02 pp. 4244-4251, ISSN: 0975-0290,201.
- Evaluation on Threats to Privacy in Personal Relationships
Authors
1 HOD - Computer Science, School of Science & Information Technology, Skyline University Nigeria, NG
2 Department of Computer Science, School of Science & Information Technology, Skyline University Nigeria, NG
3 Faculty of Computer Science, School of Science & Information Technology, Skyline University Nigeria, NG
4 Asst. Prof, Department of CSE, Kalasalingam Academy of Research and Education, IN
Source
International Journal of Advanced Networking and Applications, Vol 13, No 4 (2022), Pagination: 5089-5094Abstract
This commentary paper gives a summary of threats in intimate relationships, which are a type of privacy threats which can result inside families, romantic relationships, friendships, and other close relationships. A lot of popular assumptions about privacy are dispatched in these types of relationships. In fact, plenty of other effective measures tend to fail when applied to these intimate threats. We look into a wide range of intimate relationships and define common features. Therefore, based on these features, we then expand on the ramifications for technical privacy design and policy. Then finally suggest a design recommendation. There are two main security issues in intimate relationships, privacy & authentication related issues. Such privacy issues have been noticed in online learning training in post covid era. A great amount of users in intimate relationships are encountering problems in usability. Most of the issues are due to authentication procedures, sharing passwords, etc.Keywords
Cyber-Security, Privacy, Relationships, Security, Threats.References
- Levy, K. and Schneier, B. (2020) "Privacy threats in intimate relationships", Journal of Cybersecurity, 6(1). doi: 10.1093/cybsec/tyaa006.
- Palarea, R. et al. (1999) "The dangerous nature of intimate relationship stalking: threats, violence, and associated risk factors", Behavioral Sciences & the Law, 17(3), pp. 269-283. doi: 10.1002/(sici)10990798(199907/09)17:3<269::aid-bsl346>3.0.co;2-6.
- Parents, Teens and Digital Monitoring (2016). Available at: https://www.pewresearch.org/internet/2016/01/07/pa rents-teens-and-digital-monitoring/ (Accessed: 6 April 2021).
- abuse, I. and abuse?, W. (2021) Online and digital abuse - Womens Aid, Womens Aid. Available at: https://www.womensaid.org.uk/informationsupport/ what-is-domestic-abuse/onlinesafety/
- Palarea, Russell & Zona, Michael & Lane, John & Langhinrichsen-Rohling, Jennifer. (1999). The dangerous nature of intimate relationship stalking: Threats, violence, and associated risk factors. Behavioral sciences & the law. Vol 17. 269-83. 10.1002/(SICI)1099-0798(199907/09)17:33.3.CO;2Y.
- Saudi Women, Tired of Restraints, Find Ways to Flee (Published 2019) (2019). Available at: https://www.nytimes.com/2019/01/11/world/middle east/saudi-arabia-women-flee.html
- Fetters, A. (2018) Why It’s Hard to Protect Domestic-Violence Survivors Online, The Atlantic. Available at: https://www.theatlantic.com/family/archive/2018/07 /restraining-orders-social-media/564614/
- Parsons, C. et al. (2019) The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry - The Citizen Lab, The Citizen Lab. Available at: https://citizenlab.ca/2019/06/the-predator-in-yourpocketa-multidisciplinary-assessment-of-thestalkerwareapplication-industry/ (Accessed: 7 April 2021).
- Thermostats, Locks and Lights: Digital Tools of Domestic Abuse (Published 2018) (2018). Available at:https://www.nytimes.com/2018/06/23/technology/ smart-home-devices-domestic-abuse.html
- James Badcock (2016) Smart mattress lets you know if your partner is cheating, The Telegraph. Available at: https://www.telegraph.co.uk/news/2016/04/15/smart -mattress-lets-you-know-if-your-partner-is-cheating/
- Young, in Love and Sharing Everything, Including a Password (Published 2012) (2012). Available at: https://www.nytimes.com/2012/01/18/us/teenagerssharingpasswords-as-show-of-affection.html
- Prince Vivek, Rajeev Ranjan (2019), The Discovery for Privacy & Security in Various Big Data Application: A study, Int. Jnl. of Advanced Networking & Applications (IJANA) Special Issue, Volume 10, Issue 5(March-April 2019), PP 78-82.
- Lis, A. (2019). Comparison and analysis of web vulnerability scanners (Bachelor's thesis).
- Security Onion. URl: https://securityonion.net/ (last visited on 25/07/2021).
- P. Raghu Vamsi, Agrah Jain (2021), Practical Security Testing of Electronic Commerce Web Applications, Int. J. Advanced Networking and Applications Volume: 13 Issue: 01 Pages: 4861-
- (2021) ISSN: 0975-0290.