Telecommunications

Feb 22


The IUP Journal of Telecommunications

ISSN: 0975-5551

A 'peer reviewed' journal indexed on Cabell's Directory, and also distributed by EBSCO and Proquest Database

It is a quarterly journal that publishes multidisciplinary research papers encompassing conceptual, theoretical and empirical studies relating to: Modeling, analysis, design and management of telecommunication systems; Transmission systems and Signaling system; Time division switching systems; Radio waves, Radar imaging, Satellite communication; Artificial Intelligence; Fibre optics and Photonic switching; Performance evaluation of Wide Area and Local Networks; Security issues of Mobile Networks; Standardization and regulatory issues, etc.

Privileged access to Online edition for Subscribers.

Focus Areas
  • Broadband Communication Systems
  • Wireless Communication Networks
  • Optical Communication
  • Satellite Communications
  • Target Detection and Tracking
  • Intelligent Networks and Services
  • Internet Protocol Design and Traffic Analysis
  • Digital Image Processing
  • Multi-User Detection Techniques
  • Radar and Sonar Technologies
  • VLSI Designing
  • Digital Audio Broadcasting System
  • Multiplexing Queuing Theor
CheckOut
Article   Price (₹) Buy
Analysis of Tv White Space in Southeast Nigeria Using Pollution Technique
50
Various Image Compression Techniques: A Review
50
Advanced Image Processing Algorithms for Categorizing and Evaluating Plant Diseases: A Study
50
Categorization of Leaf Ailments Using Deep Learning Techniques: A Review
50
Contents : (Feb 2022)

Unstructured Data Storage Function for 5G Core Network
K S Keerthi and Bhagya R

The 3rd Generation Partnership Project (3GPP) created a data storage architecture to create a truly distributed system in 5G, where structured data and unstructured data can be stored at central repositories. The Unstructured Data Storage Function (UDSF) will be used as data storage architecture and offers services for data storage, manipulation and retrieval to every Network Function (NF) within the 5G Service-Based Architecture (SBA) (Ahmed et al., 2018). In this paper, the implementation of UDSF has been explained. The UDSF can be used by any NFs to store local data within the centralized repository. The UDSF will be used for achieving a fully stateless AMF (Access and Mobility Function) that achieves higher reliability and load distribution in the network.


© 2022 IUP. All Rights Reserved.

Article Price : ₹ 50

Design and Simulation of Interference Mitigation Algorithm for an L-Band Digital Aeronautical Communications System
Pushpa Lakshmi Jayaramaiah and K Saraswathi

The L-Band Digital Aeronautical Communications System (LDACS) 1 is an alternative to the current Very High Frequency (VHF) technology which meets the needs of upcoming demands. LDACS1, an Orthogonal Frequency Division Multiplexing (OFDM), operates in the L-Band between 960 and 1167 MHz frequencies installed in the middle of two Distance Measuring Equipment (DME) channels with 500 kHz spectral gap. In this paper?LDACS1 OFDM and LDACS1 2 ? 2 Multiple Input Multiple Output (MIMO) are designed and simulated without any interference. The DME interference is introduced only to the LDACS1 OFDM, and significant degradation in the performance is observed. The pulse blanking technique helps in lowering the interference in the LDACS1 OFDM system, resulting in a performance close to the performance in the interference-free case. The Bit Error Rate (BER) performances for the conditions with and without interference and pulse blanking are compared. An improvement in the BER performance is seen with respect to design of LDACS1 2 ? 2 MIMO system.


© 2022 IUP. All Rights Reserved.

Article Price : ₹ 50

IoT-Based Smart Alarm Clock
P Deepali and K Ramudu

Internet of Things (IoT) is an emerging and evergreen technology that has created worldwide networked machines and also devices that can help in exchanging communication. As the real-time applications have been increasing day-by-day, the need for smart connections has also increased. Challenging smart connectivity, IoT-based smart alarm clocks have been designed in this paper. For decades, alarm clocks have been in use, but as the technology progressed, mobile phones came into existence, and people find it easier to set alarms on mobiles. Among electronics hobbyists, alarm projects have always been in great demand. IoT alarm clock is built using Node MicroController Unit (NodeMCU), where alarm time can be set using a webpage without Internet connection.


© 2022 IUP. All Rights Reserved.

Article Price : ₹ 50

Recognizing Suspicious Activities in Examination Scenario Using Machine Learning Techniques
Agwi Uche Celestine, Ogwueleka Francisca N and Irhebhude Martins Ekata

Monitoring the activities of examinees during examination is very challenging. The paper recognizes and classifies activities of examinees as suspicious or normal during examination using machine learning techniques. The processing and analysis of image data follows a typical sequence of distinct steps referred to as the vision pipeline. Data was acquired with a surveillance camera and frames extracted from the videos. Preprocessing activities include selecting the required frames from frame sequences, and cropping and segmenting foreground/background object. Video conversion to frame was accomplished with MATLAB scripts, while segmentation of image frames was achieved with GrabCut algorithm. Shape/pose features were extracted from objects using Histogram of Oriented Gradient (HOG) and Regionprop algorithms, and represented in feature vectors that were fed into Support Vector Machine (SVM) classifier. Holdout validation technique was used for the classifier training and tested from the given datasets. 70% of the dataset was used for training, while 30% was used for testing. The model gave an accuracy of 98.1% and 100%, respectively, for each examination scenario. The model accuracy was visualized in confusion matrix and the Receiver Operating Characteristic (ROC). MATLAB software was used as the simulation environment. The model demonstrated excellent performance, indicating that the system can adequately complement the efforts of invigilators in examination invigilation.


© 2022 IUP. All Rights Reserved.

Article Price : ₹ 50