Passengers overload in public buses has been a problem in Tanzania. Despite some stationing polic... more Passengers overload in public buses has been a problem in Tanzania. Despite some stationing police at different locations for manual check being in place, the overloading of passengers still persists. The current system doesn’t work efficiently as the check is done at random, and it is difficult during the rainy seasons and at night and it is costs and needs labor power. The findings indicate that many deaths and injuries when accidents occur, they cause deaths and injuries mainly if there is passenger overloading or if the passengers are not wearing seat belts or both. Many people lose their lives and some are severely injured when accidents occur in these public buses. This paper checks an overview on the current system and proposes a new system which uses new technology for controlling passengers overload in public buses to overcome to challenges of the current system. The proposed system will help in controlling excessive passengers and hence reduce the number of deaths and seve...
International Journal of Technology Enhancements and Emerging Engineering Research, 2013
Reporting the incidents to authorities in developing countries that can take actions has been a c... more Reporting the incidents to authorities in developing countries that can take actions has been a chaotic and slow process. This paper proposes an algorithm for a system that automatically reports events that compromise passengers’ safety to respective authorities by using spherical cosine rule. When an incident such as an accident, over speeding or overloading of passengers occurs the system identifies the closest police station. It does so by calculating the shortest distance between latitudes and longitudes of the place where the event occurred and those of the closest police station. Then it identifies the next police station which the bus will encounter and where the event can be reported and immediate action carried out. The public buses will be equipped with GPS which will generate coordinates and there will be a database which contains the coordinates for the police stations along the main roads.
Journal of Agricultural Extension and Rural Development, 2017
Information access in rural communities of Tanzania is very important as it keeps its members awa... more Information access in rural communities of Tanzania is very important as it keeps its members aware of what happened and what happening in the world. This importance can not be undermined since it helps farmers and other members of the rural community to make the right decision about their activities. Rural community areas are surrounded by many factors which in one way or another influence or hinder accessibility of information. Several works have been done on analysis of these factors; however most of them were conducted a number of years back. This study focused on providing the current survey on analysis of these factors. Specifically, the study analysed the following factors: source of power, penetration of mobile phones, subscription to networks, languages used and level of education, policy, government support, government administration and farming system. Mwanga District was used as a study area where descriptive research design was applied. Primary data were collected from farmers by using questionnaires while secondary data were collected from village reports and other research reports. The collected data were analysed by using Statistical Package for Social Science (SPSS). Findings show that in rural areas, there are unreliable source of power, higher penetrations of feature phones, high subscription to Vodacom network and high uses of Swahili language for communication, good government support and policy which favour farmer's development. Generally, we recommend that the existing sources of information like information systems and other applications should be integrated to form one stop centre where all information can be accessed.
The ability to measure end-to-end Available Bandwidth (unused capacity) in the network path is us... more The ability to measure end-to-end Available Bandwidth (unused capacity) in the network path is useful for route selection in overlay networks, QoS verification, network management, traffic engineering and real-time resource provisioning, control flow and congestion, construction of overlay - routing infrastructure, topology building in peer to peer networks, and call admission control, dynamic encoding rate modification in streaming applications, capacity planning, intelligent routing systems, and design of transport layer protocols. This paper investigates at applying techniques and measurement of Available Bandwidth (AB) in the congestion control for the transmission of an efficient telemedicine content transport network by using an important ABETs tool like Pathload, IGI, and Pathchirp. This paper discusses measurement and simulation results of wired and wireless networks for the unused capacity in the network. The results can assist an organization or country in estimating the n...
Road traffic accident is a major problem worldwide resulting in significant morbidity and mortali... more Road traffic accident is a major problem worldwide resulting in significant morbidity and mortality. Advanced driver assistance systems are one of the salient features of intelligent systems in transportation. They improve vehicle safety by providing real-time traffic information to the driver. Road signs play an important role in road safety. To be effective, road signs must be visible at a distance that enables drivers to take the necessary actions. However, static road signs are often seen too late for a driver to respond accordingly. In this study, a system for alerting drivers about road signs has been developed and tested using a smart mobile phone. The study was carried out in Tanzania along an 80 km highway stretch from Arusha to Moshi town. The Haversine formula was used to measure and estimate the distance between two pairs of coordinates using the smartphone-based navigation application, Google Map. The application provides a voice alert to a needed action that enhances d...
Journal of Information Engineering and Applications, 2014
Electromagnetic interference (EMI) in communication systems is one of the major challenges which ... more Electromagnetic interference (EMI) in communication systems is one of the major challenges which face the communication sector and is mainly caused by unwanted signals which can be characterized as noise. Due to this during communication system design stages, implementation phase and operation of communication link Electromagnetic compatibility (EMC) measures are of great importance. EMC analysis provides important information for communication system designers, planners and operators which facilitate coexistence of different communication systems. In past few years there is an increase in number of Frequency Modulation (FM) broadcasting radio stations in Tanzania which operates in frequency band adjacent to aeronautical communication facilities. The FM broadcasting stations causes interference to the aeronautical radio-communication systems hence posing a great risk to aircraft navigation safety. This is mainly due to unavailability of guard band between the two systems and high power radiated by FM broadcasting stations. This paper addresses interference cases in Tanzania and analyzes the interference mechanism for each interference case. To facilitate this field measurement was conducted in Arusha, Iringa and Zanzibar and mitigation measures which will ensure compatibility are proposed. In paper we have proposed the use of corner plate antenna to mitigate interference caused by FM broadcasting systems.
Proceedings of the 2004 IEEE International Frequency Control Symposium and Exposition, 2004., 2004
The paper describes a novel approach of static frequency vs. temperature dependency compensation ... more The paper describes a novel approach of static frequency vs. temperature dependency compensation of a direct digital frequency synthesizer clock signal. The compensation significantly reduces the frequency vs. temperature dependency of synthesized signals over a wide range of operating temperatures. The clock signal, which samples the direct digital frequency synthesizer, is excited by a dual-mode crystal oscillator. Since the crystal
Engineering, Technology & Applied Science Research
Network traffic classification is of significant importance. It helps identify network anomalies ... more Network traffic classification is of significant importance. It helps identify network anomalies and assists in taking measures to avoid them. However, classifying network traffic correctly is a challenging task. This study aims to compare ensemble learning methods with normal supervised classification to come up with improved classification methods. Three types of network traffic were classified (Benign, Malicious, and Outliers). The data were collected experimentally by using Paessler Router Traffic Grapher software and online and were analyzed by R software. The datasets were used to train five supervised models (k-nearest neighbors, mixture discriminant analysis, Naïve Bayes, C5.0 classification model, and regularized discriminant analysis). The models were trained by 70% of the samples and the rest 30% were used for validation. The same samples were used separately in predicting individual accuracy. The results were compared to the ensemble learning models which were built with...
Smartphone technology has improved access to mobile money services (MMS) and successful mobile mo... more Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the usage and acceptance of mobile money has mostly been low due to security issues and challenges associated with the system. As a result, there is a need to carry out a survey to evaluate the key security issues associated with mobile money systems in Uganda. The study employed a descriptive research design, and stratified random sampling technique to group the population. Krejcie and Morgan’s formula was used to determine the sample size for the study. The collection of data was through the administration of structured questionnaires, where 741 were filled by registered mobile money (MM) users, 447 registered MM agents, and 52 mobile network operators’ (MNOs) IT officers of the mobile money service providers (MMSPs) in Uganda. The col...
International Journal of Advances in Scientific Research and Engineering, 2021
This research article published by International Journal of Advances in Scientific Research and E... more This research article published by International Journal of Advances in Scientific Research and Engineering, Volume 7, Issue 7, 2021
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to im... more With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) tha...
International Journal of Research in Engineering and Technology
Safety zone determination for wireless cellular towers has attracted attention from many research... more Safety zone determination for wireless cellular towers has attracted attention from many researchers in the last decade. This is caused by the rapid growth of the wireless cellular industry which has led to the installation of towers even in the residential areas. There are many reports and ongoing researches regarding the biological and thermal effects of wireless cellular electromagnetic fields exposures to people. Cancer, hyperthermia, neural and behaviour effects of people exposed to these electromagnetic fields have been reported. This motivates the research to determine safety zones from wireless cellular towers to assure safety to those living in the vicinity of these towers. A model for safety zone determination is developed. The model takes the received power at the object, power transmitted by the transmitter and gain of the transmitter as inputs to determine the safe distance from the radiation of a wireless cellular transmitter. The power density received by the object and its geographical location from the radiation source are measured using the selective radiation meter. Transmitted power and the gain of the transmitter together with the height of the tower were obtained from the respective wireless cellular network operator. Based on the geographical location of the object, the distance from the radiation source was calculated using the haversine formula. These inputs are then used to determine the safety zone based on the standards and guidelines developed by WHO and ICNIRP.
(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 9, Sept... more (IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 9, September 2014 http://sites.google.com/site/ijcsis/ ISSN 1947-5500
NOMENCLATURE ABSTRACT A two-dimensional model is developed to numerically study the capability of... more NOMENCLATURE ABSTRACT A two-dimensional model is developed to numerically study the capability of various turbulence models to predict the heat transfer characteristics of supercritical water flowing through a vertical tube. At the tube inlet, mass flux of 1260 kg/m 2 s is applied. At the tube outlet, normal gradients of velocity, Turbulence Kinetic energy and Turbulence dissipation rate (k and ɛ) are assigned zero and a pressure of 245.2 bar is specified. Uniform heat flux condition ranging from 233 to 698 kW/m 2 is applied around the tube wall. After performing a grid independence test, a non-uniform mesh of 200 nodes along the radial direction and 600 uniform nodes along the axial direction was chosen. To capture the large variations of flow field variables near the tube wall, a fine grid is used close to the wall (wall y+ <0.3).A set of standard two equation models (Standard k-ɛ, RNG k-ɛ, k-ω SST)and 5 Low Reynolds Number (Low Re) models are chosen in the present study. The r...
Communication over wireless media is vulnerable to distortion by noise. Therefore, the applicatio... more Communication over wireless media is vulnerable to distortion by noise. Therefore, the application of error control mechanism is necessary to minimize the Bit Error Rate (BER). It is proposed to use locked binary convolutional code with Non-Transmittable codewords to enhance Viterbi Algorithm decoders; as one of the forward error correction mechanisms. The proposed enhancement empowers Viterbi algorithm decoders to reduce one of its inherent limitations of residual errors due to burst errors. This paper evaluates the performance of the locked (2, 1, 2) binary convolutional code with Non-Transmittable codewords enhancement technique over flat and slow Rayleigh Fading channel using a MATLAB software simulation. Simulation result shows 80.92 percent reduction of residual errors when 6 Non-Transmittable Codewords were applied to Viterbi Algorithm (VA) decoding. On the other hand, the technique lowers the encoder’s data transmission rate from 1/2 to 1/6.
Communication over wireless media is vulnerable to distortion by noise. Therefore, the applicatio... more Communication over wireless media is vulnerable to distortion by noise. Therefore, the application of error control mechanism is necessary to minimize the Bit Error Rate (BER). It is proposed to use locked binary convolutional code with Non-Transmittable codewords to enhance Viterbi Algorithm decoders; as one of the forward error correction mechanisms. The proposed enhancement empowers Viterbi algorithm decoders to reduce one of its inherent limitations of residual errors due to burst errors. This paper evaluates the performance of the locked (2, 1, 2) binary convolutional code with Non-Transmittable codewords enhancement technique over flat and slow Rayleigh Fading channel using a MATLAB software simulation. Simulation result shows 80.92 percent reduction of residual errors when 6 Non-Transmittable Codewords were applied to Viterbi Algorithm (VA) decoding. On the other hand, the technique lowers the encoder’s data transmission rate from 1/2 to 1/6. General Terms
Radio frequency spectrum scarcity has become a high priority research area over the past few year... more Radio frequency spectrum scarcity has become a high priority research area over the past few years. The huge increase of network subscribers with multimedia applications coupled with underutilization of radio frequency spectrum motivates the search for other measures to address the scarcity of radio frequency spectrum. This work investigates on a price based spectrum sharing scheme for connection-oriented traffic in wireless cellular networks as a solution to address the scarcity of radio frequency spectrum. Dynamic pricing approach is applied with traffic overflows into neighbor networks. Performance evaluations of the scheme at steady state using MATLAB simulations reveal significant gains to the quality of service. Application of the scheme to highly loaded network traffic improves both network revenue and traffic channel utilizations.
Passengers overload in public buses has been a problem in Tanzania. Despite some stationing polic... more Passengers overload in public buses has been a problem in Tanzania. Despite some stationing police at different locations for manual check being in place, the overloading of passengers still persists. The current system doesn’t work efficiently as the check is done at random, and it is difficult during the rainy seasons and at night and it is costs and needs labor power. The findings indicate that many deaths and injuries when accidents occur, they cause deaths and injuries mainly if there is passenger overloading or if the passengers are not wearing seat belts or both. Many people lose their lives and some are severely injured when accidents occur in these public buses. This paper checks an overview on the current system and proposes a new system which uses new technology for controlling passengers overload in public buses to overcome to challenges of the current system. The proposed system will help in controlling excessive passengers and hence reduce the number of deaths and seve...
International Journal of Technology Enhancements and Emerging Engineering Research, 2013
Reporting the incidents to authorities in developing countries that can take actions has been a c... more Reporting the incidents to authorities in developing countries that can take actions has been a chaotic and slow process. This paper proposes an algorithm for a system that automatically reports events that compromise passengers’ safety to respective authorities by using spherical cosine rule. When an incident such as an accident, over speeding or overloading of passengers occurs the system identifies the closest police station. It does so by calculating the shortest distance between latitudes and longitudes of the place where the event occurred and those of the closest police station. Then it identifies the next police station which the bus will encounter and where the event can be reported and immediate action carried out. The public buses will be equipped with GPS which will generate coordinates and there will be a database which contains the coordinates for the police stations along the main roads.
Journal of Agricultural Extension and Rural Development, 2017
Information access in rural communities of Tanzania is very important as it keeps its members awa... more Information access in rural communities of Tanzania is very important as it keeps its members aware of what happened and what happening in the world. This importance can not be undermined since it helps farmers and other members of the rural community to make the right decision about their activities. Rural community areas are surrounded by many factors which in one way or another influence or hinder accessibility of information. Several works have been done on analysis of these factors; however most of them were conducted a number of years back. This study focused on providing the current survey on analysis of these factors. Specifically, the study analysed the following factors: source of power, penetration of mobile phones, subscription to networks, languages used and level of education, policy, government support, government administration and farming system. Mwanga District was used as a study area where descriptive research design was applied. Primary data were collected from farmers by using questionnaires while secondary data were collected from village reports and other research reports. The collected data were analysed by using Statistical Package for Social Science (SPSS). Findings show that in rural areas, there are unreliable source of power, higher penetrations of feature phones, high subscription to Vodacom network and high uses of Swahili language for communication, good government support and policy which favour farmer's development. Generally, we recommend that the existing sources of information like information systems and other applications should be integrated to form one stop centre where all information can be accessed.
The ability to measure end-to-end Available Bandwidth (unused capacity) in the network path is us... more The ability to measure end-to-end Available Bandwidth (unused capacity) in the network path is useful for route selection in overlay networks, QoS verification, network management, traffic engineering and real-time resource provisioning, control flow and congestion, construction of overlay - routing infrastructure, topology building in peer to peer networks, and call admission control, dynamic encoding rate modification in streaming applications, capacity planning, intelligent routing systems, and design of transport layer protocols. This paper investigates at applying techniques and measurement of Available Bandwidth (AB) in the congestion control for the transmission of an efficient telemedicine content transport network by using an important ABETs tool like Pathload, IGI, and Pathchirp. This paper discusses measurement and simulation results of wired and wireless networks for the unused capacity in the network. The results can assist an organization or country in estimating the n...
Road traffic accident is a major problem worldwide resulting in significant morbidity and mortali... more Road traffic accident is a major problem worldwide resulting in significant morbidity and mortality. Advanced driver assistance systems are one of the salient features of intelligent systems in transportation. They improve vehicle safety by providing real-time traffic information to the driver. Road signs play an important role in road safety. To be effective, road signs must be visible at a distance that enables drivers to take the necessary actions. However, static road signs are often seen too late for a driver to respond accordingly. In this study, a system for alerting drivers about road signs has been developed and tested using a smart mobile phone. The study was carried out in Tanzania along an 80 km highway stretch from Arusha to Moshi town. The Haversine formula was used to measure and estimate the distance between two pairs of coordinates using the smartphone-based navigation application, Google Map. The application provides a voice alert to a needed action that enhances d...
Journal of Information Engineering and Applications, 2014
Electromagnetic interference (EMI) in communication systems is one of the major challenges which ... more Electromagnetic interference (EMI) in communication systems is one of the major challenges which face the communication sector and is mainly caused by unwanted signals which can be characterized as noise. Due to this during communication system design stages, implementation phase and operation of communication link Electromagnetic compatibility (EMC) measures are of great importance. EMC analysis provides important information for communication system designers, planners and operators which facilitate coexistence of different communication systems. In past few years there is an increase in number of Frequency Modulation (FM) broadcasting radio stations in Tanzania which operates in frequency band adjacent to aeronautical communication facilities. The FM broadcasting stations causes interference to the aeronautical radio-communication systems hence posing a great risk to aircraft navigation safety. This is mainly due to unavailability of guard band between the two systems and high power radiated by FM broadcasting stations. This paper addresses interference cases in Tanzania and analyzes the interference mechanism for each interference case. To facilitate this field measurement was conducted in Arusha, Iringa and Zanzibar and mitigation measures which will ensure compatibility are proposed. In paper we have proposed the use of corner plate antenna to mitigate interference caused by FM broadcasting systems.
Proceedings of the 2004 IEEE International Frequency Control Symposium and Exposition, 2004., 2004
The paper describes a novel approach of static frequency vs. temperature dependency compensation ... more The paper describes a novel approach of static frequency vs. temperature dependency compensation of a direct digital frequency synthesizer clock signal. The compensation significantly reduces the frequency vs. temperature dependency of synthesized signals over a wide range of operating temperatures. The clock signal, which samples the direct digital frequency synthesizer, is excited by a dual-mode crystal oscillator. Since the crystal
Engineering, Technology & Applied Science Research
Network traffic classification is of significant importance. It helps identify network anomalies ... more Network traffic classification is of significant importance. It helps identify network anomalies and assists in taking measures to avoid them. However, classifying network traffic correctly is a challenging task. This study aims to compare ensemble learning methods with normal supervised classification to come up with improved classification methods. Three types of network traffic were classified (Benign, Malicious, and Outliers). The data were collected experimentally by using Paessler Router Traffic Grapher software and online and were analyzed by R software. The datasets were used to train five supervised models (k-nearest neighbors, mixture discriminant analysis, Naïve Bayes, C5.0 classification model, and regularized discriminant analysis). The models were trained by 70% of the samples and the rest 30% were used for validation. The same samples were used separately in predicting individual accuracy. The results were compared to the ensemble learning models which were built with...
Smartphone technology has improved access to mobile money services (MMS) and successful mobile mo... more Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the usage and acceptance of mobile money has mostly been low due to security issues and challenges associated with the system. As a result, there is a need to carry out a survey to evaluate the key security issues associated with mobile money systems in Uganda. The study employed a descriptive research design, and stratified random sampling technique to group the population. Krejcie and Morgan’s formula was used to determine the sample size for the study. The collection of data was through the administration of structured questionnaires, where 741 were filled by registered mobile money (MM) users, 447 registered MM agents, and 52 mobile network operators’ (MNOs) IT officers of the mobile money service providers (MMSPs) in Uganda. The col...
International Journal of Advances in Scientific Research and Engineering, 2021
This research article published by International Journal of Advances in Scientific Research and E... more This research article published by International Journal of Advances in Scientific Research and Engineering, Volume 7, Issue 7, 2021
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to im... more With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) tha...
International Journal of Research in Engineering and Technology
Safety zone determination for wireless cellular towers has attracted attention from many research... more Safety zone determination for wireless cellular towers has attracted attention from many researchers in the last decade. This is caused by the rapid growth of the wireless cellular industry which has led to the installation of towers even in the residential areas. There are many reports and ongoing researches regarding the biological and thermal effects of wireless cellular electromagnetic fields exposures to people. Cancer, hyperthermia, neural and behaviour effects of people exposed to these electromagnetic fields have been reported. This motivates the research to determine safety zones from wireless cellular towers to assure safety to those living in the vicinity of these towers. A model for safety zone determination is developed. The model takes the received power at the object, power transmitted by the transmitter and gain of the transmitter as inputs to determine the safe distance from the radiation of a wireless cellular transmitter. The power density received by the object and its geographical location from the radiation source are measured using the selective radiation meter. Transmitted power and the gain of the transmitter together with the height of the tower were obtained from the respective wireless cellular network operator. Based on the geographical location of the object, the distance from the radiation source was calculated using the haversine formula. These inputs are then used to determine the safety zone based on the standards and guidelines developed by WHO and ICNIRP.
(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 9, Sept... more (IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 9, September 2014 http://sites.google.com/site/ijcsis/ ISSN 1947-5500
NOMENCLATURE ABSTRACT A two-dimensional model is developed to numerically study the capability of... more NOMENCLATURE ABSTRACT A two-dimensional model is developed to numerically study the capability of various turbulence models to predict the heat transfer characteristics of supercritical water flowing through a vertical tube. At the tube inlet, mass flux of 1260 kg/m 2 s is applied. At the tube outlet, normal gradients of velocity, Turbulence Kinetic energy and Turbulence dissipation rate (k and ɛ) are assigned zero and a pressure of 245.2 bar is specified. Uniform heat flux condition ranging from 233 to 698 kW/m 2 is applied around the tube wall. After performing a grid independence test, a non-uniform mesh of 200 nodes along the radial direction and 600 uniform nodes along the axial direction was chosen. To capture the large variations of flow field variables near the tube wall, a fine grid is used close to the wall (wall y+ <0.3).A set of standard two equation models (Standard k-ɛ, RNG k-ɛ, k-ω SST)and 5 Low Reynolds Number (Low Re) models are chosen in the present study. The r...
Communication over wireless media is vulnerable to distortion by noise. Therefore, the applicatio... more Communication over wireless media is vulnerable to distortion by noise. Therefore, the application of error control mechanism is necessary to minimize the Bit Error Rate (BER). It is proposed to use locked binary convolutional code with Non-Transmittable codewords to enhance Viterbi Algorithm decoders; as one of the forward error correction mechanisms. The proposed enhancement empowers Viterbi algorithm decoders to reduce one of its inherent limitations of residual errors due to burst errors. This paper evaluates the performance of the locked (2, 1, 2) binary convolutional code with Non-Transmittable codewords enhancement technique over flat and slow Rayleigh Fading channel using a MATLAB software simulation. Simulation result shows 80.92 percent reduction of residual errors when 6 Non-Transmittable Codewords were applied to Viterbi Algorithm (VA) decoding. On the other hand, the technique lowers the encoder’s data transmission rate from 1/2 to 1/6.
Communication over wireless media is vulnerable to distortion by noise. Therefore, the applicatio... more Communication over wireless media is vulnerable to distortion by noise. Therefore, the application of error control mechanism is necessary to minimize the Bit Error Rate (BER). It is proposed to use locked binary convolutional code with Non-Transmittable codewords to enhance Viterbi Algorithm decoders; as one of the forward error correction mechanisms. The proposed enhancement empowers Viterbi algorithm decoders to reduce one of its inherent limitations of residual errors due to burst errors. This paper evaluates the performance of the locked (2, 1, 2) binary convolutional code with Non-Transmittable codewords enhancement technique over flat and slow Rayleigh Fading channel using a MATLAB software simulation. Simulation result shows 80.92 percent reduction of residual errors when 6 Non-Transmittable Codewords were applied to Viterbi Algorithm (VA) decoding. On the other hand, the technique lowers the encoder’s data transmission rate from 1/2 to 1/6. General Terms
Radio frequency spectrum scarcity has become a high priority research area over the past few year... more Radio frequency spectrum scarcity has become a high priority research area over the past few years. The huge increase of network subscribers with multimedia applications coupled with underutilization of radio frequency spectrum motivates the search for other measures to address the scarcity of radio frequency spectrum. This work investigates on a price based spectrum sharing scheme for connection-oriented traffic in wireless cellular networks as a solution to address the scarcity of radio frequency spectrum. Dynamic pricing approach is applied with traffic overflows into neighbor networks. Performance evaluations of the scheme at steady state using MATLAB simulations reveal significant gains to the quality of service. Application of the scheme to highly loaded network traffic improves both network revenue and traffic channel utilizations.
The Viterbi decoder is the most favorable solution to the problem of decoding codewords from a co... more The Viterbi decoder is the most favorable solution to the problem of decoding codewords from a convolutional encoder. Viterbi decoder performs exceptionally well when a received codewords block contains single or multiple and scattered errors in a received codewords block. However, the formation of burst errors in data transmission due to high transmission speed and the widely varying error conditions of wireless media in fading channel creates decoding challenge for such conditions which result in unbearable amount of residual errors. By using Viterbi decoders’ trellis diagrams, this paper analyses the effects of burst errors to the decoder that lead to residual errors and proposes improvement to the encoding and decoding procedures of the existing (2, 1, 2) binary convolutional encoder. The improved version facilitate effectiveness in the decoder (Viterbi algorithm) in decoding burst errors and hence reduction of residual errors in a poor channel. The proposed enhancements improve the decoder’s operational performance by 75 percent. However, the proposed modification reduces the encoder’s data transmission rate from 1/2 to 1/6.
Uploads
Papers by Anael Sam
https://sites.google.com/site/ijcsis/