Yazar "Balfaqih, Mohammed" seçeneğine göre listele
Listeleniyor 1 - 2 / 2
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Advancements in Millimeter Wave MIMO Antenna ArraysforEnhanced5GConnectivityArrays for Enhanced 5G Connectivity(Ieee, 2023) Faniar, Asmail Abrahim Mohamed; Almohammedi, Akram A.; Balfaqih, MohammedThis study proposes an optimized MIMO antenna array design for 5G mm-wave communication systems that operates in the 38 GHz band. The design consists of two antenna arrays, each with four evenly spaced elements. The two arrays are assembled with a 90-degree shift, which provides improved performance in terms of gain, efficiency, and beamforming. The substrate is a Rogers RT5880 with a thickness of 0.254 mm and dielectric constants of 2.2 and a loss tangent of 0.0009, respectively. The proposed work combines the most desirable characteristics, including unique design, high gain, efficiency and wide operation of bandwidth. The proposed array antenna design offers a high efficiency up to 86.56% and high average gain up to 12.35 dBi for port-1 and port-2, resulting in attractive performance. The achievable bandwidth in the 38 GHz frequency band (37.5 - 38.4 GHz) is up to 927 MHz for port-1 and port-2. The return loss of our design is up to - 23.28 dB, which is still considered low loss for 38 GHz. The results obtained show that the antenna is a viable candidate for 5G applications at 38 GHz.Öğe Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol(Tech Science Press, 2022) Almohammedi, Akram A.; Shepelev, Vladimir; Darshi, Sam; Balfaqih, Mohammed; Ghawbar, FayadThe widespread use of the Internet of Things (IoT) applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel. As a result, the security of the IoT has become a serious challenge in the field of information security. Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication. The primary purpose of steganography is to conceal sensitive information in any form of media such as audio, video, text, or photos, and securely transfer it through wireless networks. In this paper, we analyse the performance characteristics of one of the steganography techniques called Hidden Communication System for Corrupted Networks (HCCNETs) for hiding sensitive data. This performance analysis includes the efficiency and the cost of the system in Wireless Local Area Networks (WLANs), specifically in the IEEE 802.11ah IoT protocol. The analysis is mainly based on a two-dimensional Markov chain model in the presence of an error channel. Additionally, the model considers packet arrival rate, back-off timer freezing, back-off stages, and short retry limit to ensure compliance with IEEE 802.11ah requirements. It stresses the importance of taking these elements into consideration while modeling the efficiency and cost of the steganographic channel system. These parameters often result in a high precise channel access estimation, a more accurate and efficient accuracy measurements system, efficient channel utilisation, avoidance of throughput saturation overestimation, and ensuring that no packet is served endlessly. Evaluated results demonstrate that HCCNETs is an effective approach at low cost.