首页 > 最新文献

Int. J. Interdiscip. Telecommun. Netw.最新文献

英文 中文
Method of Combining Cryptography and LDPC Coding for Enhanced Privacy 结合密码学和LDPC编码增强隐私的方法
Pub Date : 2021-10-01 DOI: 10.4018/ijitn.2021100105
B. Comar
This paper describes a method of combining cryptographic encoding and low density parity check (LDPC) encoding for the purpose of enhancing privacy. This method uses pseudorandom number generators (PRNGs) to create parity check matrices that are constantly updated. The generated cyphertext is at least as private as a standard additive (XORing) cryptosystem, and also has error correcting capability. The eavesdropper, Eve, has the expanded burden of having to perform cryptanalysis and error correction simultaneously.
本文提出了一种将密码学编码与低密度奇偶校验(LDPC)编码相结合以增强隐私的方法。该方法使用伪随机数生成器(prng)创建不断更新的奇偶校验矩阵。生成的密文至少与标准加性(XORing)密码系统一样具有私密性,并且还具有纠错能力。窃听者伊芙的负担增加了,她必须同时进行密码分析和纠错。
{"title":"Method of Combining Cryptography and LDPC Coding for Enhanced Privacy","authors":"B. Comar","doi":"10.4018/ijitn.2021100105","DOIUrl":"https://doi.org/10.4018/ijitn.2021100105","url":null,"abstract":"This paper describes a method of combining cryptographic encoding and low density parity check (LDPC) encoding for the purpose of enhancing privacy. This method uses pseudorandom number generators (PRNGs) to create parity check matrices that are constantly updated. The generated cyphertext is at least as private as a standard additive (XORing) cryptosystem, and also has error correcting capability. The eavesdropper, Eve, has the expanded burden of having to perform cryptanalysis and error correction simultaneously.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122592112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Low Complexity Non-Distortion Clipping Technique PAPR Reduction of MIMO-OFDM Systems 一种降低MIMO-OFDM系统PAPR的低复杂度无失真裁剪技术
Pub Date : 2021-10-01 DOI: 10.4018/ijitn.2021100102
Tahreer Mahmood, S. Mohan
Amplitude clipping is one of the techniques used to reduce PAPR. This technique does not demand side information; therefore, there is no reduction in the system's data throughput. However, it leads to additional distortion (in-band signal distortion and out-of-band radiation). To overcome this problem, low complexity non-distortion clipping technique is proposed for MIMO-OFDM system. The main concept of this proposed method is how to convert the generated distortion (in-band and out-of-band signals distortion) when using clipping at transmitter to impulse noise (error), which is possible by using a simple coding technique to cover error at the receiver. The proposed method does not clip the signal in time domain. The clipping use for discrete samples directly after IFFT. Simulation outcome detects that the proposed non-distortion clipping technique provides an efficient reduction in PAPR, best performance compared with conventional clipping technique, and less cost and complexity.
削幅是用来降低PAPR的技术之一。这种技术不需要侧信息;因此,系统的数据吞吐量不会降低。然而,它会导致额外的失真(带内信号失真和带外辐射)。为了克服这一问题,提出了MIMO-OFDM系统的低复杂度无失真裁剪技术。该方法的主要概念是如何将在发送端使用剪切时产生的失真(带内和带外信号失真)转换为脉冲噪声(误差),这可以通过使用简单的编码技术来覆盖接收器的误差。该方法不需要对信号进行时域剪切。在IFFT后直接对离散样本进行裁剪。仿真结果表明,与传统的裁剪技术相比,所提出的无失真裁剪技术可以有效地降低PAPR,具有最佳的性能,并且成本和复杂度更低。
{"title":"A Low Complexity Non-Distortion Clipping Technique PAPR Reduction of MIMO-OFDM Systems","authors":"Tahreer Mahmood, S. Mohan","doi":"10.4018/ijitn.2021100102","DOIUrl":"https://doi.org/10.4018/ijitn.2021100102","url":null,"abstract":"Amplitude clipping is one of the techniques used to reduce PAPR. This technique does not demand side information; therefore, there is no reduction in the system's data throughput. However, it leads to additional distortion (in-band signal distortion and out-of-band radiation). To overcome this problem, low complexity non-distortion clipping technique is proposed for MIMO-OFDM system. The main concept of this proposed method is how to convert the generated distortion (in-band and out-of-band signals distortion) when using clipping at transmitter to impulse noise (error), which is possible by using a simple coding technique to cover error at the receiver. The proposed method does not clip the signal in time domain. The clipping use for discrete samples directly after IFFT. Simulation outcome detects that the proposed non-distortion clipping technique provides an efficient reduction in PAPR, best performance compared with conventional clipping technique, and less cost and complexity.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125830174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experiential Cyber Education 体验式网络教育
Pub Date : 2021-10-01 DOI: 10.4018/ijitn.2021100107
Edward J. Glantz, M. Nasereddin, D. Fusco, Devin Kachmar
There is a gap between available cyber professionals with necessary skills and experience to meet industry requirements. Institutions of higher education (IHE)—as well as other programs—have begun increasing course and degree offerings to help educate, train, and even retrain working professionals to close this gap. Of growing importance are tools and techniques to supplement theoretical development with accelerated experiential cyber training. Fortunately, there has been an increase in providers offering these services, although they vary substantially in features, costs, and opportunities. The purpose of this research is to identify a current spectrum of vendors and opportunities providing hands-on cyber training. The authors of this paper include cyber faculty at a university offering undergraduate and master's cybersecurity degrees. Both degrees are offered to resident as well as online students.
具备满足行业要求所需技能和经验的网络专业人员之间存在缺口。高等教育机构(IHE)——以及其他项目——已经开始增加课程和学位课程,以帮助教育、培训甚至再培训在职专业人员,以缩小这一差距。越来越重要的是工具和技术,以加速经验网络培训补充理论发展。幸运的是,提供这些服务的提供商有所增加,尽管它们在功能、成本和机会方面存在很大差异。本研究的目的是确定当前提供动手网络培训的供应商和机会的频谱。本文的作者包括一所提供本科和硕士网络安全学位的大学的网络教师。这两个学位都提供给常驻学生和在线学生。
{"title":"Experiential Cyber Education","authors":"Edward J. Glantz, M. Nasereddin, D. Fusco, Devin Kachmar","doi":"10.4018/ijitn.2021100107","DOIUrl":"https://doi.org/10.4018/ijitn.2021100107","url":null,"abstract":"There is a gap between available cyber professionals with necessary skills and experience to meet industry requirements. Institutions of higher education (IHE)—as well as other programs—have begun increasing course and degree offerings to help educate, train, and even retrain working professionals to close this gap. Of growing importance are tools and techniques to supplement theoretical development with accelerated experiential cyber training. Fortunately, there has been an increase in providers offering these services, although they vary substantially in features, costs, and opportunities. The purpose of this research is to identify a current spectrum of vendors and opportunities providing hands-on cyber training. The authors of this paper include cyber faculty at a university offering undergraduate and master's cybersecurity degrees. Both degrees are offered to resident as well as online students.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128938528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling 5G and IoT: In Search of More Spectrum for Connected Devices 启用5G和物联网:为连接设备寻找更多频谱
Pub Date : 2021-10-01 DOI: 10.4018/ijitn.2021100101
E. Some, B. Boots, Gregory Gondwe
The internet of things (IoT) is the notion of all devices and products being connected to the internet rather than only computers and mobile devices, as has been the case until the recent past. The IoT is already booming, and its adoption will only accelerate in coming years. At the same time, the world continues to go wireless. Wired internet and telephone connections are becoming rarer with each passing year, and consumers expect and demand wireless communications more and more. One critical enabling technology for the IoT is wireless communications: IP-cameras, printers, kitchen appliances, and more deliver greater flexibility in their design when they do not need a wired connection to access the internet. In this paper, a flexible spectrum management framework to enable greater innovation, investment, and flexibility in IoT products, as well as the necessary architecture that will enable a wider deployment of IoT is proposed. An illustration and analogy from the success of the unlicensed bands used for Wi-Fi technology, and the accompanying supporting organizations that enable Wi-Fi's success are drawn.
物联网(IoT)是所有设备和产品都连接到互联网的概念,而不仅仅是计算机和移动设备,就像最近的情况一样。物联网已经蓬勃发展,它的采用只会在未来几年加速。与此同时,世界继续走向无线化。随着时间的流逝,有线互联网和电话连接变得越来越少,而消费者对无线通信的期望和需求越来越大。物联网的一项关键使能技术是无线通信:ip摄像机、打印机、厨房电器等在不需要有线连接访问互联网的情况下,在设计上提供了更大的灵活性。本文提出了一个灵活的频谱管理框架,以实现物联网产品的更大创新、投资和灵活性,以及实现物联网更广泛部署所需的架构。从Wi-Fi技术中使用的免许可频段的成功以及使Wi-Fi成功的相关支持组织中得出了一个例证和类比。
{"title":"Enabling 5G and IoT: In Search of More Spectrum for Connected Devices","authors":"E. Some, B. Boots, Gregory Gondwe","doi":"10.4018/ijitn.2021100101","DOIUrl":"https://doi.org/10.4018/ijitn.2021100101","url":null,"abstract":"The internet of things (IoT) is the notion of all devices and products being connected to the internet rather than only computers and mobile devices, as has been the case until the recent past. The IoT is already booming, and its adoption will only accelerate in coming years. At the same time, the world continues to go wireless. Wired internet and telephone connections are becoming rarer with each passing year, and consumers expect and demand wireless communications more and more. One critical enabling technology for the IoT is wireless communications: IP-cameras, printers, kitchen appliances, and more deliver greater flexibility in their design when they do not need a wired connection to access the internet. In this paper, a flexible spectrum management framework to enable greater innovation, investment, and flexibility in IoT products, as well as the necessary architecture that will enable a wider deployment of IoT is proposed. An illustration and analogy from the success of the unlicensed bands used for Wi-Fi technology, and the accompanying supporting organizations that enable Wi-Fi's success are drawn.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131924671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-Time V2V Communication With a Machine Learning-Based System for Detecting Drowsiness of Drivers 基于机器学习系统的实时V2V通信,用于检测驾驶员的困倦状态
Pub Date : 2021-10-01 DOI: 10.4018/ijitn.2021100104
A. Awad, S. Mohan
This article applies machine learning to detect whether a driver is drowsy and alert the driver. The drowsiness of a driver can lead to accidents resulting in severe physical injuries, including deaths, and significant economic losses. Driver fatigue resulting from sleep deprivation causes major accidents on today's roads. In 2010, nearly 24 million vehicles were involved in traffic accidents in the U.S., which resulted in more than 33,000 deaths and over 3.9 million injuries, according to the U.S. NHTSA. A significant percentage of traffic accidents can be attributed to drowsy driving. It is therefore imperative that an efficient technique is designed and implemented to detect drowsiness as soon as the driver feels drowsy and to alert and wake up the driver and thereby preventing accidents. The authors apply machine learning to detect eye closures along with yawning of a driver to optimize the system. This paper also implements DSRC to connect vehicles and create an ad hoc vehicular network on the road. When the system detects that a driver is drowsy, drivers of other nearby vehicles are alerted.
本文应用机器学习来检测驾驶员是否昏昏欲睡并提醒驾驶员。司机的困倦会导致交通事故,造成严重的身体伤害,包括死亡,以及重大的经济损失。由于睡眠不足导致的驾驶员疲劳导致了今天道路上的重大事故。据美国国家公路交通安全管理局(U.S. NHTSA)的数据,2010年,美国发生了近2400万辆汽车交通事故,导致3.3万多人死亡,390多万人受伤。很大比例的交通事故可归咎于疲劳驾驶。因此,必须设计和实施一种有效的技术,以便在驾驶员感到困倦时立即检测困倦,并提醒和唤醒驾驶员,从而防止事故的发生。作者应用机器学习来检测司机的闭眼和打哈欠,以优化系统。本文还实现了DSRC来连接车辆,并在道路上创建一个自组织的车辆网络。当系统检测到司机昏昏欲睡时,附近其他车辆的司机就会收到警报。
{"title":"Real-Time V2V Communication With a Machine Learning-Based System for Detecting Drowsiness of Drivers","authors":"A. Awad, S. Mohan","doi":"10.4018/ijitn.2021100104","DOIUrl":"https://doi.org/10.4018/ijitn.2021100104","url":null,"abstract":"This article applies machine learning to detect whether a driver is drowsy and alert the driver. The drowsiness of a driver can lead to accidents resulting in severe physical injuries, including deaths, and significant economic losses. Driver fatigue resulting from sleep deprivation causes major accidents on today's roads. In 2010, nearly 24 million vehicles were involved in traffic accidents in the U.S., which resulted in more than 33,000 deaths and over 3.9 million injuries, according to the U.S. NHTSA. A significant percentage of traffic accidents can be attributed to drowsy driving. It is therefore imperative that an efficient technique is designed and implemented to detect drowsiness as soon as the driver feels drowsy and to alert and wake up the driver and thereby preventing accidents. The authors apply machine learning to detect eye closures along with yawning of a driver to optimize the system. This paper also implements DSRC to connect vehicles and create an ad hoc vehicular network on the road. When the system detects that a driver is drowsy, drivers of other nearby vehicles are alerted.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128806067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Optimized Bandwidth Estimation for Adaptive Video Streaming Systems Using WLBWO Algorithm 基于WLBWO算法的自适应视频流系统优化带宽估计
Pub Date : 2021-07-01 DOI: 10.4018/IJITN.2021070107
S. Agal, P. Gokani
The increasing popularity of streaming video is a cause of concern for the stability of the internet because most streaming video content is currently delivered via UDP without any end-to-end congestion control. Since the internet relies on end systems implementing transmit rate regulation, there has recently been significant interest in congestion control mechanisms that are both fair to TCP and effective in delivering real-time streams. Streaming video over the internet requires dealing with bandwidth and delay that vary over time. Many video streaming applications address this problem by adapting the quality of the scalable video. But it produces poor quality service, and sending data on this channel results in buffering time. To trounce these issues, this paper proposed optimized bandwidth estimation for adaptive video streaming systems using the WLBWO algorithm. Originally, the input video is compressed by using the UHE algorithm. Next, the system proposes a KEECC to securely transfer the data. Then, the encrypted data is sent to the receiver via a multipath channel. Before sending the data to the receiver, the bandwidth is estimated by using the WLBWO. Finally, the inverse process is performed. Extensive experimental results showed the effectiveness of the proposed system than conventional methods.
流媒体视频的日益普及引起了人们对互联网稳定性的关注,因为目前大多数流媒体视频内容都是通过UDP传输的,没有任何端到端的拥塞控制。由于互联网依赖于实现传输速率调节的终端系统,最近人们对拥塞控制机制产生了浓厚的兴趣,这种机制既对TCP公平,又能有效地传输实时流。通过互联网传输视频需要处理随时间变化的带宽和延迟。许多视频流应用程序通过调整可伸缩视频的质量来解决这个问题。但是它产生的服务质量很差,并且在此通道上发送数据会导致缓冲时间。为了解决这些问题,本文提出了一种基于WLBWO算法的自适应视频流系统优化带宽估计方法。最初,输入视频使用UHE算法进行压缩。接下来,系统提出了一个KEECC来安全地传输数据。然后,加密的数据通过多径通道发送到接收方。在将数据发送给接收方之前,使用WLBWO对带宽进行估计。最后,执行相反的过程。大量的实验结果表明,该系统比传统方法更有效。
{"title":"An Optimized Bandwidth Estimation for Adaptive Video Streaming Systems Using WLBWO Algorithm","authors":"S. Agal, P. Gokani","doi":"10.4018/IJITN.2021070107","DOIUrl":"https://doi.org/10.4018/IJITN.2021070107","url":null,"abstract":"The increasing popularity of streaming video is a cause of concern for the stability of the internet because most streaming video content is currently delivered via UDP without any end-to-end congestion control. Since the internet relies on end systems implementing transmit rate regulation, there has recently been significant interest in congestion control mechanisms that are both fair to TCP and effective in delivering real-time streams. Streaming video over the internet requires dealing with bandwidth and delay that vary over time. Many video streaming applications address this problem by adapting the quality of the scalable video. But it produces poor quality service, and sending data on this channel results in buffering time. To trounce these issues, this paper proposed optimized bandwidth estimation for adaptive video streaming systems using the WLBWO algorithm. Originally, the input video is compressed by using the UHE algorithm. Next, the system proposes a KEECC to securely transfer the data. Then, the encrypted data is sent to the receiver via a multipath channel. Before sending the data to the receiver, the bandwidth is estimated by using the WLBWO. Finally, the inverse process is performed. Extensive experimental results showed the effectiveness of the proposed system than conventional methods.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transmit Power and Rate Control for Spatial Reuse in Dense Wireless LANs 密集无线局域网空间复用的发射功率和速率控制
Pub Date : 2021-07-01 DOI: 10.4018/IJITN.2021070102
M. Knitter, R. Kays, W. Endemann
Spatial reuse is an approach to better utilize the wireless medium in dense networks. In contrast to time multiplexed channel access, the idea is to allow a certain level of interference between parallel transmitting links. Depending on transmit power and rate settings, such parallel transmissions may result in increased overall system performance. This paper presents a systematic approach to model dense networks and optimize transmit power and rate settings for best total system performance. It discusses driving factors and limitations for spatial reuse. The paper introduces two algorithms for concurrent optimal transmit power and rate selection. System simulations using a fading channel model compare the performance of the algorithms against CSMA/CA. The simulation results show that average system performance can be increased by 100% and more.
空间复用是在密集网络中更好地利用无线介质的一种方法。与时间复用通道访问相反,其思想是允许在并行传输链路之间存在一定程度的干扰。根据传输功率和速率设置,这种并行传输可能会提高系统的整体性能。本文提出了一种系统的方法来模拟密集网络,并优化发射功率和速率设置,以获得最佳的总体系统性能。讨论了空间再利用的驱动因素和限制因素。介绍了两种并行最优发射功率和速率选择算法。使用衰落信道模型进行系统仿真,比较了该算法与CSMA/CA算法的性能。仿真结果表明,该方法可使系统的平均性能提高100%以上。
{"title":"Transmit Power and Rate Control for Spatial Reuse in Dense Wireless LANs","authors":"M. Knitter, R. Kays, W. Endemann","doi":"10.4018/IJITN.2021070102","DOIUrl":"https://doi.org/10.4018/IJITN.2021070102","url":null,"abstract":"Spatial reuse is an approach to better utilize the wireless medium in dense networks. In contrast to time multiplexed channel access, the idea is to allow a certain level of interference between parallel transmitting links. Depending on transmit power and rate settings, such parallel transmissions may result in increased overall system performance. This paper presents a systematic approach to model dense networks and optimize transmit power and rate settings for best total system performance. It discusses driving factors and limitations for spatial reuse. The paper introduces two algorithms for concurrent optimal transmit power and rate selection. System simulations using a fading channel model compare the performance of the algorithms against CSMA/CA. The simulation results show that average system performance can be increased by 100% and more.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134244968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Conceptual Modeling of an IP Phone Communication System: A Case Study IP电话通信系统的概念建模:一个案例研究
Pub Date : 2021-07-01 DOI: 10.4018/IJITN.2021070106
S. Al-Fedaghi, Ghadeer Aldamkhi
In computing, a network generally denotes devices, often referred to as nodes, connected by links. Networks that are modeled with diagrams consist of hundreds of symbols, images, pictures, and icons, such as a computer, a server rack, or a cloud-based storage system. Network representations provide valuable insights into understanding the systems' underlying structures and mechanisms. Nevertheless, this unusually large number of superficial symbols and icons reflects a need for more systematic representations of the interiority of nodes. To give uniformity to this cascade of notions of basic units of nodes in network diagrams, the authors propose adoption of a new modeling methodology, called a thinging (abstract) machine (TM) (abstract machine of things) that represents all notions as a single diagrammatic machine. Because of the large number of network types, in this paper, they specifically and without loss of generality focus on IP telephone (internet protocol telephone) networks to exemplify communication networks. A real case study of IP telephone networks is modeled using TM.
在计算中,网络通常是指通过链路连接起来的设备,通常称为节点。用图表建模的网络由数百个符号、图像、图片和图标组成,例如计算机、服务器机架或基于云的存储系统。网络表示为理解系统的底层结构和机制提供了有价值的见解。然而,这种异常大量的表面符号和图标反映了对节点内部更系统的表示的需求。为了统一网络图中节点基本单位的概念级联,作者建议采用一种新的建模方法,称为事物(抽象)机器(TM)(事物的抽象机器),它将所有概念表示为单个图解机器。由于网络类型众多,本文专门以IP电话(internet protocol telephone, internet协议电话)网络为例,并不失通用性。利用TM对IP电话网络的一个实际案例进行了建模。
{"title":"Conceptual Modeling of an IP Phone Communication System: A Case Study","authors":"S. Al-Fedaghi, Ghadeer Aldamkhi","doi":"10.4018/IJITN.2021070106","DOIUrl":"https://doi.org/10.4018/IJITN.2021070106","url":null,"abstract":"In computing, a network generally denotes devices, often referred to as nodes, connected by links. Networks that are modeled with diagrams consist of hundreds of symbols, images, pictures, and icons, such as a computer, a server rack, or a cloud-based storage system. Network representations provide valuable insights into understanding the systems' underlying structures and mechanisms. Nevertheless, this unusually large number of superficial symbols and icons reflects a need for more systematic representations of the interiority of nodes. To give uniformity to this cascade of notions of basic units of nodes in network diagrams, the authors propose adoption of a new modeling methodology, called a thinging (abstract) machine (TM) (abstract machine of things) that represents all notions as a single diagrammatic machine. Because of the large number of network types, in this paper, they specifically and without loss of generality focus on IP telephone (internet protocol telephone) networks to exemplify communication networks. A real case study of IP telephone networks is modeled using TM.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125837529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Design, Implementation, and Analysis of Vertical Handoff Decision Algorithm 垂直切换决策算法的设计、实现与分析
Pub Date : 2021-07-01 DOI: 10.4018/IJITN.2021070103
S. Goutam, S. Unnikrishnan
The increasing use of mobile communication and computing has made accurate and efficient methods of executing vertical handoff a necessity. This research paper captures the design and implementation of an effectual algorithm for making decision for vertical handoff based on fuzzy logic. The input parameters considered are bandwidth, battery status, and cost. The authors present analysis of the handover value, which gives the handoff decision, in relation to the input attributes, using regression analysis, correlation analysis, and ANOVA.
移动通信和计算的日益普及使得精确和有效地执行垂直切换的方法成为必要。本文研究了一种基于模糊逻辑的垂直切换决策算法的设计与实现。考虑的输入参数包括带宽、电池状态和成本。作者使用回归分析、相关分析和方差分析对切换值进行了分析,该值给出了与输入属性相关的切换决策。
{"title":"Design, Implementation, and Analysis of Vertical Handoff Decision Algorithm","authors":"S. Goutam, S. Unnikrishnan","doi":"10.4018/IJITN.2021070103","DOIUrl":"https://doi.org/10.4018/IJITN.2021070103","url":null,"abstract":"The increasing use of mobile communication and computing has made accurate and efficient methods of executing vertical handoff a necessity. This research paper captures the design and implementation of an effectual algorithm for making decision for vertical handoff based on fuzzy logic. The input parameters considered are bandwidth, battery status, and cost. The authors present analysis of the handover value, which gives the handoff decision, in relation to the input attributes, using regression analysis, correlation analysis, and ANOVA.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121302955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the Physical Layer in the OFDM-Based Internet of Things (IoT) by Using Frequency Hopping Technique 基于ofdm的物联网(IoT)物理层的跳频保护
Pub Date : 2021-07-01 DOI: 10.4018/IJITN.2021070105
Ali Alsadi, S. Mohan
The physical layer security in the context of the internet of things is still one of the challenges due to the resource constraints of the end terminals and the IoT network heterogeneity. Although it has been adopted by different wireless applications due to its high spectral efficiency, the OFDM physical layer remains a challenge. The frequency hopping technique is used to protect the nodes from jamming and eavesdropping attacks. The cyclic prefix manipulation has been simulated against different time-delayed paths and the simulated results compared to the theoretical ones. The comparison shows a close match and the guard width encryption mechanism worked as desired.
由于终端资源的限制和物联网网络的异构性,物联网环境下的物理层安全仍然是一个挑战。虽然由于其频谱效率高,已经被不同的无线应用所采用,但OFDM物理层仍然是一个挑战。采用跳频技术保护节点免受干扰和窃听攻击。对不同时延路径下的循环前缀操作进行了仿真,并将仿真结果与理论结果进行了比较。通过比较,可以看出两者的匹配程度非常接近,并且保护宽度加密机制能够正常工作。
{"title":"Securing the Physical Layer in the OFDM-Based Internet of Things (IoT) by Using Frequency Hopping Technique","authors":"Ali Alsadi, S. Mohan","doi":"10.4018/IJITN.2021070105","DOIUrl":"https://doi.org/10.4018/IJITN.2021070105","url":null,"abstract":"The physical layer security in the context of the internet of things is still one of the challenges due to the resource constraints of the end terminals and the IoT network heterogeneity. Although it has been adopted by different wireless applications due to its high spectral efficiency, the OFDM physical layer remains a challenge. The frequency hopping technique is used to protect the nodes from jamming and eavesdropping attacks. The cyclic prefix manipulation has been simulated against different time-delayed paths and the simulated results compared to the theoretical ones. The comparison shows a close match and the guard width encryption mechanism worked as desired.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116995925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Interdiscip. Telecommun. Netw.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1