首页 > 最新文献

J. Comput. Mediat. Commun.最新文献

英文 中文
High-Accuracy Visualization-Based Grouping of MIMO Multipath Waves 基于可视化的MIMO多径波高精度分组
Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.1.68-75
Emmanuel T. Trinidad, Lawrence Materum
Wireless multipath propagation causes different paths taken by the signal due to interacting objects present in the environment producing multipath components (MPCs). Cluster-based channel models characterize the wireless channel, and different approaches are utilized to cluster the MPCs. Data mining requires different techniques such as visualization to extract important information and find patterns and clusters in the data. A Graphical User Interface (GUI) is developed in this paper to aid the visualization and the manual clustering of MPCs using t-distributed Stochastic Neighborhood Embedding (t-SNE) and Uniform Manifold Approximation and Projection (UMAP). The clustering results of Simultaneous Clustering and Model Selection (SCAMS) are used in this paper. The datasets are embedded into low-dimensional projection and are manually re-clustered. The manual clustering was performed visually and interactively, which achieves a higher Jaccard membership index with a low value of 0.3368, a median of 0.4697, and a high value of 0.8884 for all the datasets.
由于环境中存在的相互作用的物体产生多路径组件(mpc),无线多路径传播导致信号采取不同的路径。基于聚类的信道模型描述了无线信道的特征,并采用不同的方法对mpc进行聚类。数据挖掘需要不同的技术,如可视化来提取重要信息,并在数据中找到模式和聚类。本文利用t分布随机邻域嵌入(t-SNE)和均匀流形逼近与投影(UMAP),开发了一个图形用户界面(GUI)来辅助mpc的可视化和人工聚类。本文采用了同时聚类和模型选择(SCAMS)的聚类结果。将数据集嵌入到低维投影中,并手动重新聚类。人工聚类以可视化和交互的方式进行,获得了较高的Jaccard隶属度指数,所有数据集的Jaccard隶属度指数低值为0.3368,中位数为0.4697,高值为0.8884。
{"title":"High-Accuracy Visualization-Based Grouping of MIMO Multipath Waves","authors":"Emmanuel T. Trinidad, Lawrence Materum","doi":"10.12720/jcm.18.1.68-75","DOIUrl":"https://doi.org/10.12720/jcm.18.1.68-75","url":null,"abstract":"Wireless multipath propagation causes different paths taken by the signal due to interacting objects present in the environment producing multipath components (MPCs). Cluster-based channel models characterize the wireless channel, and different approaches are utilized to cluster the MPCs. Data mining requires different techniques such as visualization to extract important information and find patterns and clusters in the data. A Graphical User Interface (GUI) is developed in this paper to aid the visualization and the manual clustering of MPCs using t-distributed Stochastic Neighborhood Embedding (t-SNE) and Uniform Manifold Approximation and Projection (UMAP). The clustering results of Simultaneous Clustering and Model Selection (SCAMS) are used in this paper. The datasets are embedded into low-dimensional projection and are manually re-clustered. The manual clustering was performed visually and interactively, which achieves a higher Jaccard membership index with a low value of 0.3368, a median of 0.4697, and a high value of 0.8884 for all the datasets.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"27 1","pages":"68-75"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83367245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Proposed Compact Broadband Meander Antenna for RFID Applications 一种用于RFID应用的紧凑型宽带弯曲天线
Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.3.140-146
A. Al-Ka'bi
Radio Frequency Identification technology aims at identifying and tracking objects labeled with tags. To achieve this goal, the need for antennas with certain characteristics and specifications becomes of great importance. In this research work, a proposed compact broadband meander antenna for Radio Frequency Identification Applications is presented. In the proposed model of the antenna, the inductive strips are bent to generate capacitive effects between them. To achieve an acceptable impedance matching at a frequency of 876MHz between the antenna and the receiving microchip of model “NXP UCODE G2XL”, shorting lines created along the antenna structure together with a T-shaped matching circuit are used. This proposed design of the antenna results in a compact size antenna (75×25×1.6mm3) with a resonance frequency that lies in theEuropean band of 867MHz, and it has an input impedance of Z = 16 - j156 Ω. The antenna is made from copper strip with a thickness of 35 μm and fabricated on an FR4 epoxy substrate with a thickness of 1.6 mm. This paper presents the proposed antenna simulation results performed in various situations and conditions. The antenna performance is investigated in terms of various aspects such as gain, radiation pattern, return loss, and input impedance.
射频识别技术旨在识别和跟踪带有标签的物体。为了实现这一目标,对具有一定特性和规格的天线的需求变得非常重要。在本研究中,提出了一种用于射频识别应用的紧凑型宽带弯曲天线。在所提出的天线模型中,电感带被弯曲以在它们之间产生电容效应。为了实现天线与型号为“NXP UCODE G2XL”的接收微芯片在876MHz频率上的可接受阻抗匹配,采用沿天线结构建立短线,并配合t型匹配电路。该天线的设计结果是一个紧凑尺寸的天线(75×25×1.6mm3),谐振频率位于867MHz的欧洲频段,其输入阻抗为Z = 16 - j156 Ω。天线采用厚度为35 μm的铜带,制作在厚度为1.6 mm的FR4环氧基板上。本文给出了该天线在各种情况和条件下的仿真结果。从增益、辐射方向图、回波损耗和输入阻抗等方面对天线性能进行了研究。
{"title":"A Proposed Compact Broadband Meander Antenna for RFID Applications","authors":"A. Al-Ka'bi","doi":"10.12720/jcm.18.3.140-146","DOIUrl":"https://doi.org/10.12720/jcm.18.3.140-146","url":null,"abstract":"Radio Frequency Identification technology aims at identifying and tracking objects labeled with tags. To achieve this goal, the need for antennas with certain characteristics and specifications becomes of great importance. In this research work, a proposed compact broadband meander antenna for Radio Frequency Identification Applications is presented. In the proposed model of the antenna, the inductive strips are bent to generate capacitive effects between them. To achieve an acceptable impedance matching at a frequency of 876MHz between the antenna and the receiving microchip of model “NXP UCODE G2XL”, shorting lines created along the antenna structure together with a T-shaped matching circuit are used. This proposed design of the antenna results in a compact size antenna (75×25×1.6mm3) with a resonance frequency that lies in theEuropean band of 867MHz, and it has an input impedance of Z = 16 - j156 Ω. The antenna is made from copper strip with a thickness of 35 μm and fabricated on an FR4 epoxy substrate with a thickness of 1.6 mm. This paper presents the proposed antenna simulation results performed in various situations and conditions. The antenna performance is investigated in terms of various aspects such as gain, radiation pattern, return loss, and input impedance.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"61 1","pages":"140-146"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89957623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Communication Digital FIR Filter for Audio Signals on the FPGA Platform 基于FPGA平台的音频信号通信数字FIR滤波器设计与实现
Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.2.89-96
Mohammed Abdulzahra Ahmed Al-Dulaimi, Husam A. Wahhab, Ahmed Abdulhussein Amer
Digital Signal Processing (DSP) in telecommunications is widely used for its outstanding performance. Hence, optimal results would be obtained with the sophisticated design and implementation of the digital Finite Impulse Response (FIR) filter. In this paper, the design and implementation of the FIR filter for processing the audio signal are obtained through the Field-Programmable Gate Array (FPGA) platform -Altera DE1 board. The design is divided into three primary blocks, which are the S2P Adapter block, Codec initialization block, as well as FIR filter block, which were then interfaced together; then, every block was compiled and simulated in order to obtain accurate results. The whole system was built to be functional, and finally, the frequency response was obtained. 100% significant accuracy and high quality are examined for implementing the filter in FPGA platform chip board programmed in (VHDL).
数字信号处理(DSP)以其优异的性能在电信领域得到了广泛的应用。因此,数字有限脉冲响应(FIR)滤波器的复杂设计和实现将获得最佳结果。本文通过现场可编程门阵列(FPGA)平台——altera DE1板,设计并实现了用于处理音频信号的FIR滤波器。设计分为三个主要模块,分别是S2P适配器模块、编解码器初始化模块和FIR滤波器模块,然后将它们接口在一起;然后,对每个模块进行编译和仿真,以获得准确的结果。对整个系统进行了功能构建,最后得到了系统的频率响应。该滤波器在VHDL编程的FPGA平台上实现,具有100%的显著精度和高质量。
{"title":"Design and Implementation of Communication Digital FIR Filter for Audio Signals on the FPGA Platform","authors":"Mohammed Abdulzahra Ahmed Al-Dulaimi, Husam A. Wahhab, Ahmed Abdulhussein Amer","doi":"10.12720/jcm.18.2.89-96","DOIUrl":"https://doi.org/10.12720/jcm.18.2.89-96","url":null,"abstract":"Digital Signal Processing (DSP) in telecommunications is widely used for its outstanding performance. Hence, optimal results would be obtained with the sophisticated design and implementation of the digital Finite Impulse Response (FIR) filter. In this paper, the design and implementation of the FIR filter for processing the audio signal are obtained through the Field-Programmable Gate Array (FPGA) platform -Altera DE1 board. The design is divided into three primary blocks, which are the S2P Adapter block, Codec initialization block, as well as FIR filter block, which were then interfaced together; then, every block was compiled and simulated in order to obtain accurate results. The whole system was built to be functional, and finally, the frequency response was obtained. 100% significant accuracy and high quality are examined for implementing the filter in FPGA platform chip board programmed in (VHDL).","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"29 1","pages":"89-96"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85552030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Accuracy and Cluster Analysis of 5.3 GHz Indoor and 285 MHz Semi-urban MIMO LOS and NLOS Propagation Multipaths 5.3 GHz室内和285 MHz半城市MIMO LOS和NLOS传播多径精度和聚类分析
Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.2.135-139
Antipas T. Teologo, Lawrence Materum
Over the past decade, several studies have been conducted to discover a better-performing multipath clustering technique. Developing a multipath clustering technique with better accuracy performance is a big challenge considering the varying properties of the multipath propagations that change over time. In this study, several clustering techniques have been investigated and compared to the newly-developed technique for performance analysis. Using the Jaccard score as a metric for the accuracy of grouping correctly the wireless multipaths, the performance of the different clustering techniques has been determined and compared to the newly-developed technique. The proposed clustering algorithm shows improved performance in the indoor channel scenarios but needs further investigation in the semi-urban environment.
在过去的十年中,已经进行了一些研究,以发现性能更好的多路径聚类技术。考虑到多径传播随时间变化的特性,开发具有更好精度性能的多径聚类技术是一个很大的挑战。在本研究中,研究了几种聚类技术,并将其与新开发的性能分析技术进行了比较。利用Jaccard分数作为衡量无线多路径正确分组精度的指标,确定了不同聚类技术的性能,并与新开发的聚类技术进行了比较。本文提出的聚类算法在室内信道场景下表现出较好的性能,但在半城市环境下仍需进一步研究。
{"title":"Accuracy and Cluster Analysis of 5.3 GHz Indoor and 285 MHz Semi-urban MIMO LOS and NLOS Propagation Multipaths","authors":"Antipas T. Teologo, Lawrence Materum","doi":"10.12720/jcm.18.2.135-139","DOIUrl":"https://doi.org/10.12720/jcm.18.2.135-139","url":null,"abstract":"Over the past decade, several studies have been conducted to discover a better-performing multipath clustering technique. Developing a multipath clustering technique with better accuracy performance is a big challenge considering the varying properties of the multipath propagations that change over time. In this study, several clustering techniques have been investigated and compared to the newly-developed technique for performance analysis. Using the Jaccard score as a metric for the accuracy of grouping correctly the wireless multipaths, the performance of the different clustering techniques has been determined and compared to the newly-developed technique. The proposed clustering algorithm shows improved performance in the indoor channel scenarios but needs further investigation in the semi-urban environment.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"14 1","pages":"135-139"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88333346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimizing Data Transport Efficiency in Datacenters through Traffic Shaping of BBR Congestion Control 通过BBR拥塞控制的流量整形优化数据中心的数据传输效率
Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.2.97-108
S. Ahmad, Sadia Khalid
Compared to commonly used loss-based congestion control algorithms predominantly used in Transmission Control Protocol (TCP) implementations, congestion-based congestion control called BBR has shown much better performance in resource-abundant modern communication links. However, for a high influx of TCP sessions on the bottleneck switch, clusters in High-Performance Compute (HPC) nodes and data centers face resource constraints because of the immense workload during orchestration and relocation of workflows across the resource pool. This article discusses how to resolve this problem, commonly known as TCP incast, through efficient queue management of the bottleneck link and adding a shaper function in the standard BBR algorithm. We analyzed TCP incast issue for two efficient versions of congestion control i.e., BBR and CUBIC (named after the cubic function used instead of linear function), in a highly overloaded convergent switch of the cluster. It is noticeable that the queuing delay and buffer build-up are two essential parameters in causing TCP Incast. Hence, we used the M/G/1/B queuing model when multiple TCP sessions generate the network traffic and different buffer build-up scenarios are analyzed in the bottleneck node of HPC clusters. Based on the findings of our queuing analysis, we propose an incast recovery BBR algorithm that introduces additional controls like Incast shaping to deal with queue build-up during TCP incast. The effects of these modifications in BBR implementation are studied in terms of performance parameters like flow completion time, throughput, RTT variations, and fairness to other competing flows are significant compared with standard BBR and CUBIC implementations.
与TCP实现中常用的基于损失的拥塞控制算法相比,基于拥塞的BBR在资源丰富的现代通信链路中表现出了更好的性能。然而,对于瓶颈交换机上的大量TCP会话,高性能计算(HPC)节点和数据中心中的集群面临资源限制,因为在跨资源池的编排和重新定位工作流期间存在巨大的工作负载。本文讨论了如何通过对瓶颈链路进行有效的队列管理和在标准BBR算法中添加shaper函数来解决这个通常称为TCP incast的问题。我们分析了集群高度过载的收敛交换机中两个有效版本的拥塞控制,即BBR和CUBIC(以使用立方函数而不是线性函数命名)。值得注意的是,排队延迟和缓冲区建立是引起TCP分组的两个基本参数。因此,我们在多个TCP会话产生网络流量时采用M/G/1/B排队模型,并在高性能计算集群的瓶颈节点上分析了不同的缓冲区构建场景。基于我们的排队分析结果,我们提出了一种连铸恢复BBR算法,该算法引入了额外的控制,如连铸成形,以处理TCP连铸期间的队列建立。与标准BBR和CUBIC实现相比,这些修改对BBR实现的影响在流量完成时间、吞吐量、RTT变化和对其他竞争流的公平性等性能参数方面进行了研究。
{"title":"Optimizing Data Transport Efficiency in Datacenters through Traffic Shaping of BBR Congestion Control","authors":"S. Ahmad, Sadia Khalid","doi":"10.12720/jcm.18.2.97-108","DOIUrl":"https://doi.org/10.12720/jcm.18.2.97-108","url":null,"abstract":"Compared to commonly used loss-based congestion control algorithms predominantly used in Transmission Control Protocol (TCP) implementations, congestion-based congestion control called BBR has shown much better performance in resource-abundant modern communication links. However, for a high influx of TCP sessions on the bottleneck switch, clusters in High-Performance Compute (HPC) nodes and data centers face resource constraints because of the immense workload during orchestration and relocation of workflows across the resource pool. This article discusses how to resolve this problem, commonly known as TCP incast, through efficient queue management of the bottleneck link and adding a shaper function in the standard BBR algorithm. We analyzed TCP incast issue for two efficient versions of congestion control i.e., BBR and CUBIC (named after the cubic function used instead of linear function), in a highly overloaded convergent switch of the cluster. It is noticeable that the queuing delay and buffer build-up are two essential parameters in causing TCP Incast. Hence, we used the M/G/1/B queuing model when multiple TCP sessions generate the network traffic and different buffer build-up scenarios are analyzed in the bottleneck node of HPC clusters. Based on the findings of our queuing analysis, we propose an incast recovery BBR algorithm that introduces additional controls like Incast shaping to deal with queue build-up during TCP incast. The effects of these modifications in BBR implementation are studied in terms of performance parameters like flow completion time, throughput, RTT variations, and fairness to other competing flows are significant compared with standard BBR and CUBIC implementations.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"11 1","pages":"97-108"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87212112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensing technologies, digital inclusion, and disability diversity 传感技术、数字包容和残疾人多样性
Pub Date : 2023-01-01 DOI: 10.1093/jcmc/zmad026
Sarah Nectoux, Liam Magee, K. Soldatic
{"title":"Sensing technologies, digital inclusion, and disability diversity","authors":"Sarah Nectoux, Liam Magee, K. Soldatic","doi":"10.1093/jcmc/zmad026","DOIUrl":"https://doi.org/10.1093/jcmc/zmad026","url":null,"abstract":"","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86467467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-cooperative Game Leach for Cluster Distribution Routing Method on Wireless Sensor Network (WSN) 无线传感器网络(WSN)集群分布路由方法的非合作博弈过滤
Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.3.198-206
M. Asvial, Awangga Febian Surya Admaja, Muh Asnoer Laagu
A wireless sensor network (WSN) is a group of sensor nodes that take data with specific measurement parameters and then send the data wirelessly to a central node or server for data processing. WSN nodes are designed to be compact; therefore, the energy of sensor nodes usually depends on the integrated battery. The sensor node must work as efficiently as possible so that energy use can be more efficient and WSN life can be prolonged. The longer the lifespan of the WSN, the higher the throughput. One of the many ways to extend the life of the WSN is to use the concept of grouping nodes or the so-called cluster method. This study proposes the The Division Non-Cooperative Game LEACH (DivNCGL) routing method, a modified method based on Low Energy Adaptive Clustering Hierarchy (LEACH) by distributing cluster heads (CHs). The distribution process is performed by dividing the distribution area of the nodes into subregions. The subregion division process uses the probability value obtained by the non-cooperative game method based on the remaining active nodes, the total remaining energy, and the energy required for transmission. The simulation results, the lifespan of WSN using the DivNCGL method increases up to 30% with stable energy dissipation compared to the LEACH protocol. The increasing lifespan of the WSN also increases the amount of data transmitted, thereby increasing the received throughput. Received data increases up to 70% using the DivNCGL method compared to LEACH.
无线传感器网络(WSN)是一组传感器节点,它们接收具有特定测量参数的数据,然后将数据无线发送到中心节点或服务器进行数据处理。WSN节点设计紧凑;因此,传感器节点的能量通常取决于集成电池。传感器节点必须尽可能高效地工作,这样才能更有效地利用能源,延长WSN的使用寿命。无线传感器网络的寿命越长,吞吐量越高。延长WSN寿命的众多方法之一是使用分组节点的概念或所谓的集群方法。本研究提出了分部非合作博弈LEACH (DivNCGL)路由方法,这是一种基于低能量自适应聚类层次(LEACH)的改进方法,通过分配簇头(CHs)。分布过程通过将节点的分布区域划分为子区域来完成。子区域划分过程使用基于剩余活动节点、总剩余能量和传输所需能量的非合作博弈方法得到的概率值。仿真结果表明,与LEACH协议相比,采用DivNCGL方法的WSN寿命提高了30%,且能耗稳定。WSN寿命的延长也增加了传输的数据量,从而增加了接收的吞吐量。与LEACH相比,使用DivNCGL方法接收的数据增加了70%。
{"title":"Non-cooperative Game Leach for Cluster Distribution Routing Method on Wireless Sensor Network (WSN)","authors":"M. Asvial, Awangga Febian Surya Admaja, Muh Asnoer Laagu","doi":"10.12720/jcm.18.3.198-206","DOIUrl":"https://doi.org/10.12720/jcm.18.3.198-206","url":null,"abstract":"A wireless sensor network (WSN) is a group of sensor nodes that take data with specific measurement parameters and then send the data wirelessly to a central node or server for data processing. WSN nodes are designed to be compact; therefore, the energy of sensor nodes usually depends on the integrated battery. The sensor node must work as efficiently as possible so that energy use can be more efficient and WSN life can be prolonged. The longer the lifespan of the WSN, the higher the throughput. One of the many ways to extend the life of the WSN is to use the concept of grouping nodes or the so-called cluster method. This study proposes the The Division Non-Cooperative Game LEACH (DivNCGL) routing method, a modified method based on Low Energy Adaptive Clustering Hierarchy (LEACH) by distributing cluster heads (CHs). The distribution process is performed by dividing the distribution area of the nodes into subregions. The subregion division process uses the probability value obtained by the non-cooperative game method based on the remaining active nodes, the total remaining energy, and the energy required for transmission. The simulation results, the lifespan of WSN using the DivNCGL method increases up to 30% with stable energy dissipation compared to the LEACH protocol. The increasing lifespan of the WSN also increases the amount of data transmitted, thereby increasing the received throughput. Received data increases up to 70% using the DivNCGL method compared to LEACH.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"20 1","pages":"198-206"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77137780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Traffic Models under Multiple Black hole Attack in Wireless Mesh Network 无线网状网络多重黑洞攻击下的流量模型评估
Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.3.172-179
Dr. Pushpender Sarao
Wireless networks are the networks in which data communication is done through the wireless channels and wireless nodes. In such type of the networks, cooperation of the all nodes is required. Due to which, chances of security attacks is possible and network performance and security is badly affected. Black hole attack is a security attack comes under the active, internal as well as external attacks. In black hole attack, malicious node presents a suitable, shortest and low cost path. If the above path is selected for data transmission, malicious node drops the received packets and as a result performance of the network is degraded. In this paper, impact of Random Direction (RD) and Reference Point Group Mobility (RPGM) models have been analyzed for wireless mesh network in the presence of multiple black hole attacks. By varying the number of network connections and node density, (Ad hoc on demand distance vector) AODV routing protocol is evaluated. Normalized routing load, average end to end delay, average throughput, and total number of packets received are considered as performance metrics. Bonn-motion tool has been used to create the scenario of mobility models. In the presence of black hole attack, and under RPGM mobility model, AODV routing protocol presents better results in respect of average throughput, normalized routing load. Simulation work has been carried out on network simulator version NS-2.35.
无线网络是通过无线信道和无线节点进行数据通信的网络。在这种类型的网络中,需要所有节点的合作。因此,有可能受到安全攻击,严重影响网络性能和安全性。黑洞攻击是一种安全攻击下的主动攻击,既有内部攻击,也有外部攻击。在黑洞攻击中,恶意节点提供了一条合适的、最短的、低代价的路径。如果选择上述路径进行数据传输,恶意节点会丢弃接收到的数据包,导致网络性能下降。本文分析了随机方向(RD)和参考点群移动(RPGM)模型对存在多重黑洞攻击的无线网状网络的影响。通过改变网络连接数和节点密度,评估(Ad hoc on demand distance vector) AODV路由协议。标准化路由负载、平均端到端延迟、平均吞吐量和接收的数据包总数被视为性能指标。波恩运动工具已被用于创建移动模型的场景。在黑洞攻击存在的情况下,在RPGM迁移模型下,AODV路由协议在平均吞吐量、归一化路由负载方面表现出较好的性能。在NS-2.35网络模拟器上进行了仿真工作。
{"title":"Evaluation of Traffic Models under Multiple Black hole Attack in Wireless Mesh Network","authors":"Dr. Pushpender Sarao","doi":"10.12720/jcm.18.3.172-179","DOIUrl":"https://doi.org/10.12720/jcm.18.3.172-179","url":null,"abstract":"Wireless networks are the networks in which data communication is done through the wireless channels and wireless nodes. In such type of the networks, cooperation of the all nodes is required. Due to which, chances of security attacks is possible and network performance and security is badly affected. Black hole attack is a security attack comes under the active, internal as well as external attacks. In black hole attack, malicious node presents a suitable, shortest and low cost path. If the above path is selected for data transmission, malicious node drops the received packets and as a result performance of the network is degraded. In this paper, impact of Random Direction (RD) and Reference Point Group Mobility (RPGM) models have been analyzed for wireless mesh network in the presence of multiple black hole attacks. By varying the number of network connections and node density, (Ad hoc on demand distance vector) AODV routing protocol is evaluated. Normalized routing load, average end to end delay, average throughput, and total number of packets received are considered as performance metrics. Bonn-motion tool has been used to create the scenario of mobility models. In the presence of black hole attack, and under RPGM mobility model, AODV routing protocol presents better results in respect of average throughput, normalized routing load. Simulation work has been carried out on network simulator version NS-2.35.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"10 2 1","pages":"172-179"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78316760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Comparison of SOM and ACO for Travelling Salesman Problem-Case Study on the Indonesia Palapa Ring Network 旅行推销员SOM与蚁群算法的性能比较——以印尼帕拉帕环网络为例
Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.2.109-115
R. Negara, Ratna Mayasari, Nana R. Syambas
Indonesia is an archipelagic country separated by the sea, so it has unique characteristics. Building a telecommunications network that optimally connects Indonesia's islands is essential. Currently, telecommunications networks in Indonesia are connected using the Palapa Ring Indonesia network. Several adjacent islands must specify the closest point to choose a neighbouring route. This paper uses a travelling salesman problem (TSP) that uses the Self-Organizing Map (SOM) and Ant-Colony Optimization (ACO) algorithms to determine the shortest route and optimal computation time. Paper modification has several parameters: number of iterations, neuron size, and space. The measurement results show that SOM is better at measuring the shortest route length and computational time than ACO. By setting the number of iterations below 500 and the M value as much as the number of neurons, the route obtained by SOM will be shorter with a shorter time.
印度尼西亚是一个被海隔开的群岛国家,因此具有独特的特点。建立一个最佳连接印尼岛屿的电信网络至关重要。目前,印度尼西亚的电信网络是使用Palapa Ring Indonesia网络连接的。几个相邻的岛屿必须指定最近的点来选择相邻的路线。本文采用自组织映射(SOM)和蚁群优化(ACO)算法求解旅行商问题(TSP)来确定最短路线和最优计算时间。论文修改有几个参数:迭代次数、神经元大小和空间。测量结果表明,SOM在测量最短路径长度和计算时间方面优于蚁群算法。将迭代次数设置为500次以下,M值与神经元数量相同,SOM获得的路由会随着时间的缩短而缩短。
{"title":"Performance Comparison of SOM and ACO for Travelling Salesman Problem-Case Study on the Indonesia Palapa Ring Network","authors":"R. Negara, Ratna Mayasari, Nana R. Syambas","doi":"10.12720/jcm.18.2.109-115","DOIUrl":"https://doi.org/10.12720/jcm.18.2.109-115","url":null,"abstract":"Indonesia is an archipelagic country separated by the sea, so it has unique characteristics. Building a telecommunications network that optimally connects Indonesia's islands is essential. Currently, telecommunications networks in Indonesia are connected using the Palapa Ring Indonesia network. Several adjacent islands must specify the closest point to choose a neighbouring route. This paper uses a travelling salesman problem (TSP) that uses the Self-Organizing Map (SOM) and Ant-Colony Optimization (ACO) algorithms to determine the shortest route and optimal computation time. Paper modification has several parameters: number of iterations, neuron size, and space. The measurement results show that SOM is better at measuring the shortest route length and computational time than ACO. By setting the number of iterations below 500 and the M value as much as the number of neurons, the route obtained by SOM will be shorter with a shorter time.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"31 1","pages":"109-115"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90913755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Lightweight Encryption Algorithm to Enhance Wireless Sensor Network Security on the Internet of Things 一种增强物联网无线传感器网络安全的轻量级加密算法
Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.1.47-57
Ntebatseng Mahlake, Topside E. Mathonsi, D. D. Plessis, Tonderai Muchenje
The Internet of Things (IoT) is an anticipated future technology that promises to connect a massive number of devices over the internet. Wireless Sensor Networks (WSNs) are regarded as one of the most essential subnetworks of the IoT. Sensor networks are being utilized by IoT to gather, monitor, and send sensitive data across wireless networks. Because the information transferred through WSNs is easily exposed to cyber-attacks, data security is critical. In WSNs, the attacker's adversary aims are to deteriorate and halt the network's effective use, as well as to interrupt network services, rendering them unreachable to the users or providing a user with false feedback. Since the users don’t have control over their data transmitted on the wireless medium or stored in the middleware, anyone with internet access can access it. This puts data confidentiality, authenticity, and integrity at risk since users with unauthorized access can easily access, alter, and manipulate data in transit. The proposed Lightweight Security Algorithm (LSA) is a hybrid algorithm created by combining the Security Protocol for Sensor Networks (SPINS) with the Secure IoT (SIT) encryption technique to improve WSN’s data security while lowering the threshold of attacks and minimize power consumption in WSNs without impacting network performance. Furthermore, the proposed LSA reduces the key generation time by 102mS thus improving the security by 99%. During data transmission, the power consumption is reduced by an average of 411.2uJ and the Packet Drop Ratio (PDR) is between 90 and 99% when comparing it with SPN and Feistel techniques.
物联网(IoT)是一项有望通过互联网连接大量设备的未来技术。无线传感器网络(wsn)被认为是物联网中最重要的子网之一。物联网正利用传感器网络在无线网络上收集、监控和发送敏感数据。由于通过无线传感器网络传输的信息容易受到网络攻击,因此数据安全至关重要。在无线传感器网络中,攻击者的攻击目标是破坏和停止网络的有效使用,以及中断网络服务,使用户无法访问网络或向用户提供错误的反馈。由于用户无法控制他们在无线媒体上传输的数据或存储在中间件中的数据,任何有互联网接入的人都可以访问它。这将使数据的机密性、真实性和完整性面临风险,因为未经授权访问的用户可以轻松访问、更改和操纵传输中的数据。本文提出的轻量级安全算法(LSA)是一种将传感器网络安全协议(SPINS)与安全物联网(SIT)加密技术相结合的混合算法,旨在提高WSN的数据安全性,同时降低攻击阈值,并在不影响网络性能的情况下将WSN的功耗降至最低。此外,该LSA的密钥生成时间缩短了102mS,安全性提高了99%。在数据传输过程中,与SPN和Feistel技术相比,平均降低功耗411.2uJ, PDR (Packet Drop Ratio)在90% ~ 99%之间。
{"title":"A Lightweight Encryption Algorithm to Enhance Wireless Sensor Network Security on the Internet of Things","authors":"Ntebatseng Mahlake, Topside E. Mathonsi, D. D. Plessis, Tonderai Muchenje","doi":"10.12720/jcm.18.1.47-57","DOIUrl":"https://doi.org/10.12720/jcm.18.1.47-57","url":null,"abstract":"The Internet of Things (IoT) is an anticipated future technology that promises to connect a massive number of devices over the internet. Wireless Sensor Networks (WSNs) are regarded as one of the most essential subnetworks of the IoT. Sensor networks are being utilized by IoT to gather, monitor, and send sensitive data across wireless networks. Because the information transferred through WSNs is easily exposed to cyber-attacks, data security is critical. In WSNs, the attacker's adversary aims are to deteriorate and halt the network's effective use, as well as to interrupt network services, rendering them unreachable to the users or providing a user with false feedback. Since the users don’t have control over their data transmitted on the wireless medium or stored in the middleware, anyone with internet access can access it. This puts data confidentiality, authenticity, and integrity at risk since users with unauthorized access can easily access, alter, and manipulate data in transit. The proposed Lightweight Security Algorithm (LSA) is a hybrid algorithm created by combining the Security Protocol for Sensor Networks (SPINS) with the Secure IoT (SIT) encryption technique to improve WSN’s data security while lowering the threshold of attacks and minimize power consumption in WSNs without impacting network performance. Furthermore, the proposed LSA reduces the key generation time by 102mS thus improving the security by 99%. During data transmission, the power consumption is reduced by an average of 411.2uJ and the Packet Drop Ratio (PDR) is between 90 and 99% when comparing it with SPN and Feistel techniques.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"262 1","pages":"47-57"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75770730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
J. Comput. Mediat. Commun.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1