Pub Date : 2024-01-03DOI: 10.1080/24751839.2023.2300223
Tahmid Hasan Pranto, Mohammad Nabiluzzaman Neloy, Abdulla All Noman, Sheikh Wasif, Md. Abdul Wahab, R. Rahman
{"title":"Utilizing deep learning in chipless RFID tag detection: an investigation on high-precision mm-wave spatial tag estimation from 2D virtual imaging","authors":"Tahmid Hasan Pranto, Mohammad Nabiluzzaman Neloy, Abdulla All Noman, Sheikh Wasif, Md. Abdul Wahab, R. Rahman","doi":"10.1080/24751839.2023.2300223","DOIUrl":"https://doi.org/10.1080/24751839.2023.2300223","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"11 11","pages":""},"PeriodicalIF":2.7,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139451070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-20DOI: 10.1080/24751839.2023.2294570
Pham Thi Dan Ngoc, Tran Trung Duy, Nguyen Luong Nhat, Tan Hanh, Yeon Ho Chung, L. Tu
{"title":"On the performance of outage probability in cognitive NOMA random networks with hardware impairments","authors":"Pham Thi Dan Ngoc, Tran Trung Duy, Nguyen Luong Nhat, Tan Hanh, Yeon Ho Chung, L. Tu","doi":"10.1080/24751839.2023.2294570","DOIUrl":"https://doi.org/10.1080/24751839.2023.2294570","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"200 ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139170357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-19DOI: 10.1080/24751839.2023.2295094
H. Mehdi, Zakir Hussain, S. M. A. Saleem, Syed Areeb Ahmed
{"title":"Relay-assisted communication over a fluctuating two-ray fading channel","authors":"H. Mehdi, Zakir Hussain, S. M. A. Saleem, Syed Areeb Ahmed","doi":"10.1080/24751839.2023.2295094","DOIUrl":"https://doi.org/10.1080/24751839.2023.2295094","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":" 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138962758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-26DOI: 10.1080/24751839.2023.2285549
Dhairya Veera, Ramchandra S. Mangrulkar, Chetashri Bhadane, Kiran Bhowmick, P. Chavan
{"title":"Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption","authors":"Dhairya Veera, Ramchandra S. Mangrulkar, Chetashri Bhadane, Kiran Bhowmick, P. Chavan","doi":"10.1080/24751839.2023.2285549","DOIUrl":"https://doi.org/10.1080/24751839.2023.2285549","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"176 12 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139235458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-26DOI: 10.1080/24751839.2023.2286764
B. Gładysz, D. Despotis, D. Kuchta
{"title":"Application of data envelopment analysis to IT project evaluation, with special emphasis on the choice of inputs and outputs in the context of the organization in question","authors":"B. Gładysz, D. Despotis, D. Kuchta","doi":"10.1080/24751839.2023.2286764","DOIUrl":"https://doi.org/10.1080/24751839.2023.2286764","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"13 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139235705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-19DOI: 10.1080/24751839.2023.2281144
Thi-Tuyet-Hai Nguyen, Tan N. Nguyen, Tran Trung Duy, Nguyen Hong Son, Tan Hanh, Minh Bui Vu, L. Tu
{"title":"Coverage probability of energy harvesting enabled LoRa networks with stochastic geometry","authors":"Thi-Tuyet-Hai Nguyen, Tan N. Nguyen, Tran Trung Duy, Nguyen Hong Son, Tan Hanh, Minh Bui Vu, L. Tu","doi":"10.1080/24751839.2023.2281144","DOIUrl":"https://doi.org/10.1080/24751839.2023.2281144","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"38 5","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139260425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elliptic Curve Cryptography (ECC) is a promising cryptosystem as it presents the ideal choice for implementing public-key cryptography in resource-limited devices, such as those found in envisioned Internet of Things applications, e.g. wireless sensors. Elliptic Curve ElGamal (ECEG) is a renowned member of the ECC family. However, it requires encoding the message before encryption and decoding it after decryption. To better improve the processing time and to avoid sharing a lookup table, we propose, in this document, a new method that exchanges encoding parameters and authenticates endpoints at the same time. So, our new protocol ensures the authentication of communication parties and integrity of ephemeral encoding parameters. The robustness of our solution is proven by the Scyther tool. Experimental tests have been carried out, and the performance of the new methods is provided and compared with RSA and related work. Security and performance analysis show that our new scheme has achieved improved functionality and higher security while maintaining low computational.
{"title":"Lightweight authentication scheme based on Elliptic Curve El Gamal","authors":"Sondes Baccouri, Hassene Farhat, Tarek Azzabi, Rabah Attia","doi":"10.1080/24751839.2023.2281143","DOIUrl":"https://doi.org/10.1080/24751839.2023.2281143","url":null,"abstract":"Elliptic Curve Cryptography (ECC) is a promising cryptosystem as it presents the ideal choice for implementing public-key cryptography in resource-limited devices, such as those found in envisioned Internet of Things applications, e.g. wireless sensors. Elliptic Curve ElGamal (ECEG) is a renowned member of the ECC family. However, it requires encoding the message before encryption and decoding it after decryption. To better improve the processing time and to avoid sharing a lookup table, we propose, in this document, a new method that exchanges encoding parameters and authenticates endpoints at the same time. So, our new protocol ensures the authentication of communication parties and integrity of ephemeral encoding parameters. The robustness of our solution is proven by the Scyther tool. Experimental tests have been carried out, and the performance of the new methods is provided and compared with RSA and related work. Security and performance analysis show that our new scheme has achieved improved functionality and higher security while maintaining low computational.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"5 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134991859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-06DOI: 10.1080/24751839.2023.2272484
Yakub Kayode Saheed, Temitope Olubanjo Kehinde, Mustafa Ayobami Raji, Usman Ahmad Baba
This research introduces innovative approaches to enhance intrusion detection systems (IDSs) by addressing critical challenges in existing methods. Various machine-learning techniques, including nature-inspired metaheuristics, Bayesian algorithms, and swarm intelligence, have been proposed in the past for attribute selection and IDS performance improvement. However, these methods have often fallen short in terms of detection accuracy, detection rate, precision, and F-score. To tackle these issues, the paper presents a novel hybrid feature selection approach combining the Bat metaheuristic algorithm with the Residue Number System (RNS). Initially, the Bat algorithm is utilized to partition training data and eliminate irrelevant attributes. Recognizing the Bat algorithm's slower training and testing times, RNS is incorporated to enhance processing speed. Additionally, principal component analysis (PCA) is employed for feature extraction. In a second phase, RNS is excluded for feature selection, allowing the Bat algorithm to perform this task while PCA handles feature extraction. Subsequently, classification is conducted using naive bayes, and k-Nearest Neighbors. Experimental results demonstrate the remarkable effectiveness of combining RNS with the Bat algorithm, achieving outstanding detection rates, accuracy, and F-scores. Notably, the fusion approach doubles processing speed. The findings are further validated through benchmarking against existing intrusion detection methods, establishing their competitiveness.
{"title":"Feature selection in intrusion detection systems: a new hybrid fusion of Bat algorithm and Residue Number System","authors":"Yakub Kayode Saheed, Temitope Olubanjo Kehinde, Mustafa Ayobami Raji, Usman Ahmad Baba","doi":"10.1080/24751839.2023.2272484","DOIUrl":"https://doi.org/10.1080/24751839.2023.2272484","url":null,"abstract":"This research introduces innovative approaches to enhance intrusion detection systems (IDSs) by addressing critical challenges in existing methods. Various machine-learning techniques, including nature-inspired metaheuristics, Bayesian algorithms, and swarm intelligence, have been proposed in the past for attribute selection and IDS performance improvement. However, these methods have often fallen short in terms of detection accuracy, detection rate, precision, and F-score. To tackle these issues, the paper presents a novel hybrid feature selection approach combining the Bat metaheuristic algorithm with the Residue Number System (RNS). Initially, the Bat algorithm is utilized to partition training data and eliminate irrelevant attributes. Recognizing the Bat algorithm's slower training and testing times, RNS is incorporated to enhance processing speed. Additionally, principal component analysis (PCA) is employed for feature extraction. In a second phase, RNS is excluded for feature selection, allowing the Bat algorithm to perform this task while PCA handles feature extraction. Subsequently, classification is conducted using naive bayes, and k-Nearest Neighbors. Experimental results demonstrate the remarkable effectiveness of combining RNS with the Bat algorithm, achieving outstanding detection rates, accuracy, and F-scores. Notably, the fusion approach doubles processing speed. The findings are further validated through benchmarking against existing intrusion detection methods, establishing their competitiveness.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"15 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135589918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-30DOI: 10.1080/24751839.2023.2270824
Vaishali Ganganwar, Ratnavel Rajalakshmi
{"title":"Employing synthetic data for addressing the class imbalance in aspect-based sentiment classification","authors":"Vaishali Ganganwar, Ratnavel Rajalakshmi","doi":"10.1080/24751839.2023.2270824","DOIUrl":"https://doi.org/10.1080/24751839.2023.2270824","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136103474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-26DOI: 10.1080/24751839.2023.2272488
Abdulrahaman Kh. Alhafid, Sedki Younis, Y. E. Mohammed Ali
{"title":"Efficient near-field localization aided with reconfigurable intelligent surface using geometric dilution of precision","authors":"Abdulrahaman Kh. Alhafid, Sedki Younis, Y. E. Mohammed Ali","doi":"10.1080/24751839.2023.2272488","DOIUrl":"https://doi.org/10.1080/24751839.2023.2272488","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"160 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134908796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}