Pub Date : 2024-01-30DOI: 10.1080/24751839.2024.2306786
Sami Hadhri, Mondher Hadiji, Walid Labidi
{"title":"A voting ensemble classifier for stress detection","authors":"Sami Hadhri, Mondher Hadiji, Walid Labidi","doi":"10.1080/24751839.2024.2306786","DOIUrl":"https://doi.org/10.1080/24751839.2024.2306786","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140485358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-23DOI: 10.1080/24751839.2024.2306787
T. V. Le, Huan Thien Tran, Samia Bouzefrane
{"title":"iTEVAC: an enhanced trusted evacuation system leveraging fog computing and IoT","authors":"T. V. Le, Huan Thien Tran, Samia Bouzefrane","doi":"10.1080/24751839.2024.2306787","DOIUrl":"https://doi.org/10.1080/24751839.2024.2306787","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139603107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-21DOI: 10.1080/24751839.2024.2303880
Tian-Bo Deng
{"title":"Stability-guaranteed odd-order variable-bandwidth filters using stabilized odd-order transfer function","authors":"Tian-Bo Deng","doi":"10.1080/24751839.2024.2303880","DOIUrl":"https://doi.org/10.1080/24751839.2024.2303880","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139523655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-03DOI: 10.1080/24751839.2023.2300223
Tahmid Hasan Pranto, Mohammad Nabiluzzaman Neloy, Abdulla All Noman, Sheikh Wasif, Md. Abdul Wahab, R. Rahman
{"title":"Utilizing deep learning in chipless RFID tag detection: an investigation on high-precision mm-wave spatial tag estimation from 2D virtual imaging","authors":"Tahmid Hasan Pranto, Mohammad Nabiluzzaman Neloy, Abdulla All Noman, Sheikh Wasif, Md. Abdul Wahab, R. Rahman","doi":"10.1080/24751839.2023.2300223","DOIUrl":"https://doi.org/10.1080/24751839.2023.2300223","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139451070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-20DOI: 10.1080/24751839.2023.2294570
Pham Thi Dan Ngoc, Tran Trung Duy, Nguyen Luong Nhat, Tan Hanh, Yeon Ho Chung, L. Tu
{"title":"On the performance of outage probability in cognitive NOMA random networks with hardware impairments","authors":"Pham Thi Dan Ngoc, Tran Trung Duy, Nguyen Luong Nhat, Tan Hanh, Yeon Ho Chung, L. Tu","doi":"10.1080/24751839.2023.2294570","DOIUrl":"https://doi.org/10.1080/24751839.2023.2294570","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139170357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-19DOI: 10.1080/24751839.2023.2295094
H. Mehdi, Zakir Hussain, S. M. A. Saleem, Syed Areeb Ahmed
{"title":"Relay-assisted communication over a fluctuating two-ray fading channel","authors":"H. Mehdi, Zakir Hussain, S. M. A. Saleem, Syed Areeb Ahmed","doi":"10.1080/24751839.2023.2295094","DOIUrl":"https://doi.org/10.1080/24751839.2023.2295094","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138962758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-26DOI: 10.1080/24751839.2023.2285549
Dhairya Veera, Ramchandra S. Mangrulkar, Chetashri Bhadane, Kiran Bhowmick, P. Chavan
{"title":"Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption","authors":"Dhairya Veera, Ramchandra S. Mangrulkar, Chetashri Bhadane, Kiran Bhowmick, P. Chavan","doi":"10.1080/24751839.2023.2285549","DOIUrl":"https://doi.org/10.1080/24751839.2023.2285549","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139235458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-26DOI: 10.1080/24751839.2023.2286764
B. Gładysz, D. Despotis, D. Kuchta
{"title":"Application of data envelopment analysis to IT project evaluation, with special emphasis on the choice of inputs and outputs in the context of the organization in question","authors":"B. Gładysz, D. Despotis, D. Kuchta","doi":"10.1080/24751839.2023.2286764","DOIUrl":"https://doi.org/10.1080/24751839.2023.2286764","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139235705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-19DOI: 10.1080/24751839.2023.2281144
Thi-Tuyet-Hai Nguyen, Tan N. Nguyen, Tran Trung Duy, Nguyen Hong Son, Tan Hanh, Minh Bui Vu, L. Tu
{"title":"Coverage probability of energy harvesting enabled LoRa networks with stochastic geometry","authors":"Thi-Tuyet-Hai Nguyen, Tan N. Nguyen, Tran Trung Duy, Nguyen Hong Son, Tan Hanh, Minh Bui Vu, L. Tu","doi":"10.1080/24751839.2023.2281144","DOIUrl":"https://doi.org/10.1080/24751839.2023.2281144","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2023-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139260425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elliptic Curve Cryptography (ECC) is a promising cryptosystem as it presents the ideal choice for implementing public-key cryptography in resource-limited devices, such as those found in envisioned Internet of Things applications, e.g. wireless sensors. Elliptic Curve ElGamal (ECEG) is a renowned member of the ECC family. However, it requires encoding the message before encryption and decoding it after decryption. To better improve the processing time and to avoid sharing a lookup table, we propose, in this document, a new method that exchanges encoding parameters and authenticates endpoints at the same time. So, our new protocol ensures the authentication of communication parties and integrity of ephemeral encoding parameters. The robustness of our solution is proven by the Scyther tool. Experimental tests have been carried out, and the performance of the new methods is provided and compared with RSA and related work. Security and performance analysis show that our new scheme has achieved improved functionality and higher security while maintaining low computational.
{"title":"Lightweight authentication scheme based on Elliptic Curve El Gamal","authors":"Sondes Baccouri, Hassene Farhat, Tarek Azzabi, Rabah Attia","doi":"10.1080/24751839.2023.2281143","DOIUrl":"https://doi.org/10.1080/24751839.2023.2281143","url":null,"abstract":"Elliptic Curve Cryptography (ECC) is a promising cryptosystem as it presents the ideal choice for implementing public-key cryptography in resource-limited devices, such as those found in envisioned Internet of Things applications, e.g. wireless sensors. Elliptic Curve ElGamal (ECEG) is a renowned member of the ECC family. However, it requires encoding the message before encryption and decoding it after decryption. To better improve the processing time and to avoid sharing a lookup table, we propose, in this document, a new method that exchanges encoding parameters and authenticates endpoints at the same time. So, our new protocol ensures the authentication of communication parties and integrity of ephemeral encoding parameters. The robustness of our solution is proven by the Scyther tool. Experimental tests have been carried out, and the performance of the new methods is provided and compared with RSA and related work. Security and performance analysis show that our new scheme has achieved improved functionality and higher security while maintaining low computational.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134991859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}