Pub Date : 2023-03-31DOI: 10.26636/jtit.2023.164322
M. Strelbitskyi, Valentyn Mazur, Evgenii Prokopenko, R. Rachok, Dmytro Mul
{"title":"Concept of Joint Functioning of Access Control Systems","authors":"M. Strelbitskyi, Valentyn Mazur, Evgenii Prokopenko, R. Rachok, Dmytro Mul","doi":"10.26636/jtit.2023.164322","DOIUrl":"https://doi.org/10.26636/jtit.2023.164322","url":null,"abstract":"","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47155661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-31DOI: 10.26636/jtit.2023.168122
Surajuddin Mohamed, H. Abdullah
{"title":"CG-SCMA Codebook Design Based on Maximized Euclidian Distance","authors":"Surajuddin Mohamed, H. Abdullah","doi":"10.26636/jtit.2023.168122","DOIUrl":"https://doi.org/10.26636/jtit.2023.168122","url":null,"abstract":"","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48773984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-31DOI: 10.26636/jtit.2023.166922
Rajkumar Patil, G. Himabindu
{"title":"Improved Association Rule Mining-Based Data Sanitization for Privacy Preservation Model in Cloud","authors":"Rajkumar Patil, G. Himabindu","doi":"10.26636/jtit.2023.166922","DOIUrl":"https://doi.org/10.26636/jtit.2023.166922","url":null,"abstract":"","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43659081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-31DOI: 10.26636/jtit.2023.168222
Qunoot A. Yaqoub, A. Al-Ani
{"title":"An Adaptive Richardson-Lucy Algorithm for Medical Image Restoration","authors":"Qunoot A. Yaqoub, A. Al-Ani","doi":"10.26636/jtit.2023.168222","DOIUrl":"https://doi.org/10.26636/jtit.2023.168222","url":null,"abstract":"","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47590682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-31DOI: 10.26636/jtit.2023.166222
K. Borzycki, M. Jaworski, T. Kossek
{"title":"Remedies to Thermal Radiation in Fused Silica Optical Fibers","authors":"K. Borzycki, M. Jaworski, T. Kossek","doi":"10.26636/jtit.2023.166222","DOIUrl":"https://doi.org/10.26636/jtit.2023.166222","url":null,"abstract":"","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42786715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-31DOI: 10.26636/jtit.2023.167222
Sridhar Varadala, S. E. Emalda Roslin
{"title":"Single Linkage Weighted Steepest Gradient Adaboost Cluster-Based D2D in 5G Networks","authors":"Sridhar Varadala, S. E. Emalda Roslin","doi":"10.26636/jtit.2023.167222","DOIUrl":"https://doi.org/10.26636/jtit.2023.167222","url":null,"abstract":"","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42172918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-29DOI: 10.26636/jtit.2022.165122
T. Yerriswamy, M. Gururaj
The ever-increasing use of the Internet has created massive amounts network traffic, causing problems related to its scalability, controllability, and manageability. Sophisticated network-based denial of service (DoS) and distributed denial of service (DDoS) attacks increasingly pose a future threat. The literature proposes various methods that may help stop all HTTP DoS/DDoS assaults, but no optimal solution has been identified so far. Therefore, this paper attempts to fill the gap by proposing an alternative solution known as an efficient hybrid protocol framework for distributed DoS attack detection and mitigation (E-HPFDDM). Such an architecture addresses all aspects of these assaults by relaying on a three-layer mechanism. Layer 1 uses the outer advanced blocking (OAB) scheme which blocks unauthorized IP sources using an advanced backlisted table. Layer 2 is a validation layer that relies on the inner service trackback (IST) scheme to help determine whether the inbound request has been initiated by a legitimate or an illegitimate user. Layer 3 (inner layer) uses the deep entropy based (DEB) scheme to identify, classify and mitigate high-rate DDoS (HR-DDoS) and flash crowd (FC) attacks. The research shows that in contrast to earlier studies, the structure of the proposed system offers effective defense against DoS/DDoS assaults for web applications.
{"title":"An Efficient Hybrid Protocol Framework for DDoS Attack Detection and Mitigation Using Evolutionary Technique","authors":"T. Yerriswamy, M. Gururaj","doi":"10.26636/jtit.2022.165122","DOIUrl":"https://doi.org/10.26636/jtit.2022.165122","url":null,"abstract":" The ever-increasing use of the Internet has created massive amounts network traffic, causing problems related to its scalability, controllability, and manageability. Sophisticated network-based denial of service (DoS) and distributed denial of service (DDoS) attacks increasingly pose a future threat. The literature proposes various methods that may help stop all HTTP DoS/DDoS assaults, but no optimal solution has been identified so far. Therefore, this paper attempts to fill the gap by proposing an alternative solution known as an efficient hybrid protocol framework for distributed DoS attack detection and mitigation (E-HPFDDM). Such an architecture addresses all aspects of these assaults by relaying on a three-layer mechanism. Layer 1 uses the outer advanced blocking (OAB) scheme which blocks unauthorized IP sources using an advanced backlisted table. Layer 2 is a validation layer that relies on the inner service trackback (IST) scheme to help determine whether the inbound request has been initiated by a legitimate or an illegitimate user. Layer 3 (inner layer) uses the deep entropy based (DEB) scheme to identify, classify and mitigate high-rate DDoS (HR-DDoS) and flash crowd (FC) attacks. The research shows that in contrast to earlier studies, the structure of the proposed system offers effective defense against DoS/DDoS assaults for web applications.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45618682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-29DOI: 10.26636/jtit.2022.166022
T. Uhl
In the era of renewable energy, offshore wind farms play a very important role. The number of such installations in Europe is increasing rapidly. With the growing capacity of wind turbines installed in these farms (3, 5, 10 MW), the prof-itability of this type of energy systems plays an increasing role. The number of wind energy turbines installed at offshore wind farms is growing constantly as well. Once installed, the power plants must be under constant technical supervision, with reliability of electronic communication systems being a particu-larly important aspect in the operation of offshore wind farms. Considerations focusing on this subject form the very core of this paper. After an introduction to offshore wind farms, the following aspects will be discussed: redundant topologies, e.g. multiple HiPERRings, redundant switches and routers within the backbone networks, redundancy of the transmission media used, alternative transmission technologies, e.g. WLANs (IEEE 802.11h, IEEE 802.11g). Finally, requirements applicable to reliable electronic communication systems used in offshore wind farms will be formulated.
{"title":"Reliability of Communication Systems Used in Offshore Wind Farms","authors":"T. Uhl","doi":"10.26636/jtit.2022.166022","DOIUrl":"https://doi.org/10.26636/jtit.2022.166022","url":null,"abstract":" In the era of renewable energy, offshore wind farms play a very important role. The number of such installations in Europe is increasing rapidly. With the growing capacity of wind turbines installed in these farms (3, 5, 10 MW), the prof-itability of this type of energy systems plays an increasing role. The number of wind energy turbines installed at offshore wind farms is growing constantly as well. Once installed, the power plants must be under constant technical supervision, with reliability of electronic communication systems being a particu-larly important aspect in the operation of offshore wind farms. Considerations focusing on this subject form the very core of this paper. After an introduction to offshore wind farms, the following aspects will be discussed: redundant topologies, e.g. multiple HiPERRings, redundant switches and routers within the backbone networks, redundancy of the transmission media used, alternative transmission technologies, e.g. WLANs (IEEE 802.11h, IEEE 802.11g). Finally, requirements applicable to reliable electronic communication systems used in offshore wind farms will be formulated.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46036863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-29DOI: 10.26636/jtit.2022.164422
Surajuddin Mohamed, H. Abdullah
In 5G wireless communications, sparse code multiple access (SCMA) – a multi-dimensional codebook based on a specific category of the non-orthogonal multiple access (NO-MA) technique - enables many users to share non-orthogonal resource components with a low level of detection complexity. The multi-dimensional SCMA (MD-SCMA) codebook design presented in this study is based on the constellation rotation and interleaving method. Initially, a subset of the lattice Z 2 is used to form the mother constellation’s initial dimension. The first dimension is then rotated to produce other dimensions. Additionally, interleaving is employed for even dimensions to enhance fading channel performance. Arnold’s chaotic cat map is proposed as the interleaving method to reduce computational complexity. Performance of the SCMA codebook based on interleaving is evaluated by comparing it with selected codebooks for SCMA multiplexing. The metrics used for performance eval-uation purposes include bit error rate (BER), peak to average power ratio (PAPR), and minimum Euclidean distance (MED), as well as complexity. The results demonstrate that the suggested codebook with chaotic interleaving offers performance that is equivalent to that of the conventional codebook based on interleaving. It is characterized by lower MED and higher BER compared to computer-generated and 16-star QAM codebook design approaches, but its complexity is lower than that of the conventional codebook based on interleaving.
{"title":"Design Low Complexity SCMA Codebook Using Arnold’s Cat Map","authors":"Surajuddin Mohamed, H. Abdullah","doi":"10.26636/jtit.2022.164422","DOIUrl":"https://doi.org/10.26636/jtit.2022.164422","url":null,"abstract":" In 5G wireless communications, sparse code multiple access (SCMA) – a multi-dimensional codebook based on a specific category of the non-orthogonal multiple access (NO-MA) technique - enables many users to share non-orthogonal resource components with a low level of detection complexity. The multi-dimensional SCMA (MD-SCMA) codebook design presented in this study is based on the constellation rotation and interleaving method. Initially, a subset of the lattice Z 2 is used to form the mother constellation’s initial dimension. The first dimension is then rotated to produce other dimensions. Additionally, interleaving is employed for even dimensions to enhance fading channel performance. Arnold’s chaotic cat map is proposed as the interleaving method to reduce computational complexity. Performance of the SCMA codebook based on interleaving is evaluated by comparing it with selected codebooks for SCMA multiplexing. The metrics used for performance eval-uation purposes include bit error rate (BER), peak to average power ratio (PAPR), and minimum Euclidean distance (MED), as well as complexity. The results demonstrate that the suggested codebook with chaotic interleaving offers performance that is equivalent to that of the conventional codebook based on interleaving. It is characterized by lower MED and higher BER compared to computer-generated and 16-star QAM codebook design approaches, but its complexity is lower than that of the conventional codebook based on interleaving.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41844310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-29DOI: 10.26636/jtit.2022.165422
Sura H. Hussien, Hamsa A. Abdullah
Orthogonal frequency division multiplexing with index modulation (OFDM-IM), stands out among conventional communication technologies, as it uses the indices of the avail-able transmit entities. Thanks to such an approach, it offers a novel method for the transmission of extra data bits. Recent years have seen a great interest in chaos-based communications. The spectrum-spreading signals used in chaotic signal modulation technologies are orthogonal to the existing mixed signals. This paper presents how well a non-coherent differential chaos shift keying communication system performs across an AWGN. Different types of detection methods are simulated, bit error rate and power spectral density are calculated and then compared with standard OFDM with index modulation. The results of simulations concerning the performance of a DCSK system, adding to the security of the proposed solution and offering a compara-ble bit error rate performance, are presented in the paper as well.
{"title":"Chaotic-based Orthogonal Frequency Division Multiplexing with Index Modulation","authors":"Sura H. Hussien, Hamsa A. Abdullah","doi":"10.26636/jtit.2022.165422","DOIUrl":"https://doi.org/10.26636/jtit.2022.165422","url":null,"abstract":" Orthogonal frequency division multiplexing with index modulation (OFDM-IM), stands out among conventional communication technologies, as it uses the indices of the avail-able transmit entities. Thanks to such an approach, it offers a novel method for the transmission of extra data bits. Recent years have seen a great interest in chaos-based communications. The spectrum-spreading signals used in chaotic signal modulation technologies are orthogonal to the existing mixed signals. This paper presents how well a non-coherent differential chaos shift keying communication system performs across an AWGN. Different types of detection methods are simulated, bit error rate and power spectral density are calculated and then compared with standard OFDM with index modulation. The results of simulations concerning the performance of a DCSK system, adding to the security of the proposed solution and offering a compara-ble bit error rate performance, are presented in the paper as well.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49281943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}