Pub Date : 2022-01-01DOI: 10.1504/IJAACS.2022.10038941
Rajendra Kumar Dwivedi, Rakesh Kumar, R. Buyya
: There are various applications of sensor networks in hard-to-reach territories. Sensor has limited energy. Therefore, several energy efficient methodologies have been devised to minimise the energy consumption. The manuscript discovers and resolves limitations of the existing multiple agent schemes which include energy consumption, fault handling, itinerary planning and positioning of sink. Existing protocols placed sink at centre of sensing area. This job is very difficult in hard-to-reach territories. So, a multi agent based energy and fault aware scheme for hard-to-reach territories (MAHT) has been devised. It provides a method of accumulated impact factor (AIF) for identifying the central node with high energy. Its novel agent migration scheme improves the energy efficiency. Planning the itinerary dynamically results in fault tolerance. Proposed protocol is simulated with Castalia simulator and its performance is evaluated on various metrics demonstrating that MAHT outperforms the existing schemes.
{"title":"A multi agent based energy and fault aware scheme for WSN of hard-to-reach territories","authors":"Rajendra Kumar Dwivedi, Rakesh Kumar, R. Buyya","doi":"10.1504/IJAACS.2022.10038941","DOIUrl":"https://doi.org/10.1504/IJAACS.2022.10038941","url":null,"abstract":": There are various applications of sensor networks in hard-to-reach territories. Sensor has limited energy. Therefore, several energy efficient methodologies have been devised to minimise the energy consumption. The manuscript discovers and resolves limitations of the existing multiple agent schemes which include energy consumption, fault handling, itinerary planning and positioning of sink. Existing protocols placed sink at centre of sensing area. This job is very difficult in hard-to-reach territories. So, a multi agent based energy and fault aware scheme for hard-to-reach territories (MAHT) has been devised. It provides a method of accumulated impact factor (AIF) for identifying the central node with high energy. Its novel agent migration scheme improves the energy efficiency. Planning the itinerary dynamically results in fault tolerance. Proposed protocol is simulated with Castalia simulator and its performance is evaluated on various metrics demonstrating that MAHT outperforms the existing schemes.","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":null,"pages":null},"PeriodicalIF":0.4,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90979587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijaacs.2022.10031363
Gang-Zhu Qiao
{"title":"Hotspot prediction of e-commerce network users based on improved K-nearest neighbour algorithm","authors":"Gang-Zhu Qiao","doi":"10.1504/ijaacs.2022.10031363","DOIUrl":"https://doi.org/10.1504/ijaacs.2022.10031363","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":null,"pages":null},"PeriodicalIF":0.4,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79554546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-19DOI: 10.1504/ijaacs.2021.117804
Yang Wanggong, Chen Mingzhi
In order to solve the problem that the traditional scheduling algorithm of sensor network node is constrained by the energy of the node itself, this paper proposes a new scheduling algorithm of sensor network node based on artificial neural network (ANN). Aiming at the sensor network of ANN, a multi-objective task scheduling model is established. The optimal solution of task scheduling is obtained by particle swarm optimisation algorithm. The energy balance degree is set as the final decision-making index, and the energy consumption of the optimal solution centralised node is chosen as the final task scheduling strategy to complete the scheduling of sensor network nodes. The experimental results show that the proposed algorithm has higher coverage and lower energy consumption in the scheduling process, which has certain advantages.
{"title":"Scheduling algorithm of sensor network node based on artificial neural network","authors":"Yang Wanggong, Chen Mingzhi","doi":"10.1504/ijaacs.2021.117804","DOIUrl":"https://doi.org/10.1504/ijaacs.2021.117804","url":null,"abstract":"In order to solve the problem that the traditional scheduling algorithm of sensor network node is constrained by the energy of the node itself, this paper proposes a new scheduling algorithm of sensor network node based on artificial neural network (ANN). Aiming at the sensor network of ANN, a multi-objective task scheduling model is established. The optimal solution of task scheduling is obtained by particle swarm optimisation algorithm. The energy balance degree is set as the final decision-making index, and the energy consumption of the optimal solution centralised node is chosen as the final task scheduling strategy to complete the scheduling of sensor network nodes. The experimental results show that the proposed algorithm has higher coverage and lower energy consumption in the scheduling process, which has certain advantages.","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":null,"pages":null},"PeriodicalIF":0.4,"publicationDate":"2021-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87838181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-07DOI: 10.1504/IJAACS.2021.114290
Xiaozhi Zhang
With the development of mobile terminals, users often send important private information such as bank accounts and passwords through mobile terminals. However, the public mobile communication system has not yet provided the end-to-end encrypted transmission service of user data, which cannot guarantee the security of user data transmission. Therefore, this paper adopts the end-to-end encryption technology to study the communication security technology in mobile terminals. Firstly, this paper uses smart card for encryption and decryption operation and secure storage of key. Secondly, a multi-level key management mechanism is adopted to update the key regularly. Finally, the bidirectional authentication between the terminal and the key management centre, and the authentication between the application program and the user are realised. Simulation results show that the scheme can guarantee the confidentiality and integrity of messages during transmission and terminal storage, can resist the attack of mobile terminal malware, and realise the security of user communication.
{"title":"End-to-end encrypted communication security technology for mobile terminals","authors":"Xiaozhi Zhang","doi":"10.1504/IJAACS.2021.114290","DOIUrl":"https://doi.org/10.1504/IJAACS.2021.114290","url":null,"abstract":"With the development of mobile terminals, users often send important private information such as bank accounts and passwords through mobile terminals. However, the public mobile communication system has not yet provided the end-to-end encrypted transmission service of user data, which cannot guarantee the security of user data transmission. Therefore, this paper adopts the end-to-end encryption technology to study the communication security technology in mobile terminals. Firstly, this paper uses smart card for encryption and decryption operation and secure storage of key. Secondly, a multi-level key management mechanism is adopted to update the key regularly. Finally, the bidirectional authentication between the terminal and the key management centre, and the authentication between the application program and the user are realised. Simulation results show that the scheme can guarantee the confidentiality and integrity of messages during transmission and terminal storage, can resist the attack of mobile terminal malware, and realise the security of user communication.","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":null,"pages":null},"PeriodicalIF":0.4,"publicationDate":"2021-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85635966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijaacs.2021.114278
Xiaoshu Ma, Qing Liu
{"title":"Security model and design of network communication system based on data encryption algorithm","authors":"Xiaoshu Ma, Qing Liu","doi":"10.1504/ijaacs.2021.114278","DOIUrl":"https://doi.org/10.1504/ijaacs.2021.114278","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":null,"pages":null},"PeriodicalIF":0.4,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72645034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijaacs.2021.10034569
Yanjun Sun, Haiyan Zhao, Juanjuan Liu
{"title":"Research on error compensation method of encoder signal based on cloud computing","authors":"Yanjun Sun, Haiyan Zhao, Juanjuan Liu","doi":"10.1504/ijaacs.2021.10034569","DOIUrl":"https://doi.org/10.1504/ijaacs.2021.10034569","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":null,"pages":null},"PeriodicalIF":0.4,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86483085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/IJAACS.2021.10032394
Min Shi
{"title":"SIP Network Secure Communication Model Based on Improved SIP Protocol","authors":"Min Shi","doi":"10.1504/IJAACS.2021.10032394","DOIUrl":"https://doi.org/10.1504/IJAACS.2021.10032394","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":null,"pages":null},"PeriodicalIF":0.4,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66763753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijaacs.2021.10030239
Wang Jie, L. Yuzhen, Z. Xueyuan, Yan Diqun, Dong Li, Wang Rangding
{"title":"Towards Breaking DNN-based Audio Steganalysis with GAN","authors":"Wang Jie, L. Yuzhen, Z. Xueyuan, Yan Diqun, Dong Li, Wang Rangding","doi":"10.1504/ijaacs.2021.10030239","DOIUrl":"https://doi.org/10.1504/ijaacs.2021.10030239","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":null,"pages":null},"PeriodicalIF":0.4,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66764181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijaacs.2021.10033793
Qing Liu, Xiaoshu Ma
{"title":"Security Model and Design of Network Communication System Based on Data Encryption Algorithm","authors":"Qing Liu, Xiaoshu Ma","doi":"10.1504/ijaacs.2021.10033793","DOIUrl":"https://doi.org/10.1504/ijaacs.2021.10033793","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":null,"pages":null},"PeriodicalIF":0.4,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66764623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}