首页 > 最新文献

Journal of Communications Software and Systems最新文献

英文 中文
Monopoly-Market-based Cooperation in Cognitive Radio Networks 认知无线电网络中基于垄断市场的合作
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-11-03 DOI: 10.24138/jcomss.v16i4.994
Said Lakhal, Z. Guennoun
In a cognitive radio network (CRN), the primary users (PUs) do not operate their spectra, full time. Thus, they can sell them to the secondary users (SUs), for a second use, during the free time slots. In this article, we assume that the market is perfect, monopolized by a single PU, and all players are rational. After formulating the PU’s profit, we established a necessary and sufficient condition that guarantees the introduction of the PU into the market. In addition, the expressions of the SUs’ profits, showed us that in non-cooperative form, some ones got zero profit, even after maximizing their profits. Therefore, we have considered to study the effect of cooperation on the profits of this category of SUs. By following this step, we established a cooperation strategy, to avoid zero profits for all SUs. In order to analyze the impact of this cooperation on the PU, we have expressed the profits of the PU in the cooperative and non-cooperative forms; as result, we found that the cooperation between SUs brought better than the non-cooperative form.
在认知无线电网络(CRN)中,主用户(pu)不完全操作其频谱。因此,他们可以在空闲时段将它们出售给辅助用户(su),供其第二次使用。在本文中,我们假设市场是完美的,由单个PU垄断,所有参与者都是理性的。在确定了PU的利润后,我们建立了保证PU进入市场的充分必要条件。另外,从单个单位的利润表达式中可以看出,在非合作形式下,即使利润最大化,也有个别单位的利润为零。因此,我们考虑研究合作对这类SUs利润的影响。通过这一步骤,我们建立了合作策略,以避免所有SUs的零利润。为了分析这种合作对PU的影响,我们将PU的利润分为合作和非合作两种形式;结果表明,单位间的合作比非合作形式带来的效益更好。
{"title":"Monopoly-Market-based Cooperation in Cognitive Radio Networks","authors":"Said Lakhal, Z. Guennoun","doi":"10.24138/jcomss.v16i4.994","DOIUrl":"https://doi.org/10.24138/jcomss.v16i4.994","url":null,"abstract":"In a cognitive radio network (CRN), the primary users (PUs) do not operate their spectra, full time. Thus, they can sell them to the secondary users (SUs), for a second use, during the free time slots. In this article, we assume that the market is perfect, monopolized by a single PU, and all players are rational. After formulating the PU’s profit, we established a necessary and sufficient condition that guarantees the introduction of the PU into the market. In addition, the expressions of the SUs’ profits, showed us that in non-cooperative form, some ones got zero profit, even after maximizing their profits. Therefore, we have considered to study the effect of cooperation on the profits of this category of SUs. By following this step, we established a cooperation strategy, to avoid zero profits for all SUs. In order to analyze the impact of this cooperation on the PU, we have expressed the profits of the PU in the cooperative and non-cooperative forms; as result, we found that the cooperation between SUs brought better than the non-cooperative form.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41986819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Crowdsourcing Based Framework for Sentiment Analysis 基于众包的情感分析框架
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-10-23 DOI: 10.24138/jcomss.v16i4.935
F. Z. Ennaji, A. E. Fazziki, H. E. A. E. Abdallaoui, H. E. Kabtane
As social networking has spread, people started sharing their personal opinions and thoughts widely via these online platforms. The resulting vast valuable data represent a rich source for companies to deduct their products’ reputation from both social media and crowds’ judgments. To exploit this wealth of data, a framework was proposed to collect opinions and rating scores respectively from social media and crowdsourcing platform to perform sentiment analysis, provide insights about a product and give consumers’ tendencies. During the analysis process, a consumer category (strict) is excluded from the process of reaching a majority consensus. To overcome this, a fuzzy clustering is used to compute consumers’ credibility. The key novelty of our approach is the new layer of validity check using a crowdsourcing component that ensures that the results obtained from social media are supported by opinions extracted directly from real-life consumers. Finally, experiments are carried out to validate this model (Twitter and Facebook were used as data sources). The obtained results show that this approach is more efficient and accurate than existing solutions thanks to our two-layer validity check design.
随着社交网络的普及,人们开始通过这些在线平台广泛分享他们的个人观点和想法。由此产生的大量有价值的数据为公司从社交媒体和人群的判断中推断其产品的声誉提供了丰富的来源。为了利用这些丰富的数据,提出了一个框架,分别从社交媒体和众包平台收集意见和评分,以进行情绪分析,提供有关产品的见解,并给出消费者的倾向。在分析过程中,消费者类别(严格)被排除在达成多数共识的过程之外。为了克服这一点,使用模糊聚类来计算消费者的可信度。我们方法的关键新颖性是使用众包组件进行新的有效性检查,确保从社交媒体获得的结果得到直接从现实生活中消费者那里提取的意见的支持。最后,对该模型进行了实验验证(使用Twitter和Facebook作为数据源)。结果表明,由于我们的两层有效性检查设计,该方法比现有的解决方案更有效、更准确。
{"title":"A Crowdsourcing Based Framework for Sentiment Analysis","authors":"F. Z. Ennaji, A. E. Fazziki, H. E. A. E. Abdallaoui, H. E. Kabtane","doi":"10.24138/jcomss.v16i4.935","DOIUrl":"https://doi.org/10.24138/jcomss.v16i4.935","url":null,"abstract":"As social networking has spread, people started sharing their personal opinions and thoughts widely via these online platforms. The resulting vast valuable data represent a rich source for companies to deduct their products’ reputation from both social media and crowds’ judgments. To exploit this wealth of data, a framework was proposed to collect opinions and rating scores respectively from social media and crowdsourcing platform to perform sentiment analysis, provide insights about a product and give consumers’ tendencies. During the analysis process, a consumer category (strict) is excluded from the process of reaching a majority consensus. To overcome this, a fuzzy clustering is used to compute consumers’ credibility. The key novelty of our approach is the new layer of validity check using a crowdsourcing component that ensures that the results obtained from social media are supported by opinions extracted directly from real-life consumers. Finally, experiments are carried out to validate this model (Twitter and Facebook were used as data sources). The obtained results show that this approach is more efficient and accurate than existing solutions thanks to our two-layer validity check design.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"16 1","pages":"285-295"},"PeriodicalIF":0.7,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46174222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Doppler Frequency Estimation for a Maneuvering Target Being Tracked by Passive Radar Using Particle Filter 被动雷达跟踪机动目标的粒子滤波多普勒频率估计
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-10-08 DOI: 10.24138/jcomss.v16i4.1097
Anas Mahmoud Almanofi, A. Malki, Ali Kazem
In this paper, we estimate Doppler frequency of a maneuvering target being tracked by passive radar using two types of particle filter, the first is “Maximum Likelihood Particle Filter” (MLPF) and the second is “Minimum Variance Particle filter” (MVPF). By simulating the passive radar system that has the bistatic geometry “Digital Video Broadcasting-Terrestrial (DVB-T) transmitter / receiver” with these two types, we can estimate the Doppler frequency of the maneuvering target and compare the simulation results for deciding which type gives better performance.
本文采用最大似然粒子滤波器(Maximum Likelihood particle filter, MLPF)和最小方差粒子滤波器(Minimum Variance particle filter, MVPF)两种粒子滤波器估计被动雷达跟踪机动目标的多普勒频率。通过对具有双基地几何形状的“数字视频广播-地面(DVB-T)发射机/接收机”的无源雷达系统与这两种类型进行仿真,我们可以估计机动目标的多普勒频率,并对仿真结果进行比较,以确定哪种类型的性能更好。
{"title":"Doppler Frequency Estimation for a Maneuvering Target Being Tracked by Passive Radar Using Particle Filter","authors":"Anas Mahmoud Almanofi, A. Malki, Ali Kazem","doi":"10.24138/jcomss.v16i4.1097","DOIUrl":"https://doi.org/10.24138/jcomss.v16i4.1097","url":null,"abstract":"In this paper, we estimate Doppler frequency of a maneuvering target being tracked by passive radar using two types of particle filter, the first is “Maximum Likelihood Particle Filter” (MLPF) and the second is “Minimum Variance Particle filter” (MVPF). By simulating the passive radar system that has the bistatic geometry “Digital Video Broadcasting-Terrestrial (DVB-T) transmitter / receiver” with these two types, we can estimate the Doppler frequency of the maneuvering target and compare the simulation results for deciding which type gives better performance.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"16 1","pages":"279-284"},"PeriodicalIF":0.7,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48395548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Viability of Numerical Full-Wave Techniques in Telecommunication Channel Modelling 数字全波技术在电信信道建模中的可行性
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-10-08 DOI: 10.24138/jcomss.v16i4.1041
Roman Novak
In telecommunication channel modelling the wavelength is small compared to the physical features of interest, therefore deterministic ray tracing techniques provide solutions that are more efficient, faster and still within time constraints than current numerical full-wave techniques. Solving fundamental Maxwell's equations is at the core of computational electrodynamics and best suited for modelling electrical field interactions with physical objects where characteristic dimensions of a computing domain is on the order of a few wavelengths in size. However, extreme communication speeds, wireless access points closer to the user and smaller pico and femto cells will require increased accuracy in predicting and planning wireless signals, testing the accuracy limits of the ray tracing methods. The increased computing capabilities and the demand for better characterization of communication channels that span smaller geographical areas make numerical full-wave techniques attractive alternative even for larger problems. The paper surveys ways of overcoming excessive time requirements of numerical full-wave techniques while providing acceptable channel modelling accuracy for the smallest radio cells and possibly wider. We identify several research paths that could lead to improved channel modelling, including numerical algorithm adaptations for large-scale problems, alternative finite-difference approaches, such as meshless methods, and dedicated parallel hardware, possibly as a realization of a dataflow machine.
在电信信道建模中,波长与感兴趣的物理特征相比很小,因此确定性光线追踪技术提供的解决方案比当前的数值全波技术更有效、更快,而且仍然在时间限制内。求解基本的麦克斯韦方程组是计算电动力学的核心,最适合于模拟与物理对象的电场相互作用,其中计算域的特征尺寸在几个波长的量级上。然而,极端的通信速度、更接近用户的无线接入点以及更小的pico和femto单元将需要更高的预测和规划无线信号的准确性,从而测试光线追踪方法的精度极限。计算能力的提高和对跨越较小地理区域的通信信道的更好表征的需求使得数字全波技术即使对于更大的问题也具有吸引力。本文探讨了克服数值全波技术对时间要求过高的方法,同时为最小的无线电单元和可能更宽的无线电单元提供可接受的信道建模精度。我们确定了几种可能导致改进通道建模的研究路径,包括适用于大规模问题的数值算法,替代有限差分方法,如无网格方法,以及专用并行硬件,可能作为数据流机器的实现。
{"title":"Viability of Numerical Full-Wave Techniques in Telecommunication Channel Modelling","authors":"Roman Novak","doi":"10.24138/jcomss.v16i4.1041","DOIUrl":"https://doi.org/10.24138/jcomss.v16i4.1041","url":null,"abstract":"In telecommunication channel modelling the wavelength is small compared to the physical features of interest, therefore deterministic ray tracing techniques provide solutions that are more efficient, faster and still within time constraints than current numerical full-wave techniques. Solving fundamental Maxwell's equations is at the core of computational electrodynamics and best suited for modelling electrical field interactions with physical objects where characteristic dimensions of a computing domain is on the order of a few wavelengths in size. However, extreme communication speeds, wireless access points closer to the user and smaller pico and femto cells will require increased accuracy in predicting and planning wireless signals, testing the accuracy limits of the ray tracing methods. The increased computing capabilities and the demand for better characterization of communication channels that span smaller geographical areas make numerical full-wave techniques attractive alternative even for larger problems. The paper surveys ways of overcoming excessive time requirements of numerical full-wave techniques while providing acceptable channel modelling accuracy for the smallest radio cells and possibly wider. We identify several research paths that could lead to improved channel modelling, including numerical algorithm adaptations for large-scale problems, alternative finite-difference approaches, such as meshless methods, and dedicated parallel hardware, possibly as a realization of a dataflow machine.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"16 1","pages":"269-278"},"PeriodicalIF":0.7,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42455579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Human Retina Based Identification System Using Gabor Filters and GDA Technique 基于Gabor滤波器和GDA技术的人视网膜识别系统
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-09-08 DOI: 10.24138/jcomss.v16i3.1031
Shahad A. Sultan, M. F. Ghanim
A biometric authentication system provides anautomatic person authentication based on some characteristicfeatures possessed by the individual. Among all other biometrics,human retina is a secure and reliable source of personrecognition as it is unique, universal, lies at the back of the eyeball and hence it is unforgeable. The process of authenticationmainly includes pre-processing, feature extraction and thenfeatures matching and classification. Also authentication systemsare mainly appointed in verification and identification modeaccording to the specific application. In this paper, preprocessing and image enhancement stages involve several steps tohighlight interesting features in retinal images. The featureextraction stage is accomplished using a bank of Gabor filter withnumber of orientations and scales. Generalized DiscriminantAnalysis (GDA) technique has been used to reduce the size offeature vectors and enhance the performance of proposedalgorithm. Finally, classification is accomplished using k-nearestneighbor (KNN) classifier to determine the identity of the genuineuser or reject the forged one as the proposed method operates inidentification mode. The main contribution in this paper is usingGeneralized Discriminant Analysis (GDA) technique to address‘curse of dimensionality’ problem. GDA is a novel method usedin the area of retina recognition.
生物特征认证系统基于个人所具有的一些特征来提供自动的个人认证。在所有其他生物识别技术中,人类视网膜是一种安全可靠的人识别来源,因为它是独特的、通用的,位于眼球后部,因此是不可伪造的。认证过程主要包括预处理、特征提取以及特征匹配和分类。认证系统也主要根据具体应用情况指定为验证和识别模式。在本文中,预处理和图像增强阶段涉及几个步骤,以突出视网膜图像中有趣的特征。特征提取阶段使用具有多个方向和尺度的Gabor滤波器组来完成。广义判别分析(GDA)技术已被用于减小特征向量的大小和提高算法的性能。最后,使用k-近邻(KNN)分类器来完成分类,以确定真实用户的身份或拒绝伪造用户,因为所提出的方法操作非识别模式。本文的主要贡献是使用广义判别分析(GDA)技术来解决“维度过程”问题。GDA是一种用于视网膜识别领域的新方法。
{"title":"Human Retina Based Identification System Using Gabor Filters and GDA Technique","authors":"Shahad A. Sultan, M. F. Ghanim","doi":"10.24138/jcomss.v16i3.1031","DOIUrl":"https://doi.org/10.24138/jcomss.v16i3.1031","url":null,"abstract":"A biometric authentication system provides an\u0000automatic person authentication based on some characteristic\u0000features possessed by the individual. Among all other biometrics,\u0000human retina is a secure and reliable source of person\u0000recognition as it is unique, universal, lies at the back of the eyeball and hence it is unforgeable. The process of authentication\u0000mainly includes pre-processing, feature extraction and then\u0000features matching and classification. Also authentication systems\u0000are mainly appointed in verification and identification mode\u0000according to the specific application. In this paper, preprocessing and image enhancement stages involve several steps to\u0000highlight interesting features in retinal images. The feature\u0000extraction stage is accomplished using a bank of Gabor filter with\u0000number of orientations and scales. Generalized Discriminant\u0000Analysis (GDA) technique has been used to reduce the size of\u0000feature vectors and enhance the performance of proposed\u0000algorithm. Finally, classification is accomplished using k-nearest\u0000neighbor (KNN) classifier to determine the identity of the genuine\u0000user or reject the forged one as the proposed method operates in\u0000identification mode. The main contribution in this paper is using\u0000Generalized Discriminant Analysis (GDA) technique to address\u0000‘curse of dimensionality’ problem. GDA is a novel method used\u0000in the area of retina recognition.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2020-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48350226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Wearable Fall Detection System based on LoRa LPWAN Technology 基于LoRa LPWAN技术的可穿戴跌倒检测系统
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-07-28 DOI: 10.24138/jcomss.v16i3.1039
E. Zanaj, Deivis Disha, S. Spinsante, E. Gambi
The fall problem affects approximately one third of people aged over 65 years. Falls and fall-related injuries are one of the major causes of morbidity and mortality in the elderly population. Since many years, research activities have been targeted towards the development of technological solutions for the automatic detection and notification of falls. Among them, wearable based systems offer the advantage of being available ideally everywhere and cost-effective in terms of economy and computational burden. However, their use poses different challenges, from acceptability to battery usage. The choice of the communication technology, in particular, plays a fundamental role in the realization of a suitable solution, able to meet the target users’ needs. In this paper, we present a fall detection system, based on a pair of instrumented shoes. They communicate the alarming events to a supervising system through the LoRa LPWAN technology, without the need of a portable gateway. Experimental results demonstrate the effectiveness of the chosen communication technology and fall detection reliability.
跌倒问题影响到大约三分之一的65岁以上的人。跌倒和与跌倒有关的伤害是老年人发病率和死亡率的主要原因之一。多年来,研究活动一直致力于开发跌倒自动检测和通知的技术解决方案。其中,基于可穿戴的系统提供了一个优势,即在任何地方都可以理想地使用,并且在经济性和计算负担方面具有成本效益。然而,它们的使用带来了不同的挑战,从可接受性到电池的使用。尤其是通信技术的选择,在实现能够满足目标用户需求的合适解决方案方面起着至关重要的作用。在本文中,我们提出了一个跌倒检测系统,基于一双仪器鞋。它们通过LoRa LPWAN技术将报警事件传送到监控系统,而不需要便携式网关。实验结果证明了所选通信技术的有效性和跌倒检测的可靠性。
{"title":"A Wearable Fall Detection System based on LoRa LPWAN Technology","authors":"E. Zanaj, Deivis Disha, S. Spinsante, E. Gambi","doi":"10.24138/jcomss.v16i3.1039","DOIUrl":"https://doi.org/10.24138/jcomss.v16i3.1039","url":null,"abstract":"The fall problem affects approximately one third of people aged over 65 years. Falls and fall-related injuries are one of the major causes of morbidity and mortality in the elderly population. Since many years, research activities have been targeted towards the development of technological solutions for the automatic detection and notification of falls. Among them, wearable based systems offer the advantage of being available ideally everywhere and cost-effective in terms of economy and computational burden. However, their use poses different challenges, from acceptability to battery usage. The choice of the communication technology, in particular, plays a fundamental role in the realization of a suitable solution, able to meet the target users’ needs. In this paper, we present a fall detection system, based on a pair of instrumented shoes. They communicate the alarming events to a supervising system through the LoRa LPWAN technology, without the need of a portable gateway. Experimental results demonstrate the effectiveness of the chosen communication technology and fall detection reliability.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"16 1","pages":"232-242"},"PeriodicalIF":0.7,"publicationDate":"2020-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42877777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of ZigBee Topology Effect on Throughput and End to End Delay Due to Different Transmission Bands for IoT Applications 物联网应用中不同传输频带对ZigBee拓扑结构吞吐量和端到端延迟影响的评估
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-07-22 DOI: 10.24138/jcomss.v16i3.975
Y. R. Hamdy, A. I. Alghannam
ZigBee is widely used in wireless network inInternet of Things (IoT) applications to remotely sensing andautomation due to its unique characteristics compared to otherwireless networks. According to ZigBee classification of IEEE802.15.4 standard, the network consists of four layers. TheZigBee topology is represented in second layer. Furthermore, theZigBee topology consists of three topologies, star, tree and mesh.Also there are many transmission bands allowed in physicallayer, such as 2.4 GHz, 915 MHz, 868 MHz. The aim of this paperis to evaluate the effect of ZigBee topologies on End to End delayand throughput for different transmission bands. RiverbedModeler is used to simulate multiple ZigBee proposed scenariosand collect the results. The results of the study recommend whichtopology should be used at each transmission band to providelowest End to End delay or obtain maximum throughput, whichis case sensitive in some IoT applications that required forexample minimum delay time or sending high amount of data.
ZigBee由于其与其他无线网络相比的独特特性,被广泛应用于物联网(IoT)应用中的无线网络中,用于遥感和自动化。根据IEEE802.15.4标准的ZigBee分类,该网络由四层组成。ZigBee拓扑结构在第二层中表示。此外,ZigBee拓扑结构由三种拓扑结构组成,星形、树状和网状。此外,在物理层中允许许多传输频带,例如2.4GHz、915MHz、868MHz。本文的目的是评估ZigBee拓扑结构对不同传输频带的端到端延迟和吞吐量的影响。RiverbedModeler用于模拟ZigBee提出的多个场景并收集结果。研究结果建议在每个传输频带使用哪种拓扑结构来提供最低的端到端延迟或获得最大吞吐量,这在一些需要足够的最小延迟时间或发送大量数据的物联网应用中是区分大小写的。
{"title":"Evaluation of ZigBee Topology Effect on Throughput and End to End Delay Due to Different Transmission Bands for IoT Applications","authors":"Y. R. Hamdy, A. I. Alghannam","doi":"10.24138/jcomss.v16i3.975","DOIUrl":"https://doi.org/10.24138/jcomss.v16i3.975","url":null,"abstract":"ZigBee is widely used in wireless network in\u0000Internet of Things (IoT) applications to remotely sensing and\u0000automation due to its unique characteristics compared to other\u0000wireless networks. According to ZigBee classification of IEEE\u0000802.15.4 standard, the network consists of four layers. The\u0000ZigBee topology is represented in second layer. Furthermore, the\u0000ZigBee topology consists of three topologies, star, tree and mesh.\u0000Also there are many transmission bands allowed in physical\u0000layer, such as 2.4 GHz, 915 MHz, 868 MHz. The aim of this paper\u0000is to evaluate the effect of ZigBee topologies on End to End delay\u0000and throughput for different transmission bands. Riverbed\u0000Modeler is used to simulate multiple ZigBee proposed scenarios\u0000and collect the results. The results of the study recommend which\u0000topology should be used at each transmission band to provide\u0000lowest End to End delay or obtain maximum throughput, which\u0000is case sensitive in some IoT applications that required for\u0000example minimum delay time or sending high amount of data.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47127014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Enhancement in Cloud Environment using Secure Secret Key Sharing 使用安全密钥共享增强云环境中的安全性
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-07-20 DOI: 10.24138/jcomss.v16i3.964
S. Chhabra, Ashutosh Kumar Singh
Securing the data in distributed cloud system is considered one of the major concern for the cloud customers who faces security risks. The data leakage or data tampering are widely used by attackers to extract the private information of other users who shares the confidential data through virtualization. This paper presents Secure Secret Sharing (SSS) technique which is being recognized as one of the leading method to secure the sensitive data. It shares encrypted data over cloud and generated secret key is split into different parts distributed to qualified participants (Qn) only which is analyzed by malicious checkers. It verifies the clients based on their previous performances, whether these users proved to be authorized participant or not. The key computation is evaluated by the Key handler (KH) called trusted party which manages authorized control list, encryption/decryption and reconstruction of key shares. The Lagrange’s interpolation method is used to reconstruct the secret from shares. The experimental results shows that the proposed secure data sharing algorithm not only provides excellent security and performance, but also achieves better key management and data confidentiality than previous countermeasures. It improves the security by using secure VM placement and evaluated based on time consumption and probability computation to prove the efficacy of our algorithm. Experiments are performed on cloudsim based on following parameters i.e. time computation of key generation; response time and encryption/decryption. The experimental results demonstrate that this method can effectively reduce the risks and improves the security and time consumption upto 27.81% and 43.61% over existing algorithms.
分布式云系统中的数据安全被认为是云客户面临安全风险的主要问题之一。数据泄露或数据篡改被攻击者广泛利用,通过虚拟化手段获取共享机密数据的其他用户的隐私信息。本文提出了安全秘密共享(SSS)技术,它是目前公认的保护敏感数据安全的主要方法之一。它通过云共享加密数据,生成的密钥被分割成不同的部分,仅分发给合格的参与者(Qn),并由恶意检查器进行分析。它根据客户端以前的表现来验证客户端,无论这些用户是否被证明是授权的参与者。密钥计算由被称为可信方的密钥处理程序(KH)评估,它管理授权控制列表、密钥共享的加密/解密和重建。利用拉格朗日插值法从股份中重构秘密。实验结果表明,所提出的安全数据共享算法不仅具有良好的安全性和性能,而且在密钥管理和数据保密性方面也优于以往的对策。通过使用安全虚拟机放置来提高安全性,并根据时间消耗和概率计算进行评估,以证明算法的有效性。在cloudsim上基于以下参数进行实验,即密钥生成的时间计算;响应时间和加密/解密。实验结果表明,该方法可以有效降低风险,安全性和耗时比现有算法分别提高27.81%和43.61%。
{"title":"Security Enhancement in Cloud Environment using Secure Secret Key Sharing","authors":"S. Chhabra, Ashutosh Kumar Singh","doi":"10.24138/jcomss.v16i3.964","DOIUrl":"https://doi.org/10.24138/jcomss.v16i3.964","url":null,"abstract":"Securing the data in distributed cloud system is considered one of the major concern for the cloud customers who faces security risks. The data leakage or data tampering are widely used by attackers to extract the private information of other users who shares the confidential data through virtualization. This paper presents Secure Secret Sharing (SSS) technique which is being recognized as one of the leading method to secure the sensitive data. It shares encrypted data over cloud and generated secret key is split into different parts distributed to qualified participants (Qn) only which is analyzed by malicious checkers. It verifies the clients based on their previous performances, whether these users proved to be authorized participant or not. The key computation is evaluated by the Key handler (KH) called trusted party which manages authorized control list, encryption/decryption and reconstruction of key shares. The Lagrange’s interpolation method is used to reconstruct the secret from shares. The experimental results shows that the proposed secure data sharing algorithm not only provides excellent security and performance, but also achieves better key management and data confidentiality than previous countermeasures. It improves the security by using secure VM placement and evaluated based on time consumption and probability computation to prove the efficacy of our algorithm. Experiments are performed on cloudsim based on following parameters i.e. time computation of key generation; response time and encryption/decryption. The experimental results demonstrate that this method can effectively reduce the risks and improves the security and time consumption upto 27.81% and 43.61% over existing algorithms.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48085004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Chicken Swarm Optimization for PTS based PAPR Reduction in OFDM Systems 基于PTS降低OFDM系统PAPR的鸡群优化算法
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-07-17 DOI: 10.24138/jcomss.v16i3.999
Saruti Gupta, A. Goel
Partial transmit sequence (PTS) is a well-known PAPR reduction scheme for the OFDM system. One of the major challenge of this scheme is to find an optimal phase vector using exhaustive search over all the allowed phase factor combinations. This leads to increased search complexity which grows exponentially as the number of sub-blocks is increased. In this paper, chicken swarm optimization (CSO) based PTS system is designed that aims to find an optimal solution in less number of average iterations and therefore results in reduced computational complexity of the system. We have proposed two categories of the algorithm: (i) CSO-PTS system without threshold limit on PAPR (ii) CSO-PTS system with threshold limit on PAPR. Both the schemes offer effective trade-offs between the computational complexity and the PAPR reduction capability of the system. Simulation results confirm that our proposed schemes perform well in terms of low computational complexity, lesser number of average iterations and improved PAPR reduction capability of the OFDM signal without any loss in BER performance of the system.
部分发射序列(PTS)是用于OFDM系统的众所周知的PAPR降低方案。该方案的主要挑战之一是在所有允许的相位因子组合上使用穷举搜索来找到最优相位向量。这导致搜索复杂度增加,搜索复杂度随着子块数量的增加而呈指数级增长。在本文中,设计了基于鸡群优化(CSO)的PTS系统,旨在在较少的平均迭代次数中找到最优解,从而降低系统的计算复杂度。我们提出了两类算法:(i)对PAPR没有阈值限制的CSO-PTS系统。这两种方案都在系统的计算复杂性和PAPR降低能力之间提供了有效的折衷。仿真结果证实,我们提出的方案在低计算复杂度、较少的平均迭代次数和改进的OFDM信号PAPR降低能力方面表现良好,而不会对系统的BER性能造成任何损失。
{"title":"Chicken Swarm Optimization for PTS based PAPR Reduction in OFDM Systems","authors":"Saruti Gupta, A. Goel","doi":"10.24138/jcomss.v16i3.999","DOIUrl":"https://doi.org/10.24138/jcomss.v16i3.999","url":null,"abstract":"Partial transmit sequence (PTS) is a well-known PAPR reduction scheme for the OFDM system. One of the major challenge of this scheme is to find an optimal phase vector using exhaustive search over all the allowed phase factor combinations. This leads to increased search complexity which grows exponentially as the number of sub-blocks is increased. In this paper, chicken swarm optimization (CSO) based PTS system is designed that aims to find an optimal solution in less number of average iterations and therefore results in reduced computational complexity of the system. We have proposed two categories of the algorithm: (i) CSO-PTS system without threshold limit on PAPR (ii) CSO-PTS system with threshold limit on PAPR. Both the schemes offer effective trade-offs between the computational complexity and the PAPR reduction capability of the system. Simulation results confirm that our proposed schemes perform well in terms of low computational complexity, lesser number of average iterations and improved PAPR reduction capability of the OFDM signal without any loss in BER performance of the system.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"16 1","pages":"224-231"},"PeriodicalIF":0.7,"publicationDate":"2020-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42044933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Frequency Plan Optimization Based on Genetic Algorithms for Cellular Networks 基于遗传算法的蜂窝网络频率规划优化
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-07-09 DOI: 10.24138/jcomss.v16i3.1012
H. Megnafi
Cellular networks are constantly evolving to ensure a better Quality of Service (QoS) and quality of coverage ever more important. The radio cellular systems are based on frequency allocation. In this context, frequency allocation principle consists in choosing an optimal frequency plan to meet traffic demand constraints and communication quality while minimizing the radio interferences. This paper proposes an optimal frequency allocation approach based on genetic algorithms to minimize co-channel and adjacent channel interference. The validation of this new approach is confirmed by the results of the work we have done in the GSM network. In fact, we used the file obtained by the OMC-R, which defines the adjacent cells of each cell and the frequencies allocated to the considered area. The results obtained clearly show the effectiveness and robustness of the approach used.
蜂窝网络不断发展,以确保更好的服务质量(QoS)和覆盖质量变得越来越重要。无线电蜂窝系统是基于频率分配的。在这种情况下,频率分配原则在于选择最佳频率计划,以满足业务需求约束和通信质量,同时最大限度地减少无线电干扰。本文提出了一种基于遗传算法的最优频率分配方法,以最小化同信道和邻信道干扰。我们在GSM网络中所做的工作结果证实了这种新方法的有效性。事实上,我们使用了OMC-R获得的文件,该文件定义了每个小区的相邻小区以及分配给所考虑区域的频率。所获得的结果清楚地表明了所使用的方法的有效性和稳健性。
{"title":"Frequency Plan Optimization Based on Genetic Algorithms for Cellular Networks","authors":"H. Megnafi","doi":"10.24138/jcomss.v16i3.1012","DOIUrl":"https://doi.org/10.24138/jcomss.v16i3.1012","url":null,"abstract":"Cellular networks are constantly evolving to ensure a better Quality of Service (QoS) and quality of coverage ever more important. The radio cellular systems are based on frequency allocation. In this context, frequency allocation principle consists in choosing an optimal frequency plan to meet traffic demand constraints and communication quality while minimizing the radio interferences. This paper proposes an optimal frequency allocation approach based on genetic algorithms to minimize co-channel and adjacent channel interference. The validation of this new approach is confirmed by the results of the work we have done in the GSM network. In fact, we used the file obtained by the OMC-R, which defines the adjacent cells of each cell and the frequencies allocated to the considered area. The results obtained clearly show the effectiveness and robustness of the approach used.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2020-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44884381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Journal of Communications Software and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1