首页 > 最新文献

Journal of Communications Software and Systems最新文献

英文 中文
Detection and Prevention of Blackhole Attack in the AOMDV Routing Protocol AOMDV路由协议中黑洞攻击的检测与防范
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-19 DOI: 10.24138/JCOMSS.V17I1.945
Abdelaziz Tami, Sofiane Boukli-Hacene, M. A. Cherif
Mobile ad-hoc network is a collection of dynamically organized nodes where each node acts as a host and router. Mobile ad-hoc networks are characterized by the lack of preexisting infrastructures or centralized administration. So, they are vulnerable to several types of attacks, especially the Blackhole attack. This attack is one of the most serious attacks in this kind of mobile networks. In this type of attack, the malicious node sends a false answer indicating that it has the shortest path to the destination node by increasing the sequence number and decreasing the number of hops. This will have a significant negative impact on source nodes which send their data packets through the malicious node to the destination. This malicious node drops received data packets and absorbs all network traffic. In order overcome this problem, securing routing protocols become a very important requirement in mobile ad-hoc networks. Multi-path routing protocols are among the protocols affected by the Blackhole attack. In this paper, we propose an effective and efficient technique that avoids misbehavior of Blackhole nodes and facilitates the discovery for the most reliable paths for the secure transmission of data packets between communicating nodes in the well known Ad hoc On-demand multi-path routing protocol (AOMDV). Our proposed technique is implemented and simulated using the well known ns 2.35 simulator. We also compared the performance of the three routing protocols AOMDV, AOMDV under Blackhole attack (BHAOMDV) and the proposed solution to counter the Blackhole attack (IDSAOMDV). The results show the degradation of performance of AOMDV under attack, it also present similarities between normal AOMDV and the proposed solution by isolating misbehaving node which has resulted in increase the performance metrics to the standard values of the AOMDV protocol.
移动自组织网络是动态组织的节点的集合,其中每个节点充当主机和路由器。移动自组织网络的特点是缺乏预先存在的基础设施或集中管理。因此,他们很容易受到几种类型的攻击,尤其是黑洞攻击。这种攻击是此类移动网络中最严重的攻击之一。在这种类型的攻击中,恶意节点通过增加序列号和减少跳数来发送错误答案,指示其具有到目的节点的最短路径。这将对通过恶意节点向目的地发送数据包的源节点产生重大负面影响。此恶意节点丢弃接收到的数据包并吸收所有网络流量。为了克服这个问题,安全路由协议成为移动自组织网络中一个非常重要的要求。多路径路由协议是受黑洞攻击影响的协议之一。在本文中,我们提出了一种有效且高效的技术,该技术可以避免黑洞节点的不当行为,并有助于在众所周知的自组织按需多路径路由协议(AOMDV)中发现通信节点之间安全传输数据包的最可靠路径。我们提出的技术是使用众所周知的ns2.35模拟器实现和模拟的。我们还比较了三种路由协议AOMDV、AOMDV在黑洞攻击下的性能(BHAOMDV)以及所提出的对抗黑洞攻击的解决方案(IDSAOMDV)。结果表明,AOMDV在攻击下的性能有所下降,它还表现出普通AOMDV与所提出的解决方案的相似之处,即隔离行为不端的节点,从而将性能指标提高到AOMDV协议的标准值。
{"title":"Detection and Prevention of Blackhole Attack in the AOMDV Routing Protocol","authors":"Abdelaziz Tami, Sofiane Boukli-Hacene, M. A. Cherif","doi":"10.24138/JCOMSS.V17I1.945","DOIUrl":"https://doi.org/10.24138/JCOMSS.V17I1.945","url":null,"abstract":"Mobile ad-hoc network is a collection of dynamically organized nodes where each node acts as a host and router. Mobile ad-hoc networks are characterized by the lack of preexisting infrastructures or centralized administration. So, they are vulnerable to several types of attacks, especially the Blackhole attack. This attack is one of the most serious attacks in this kind of mobile networks. In this type of attack, the malicious node sends a false answer indicating that it has the shortest path to the destination node by increasing the sequence number and decreasing the number of hops. This will have a significant negative impact on source nodes which send their data packets through the malicious node to the destination. This malicious node drops received data packets and absorbs all network traffic. In order overcome this problem, securing routing protocols become a very important requirement in mobile ad-hoc networks. Multi-path routing protocols are among the protocols affected by the Blackhole attack. In this paper, we propose an effective and efficient technique that avoids misbehavior of Blackhole nodes and facilitates the discovery for the most reliable paths for the secure transmission of data packets between communicating nodes in the well known Ad hoc On-demand multi-path routing protocol (AOMDV). Our proposed technique is implemented and simulated using the well known ns 2.35 simulator. We also compared the performance of the three routing protocols AOMDV, AOMDV under Blackhole attack (BHAOMDV) and the proposed solution to counter the Blackhole attack (IDSAOMDV). The results show the degradation of performance of AOMDV under attack, it also present similarities between normal AOMDV and the proposed solution by isolating misbehaving node which has resulted in increase the performance metrics to the standard values of the AOMDV protocol.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"17 1","pages":"1-12"},"PeriodicalIF":0.7,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41391492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Early Detection of External Neurological Symptoms through a Wearable Smart-Glasses Prototype 通过可穿戴智能眼镜原型早期检测外部神经症状
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/JCOMSS-2021-0071
A. Sciarrone, I. Bisio, Chiara Garibotto, F. Lavagetto, Mehrnaz Hamedani, V. Prada, A. Schenone, Federico Boero, Gianluca Gambari, M. Cereia, Michele Jurilli
The Internet of Things (IoT) framework is moving the research community to provide smart systems and solutions aimed at revolutionizing medical sciences and healthcare. Given the extreme diffusion of Alzheimer’s disease (AD) and Parkinson’s disease (PD), the demand for a solution to early detect neurological symptoms of such diseases strongly arose. According to the medical literature, such early detection can be obtained through the correlation between PD and AD and some external symptoms: the Essential Tremor (ET) and the number of Eye Blinks (EBs). In this paper, which can be considered as an extended version of [1], we present a prototype of wearable smart glasses able to detect the presence of ET of the head and to count the number of EBs at the same time, in a transparent way with respect to the final user. Numerical results demonstrate the reliability of the proposed approach: the proposed algorithms are able to i) correctly recognize the ET with an overall accuracy above 97% and ii) count the number of EBs with an overall error around 9%.
物联网(IoT)框架正在推动研究界提供旨在彻底改变医学科学和医疗保健的智能系统和解决方案。鉴于阿尔茨海默病(AD)和帕金森病(PD)的极端扩散,对早期检测这类疾病神经症状的解决方案的需求强烈上升。根据医学文献,通过PD和AD与一些外部症状的相关性,如特发性震颤(ET)和眨眼次数(EBs),可以获得这种早期发现。本文可以看作是[1]的扩展版本,我们提出了一种可穿戴智能眼镜的原型,能够检测头部ET的存在,同时以透明的方式对最终用户计算EBs的数量。数值结果证明了该方法的可靠性:所提出的算法能够i)正确识别ET,总体精度在97%以上;ii)计算EBs的数量,总体误差在9%左右。
{"title":"Early Detection of External Neurological Symptoms through a Wearable Smart-Glasses Prototype","authors":"A. Sciarrone, I. Bisio, Chiara Garibotto, F. Lavagetto, Mehrnaz Hamedani, V. Prada, A. Schenone, Federico Boero, Gianluca Gambari, M. Cereia, Michele Jurilli","doi":"10.24138/JCOMSS-2021-0071","DOIUrl":"https://doi.org/10.24138/JCOMSS-2021-0071","url":null,"abstract":"The Internet of Things (IoT) framework is moving the research community to provide smart systems and solutions aimed at revolutionizing medical sciences and healthcare. Given the extreme diffusion of Alzheimer’s disease (AD) and Parkinson’s disease (PD), the demand for a solution to early detect neurological symptoms of such diseases strongly arose. According to the medical literature, such early detection can be obtained through the correlation between PD and AD and some external symptoms: the Essential Tremor (ET) and the number of Eye Blinks (EBs). In this paper, which can be considered as an extended version of [1], we present a prototype of wearable smart glasses able to detect the presence of ET of the head and to count the number of EBs at the same time, in a transparent way with respect to the final user. Numerical results demonstrate the reliability of the proposed approach: the proposed algorithms are able to i) correctly recognize the ET with an overall accuracy above 97% and ii) count the number of EBs with an overall error around 9%.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Limiting Performance of Millimeter-Wave Communications in the Presence of a 3D Random Waypoint Mobility Model 三维随机路点移动模型下毫米波通信的限制性能
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/JCOMSS-2020-0008
M. Comisso, F. Vatta, G. Buttazzoni, F. Babich
—This paper proposes a mathematical framework for evaluating the limiting capacity of a millimeter-wave (mmWave) communication involving a mobile user (MU) and a cellular base station. The investigation is realized considering a three-dimensional (3D) space in which the random waypoint mobility model is used to probabilistically identify the location of the MUs. Besides, the analysis is developed accounting for path-loss atten- uation, directional antenna gains, shadowing, and modulation scheme. Closed-form formulas for the received signal power, the Shannon capacity, and the bit error rate (BER) are obtained for both line-of-sight (LoS) and non-LoS scenarios in the presence of a noise-limited operating regime. The conceived theoretical model is firstly checked by Monte Carlo validations, and then employed to explore the influence of the antenna gain and of the cell radius on the capacity and on the BER of a fifth-generation (5G) link in a 3D environment, taking into account both the 28 and 73 GHz mmWave bands.
本文提出了一个数学框架,用于评估涉及移动用户(MU)和蜂窝基站的毫米波(mmWave)通信的极限容量。该研究是在三维空间中实现的,其中随机航路点移动模型用于概率识别目标的位置。此外,还对路径损耗衰减、定向天线增益、阴影和调制方案进行了分析。在存在噪声限制的操作制度下,获得了视距(LoS)和非视距(LoS)情况下接收信号功率、香农容量和误码率(BER)的封闭形式公式。首先通过蒙特卡罗验证验证了所设想的理论模型,然后在考虑28 GHz和73 GHz毫米波频段的情况下,探讨了天线增益和小区半径对3D环境下第五代(5G)链路容量和BER的影响。
{"title":"Limiting Performance of Millimeter-Wave Communications in the Presence of a 3D Random Waypoint Mobility Model","authors":"M. Comisso, F. Vatta, G. Buttazzoni, F. Babich","doi":"10.24138/JCOMSS-2020-0008","DOIUrl":"https://doi.org/10.24138/JCOMSS-2020-0008","url":null,"abstract":"—This paper proposes a mathematical framework for evaluating the limiting capacity of a millimeter-wave (mmWave) communication involving a mobile user (MU) and a cellular base station. The investigation is realized considering a three-dimensional (3D) space in which the random waypoint mobility model is used to probabilistically identify the location of the MUs. Besides, the analysis is developed accounting for path-loss atten- uation, directional antenna gains, shadowing, and modulation scheme. Closed-form formulas for the received signal power, the Shannon capacity, and the bit error rate (BER) are obtained for both line-of-sight (LoS) and non-LoS scenarios in the presence of a noise-limited operating regime. The conceived theoretical model is firstly checked by Monte Carlo validations, and then employed to explore the influence of the antenna gain and of the cell radius on the capacity and on the BER of a fifth-generation (5G) link in a 3D environment, taking into account both the 28 and 73 GHz mmWave bands.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"14 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Behavior Prediction Based on User Events 基于用户事件的高效行为预测
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/JCOMSS-2020-0011
Peter Szabó, B. Genge
—In 2020 we have witnessed the dawn of machine learning enabled user experience. Now we can predict how users will use an application. Research progressed beyond recommendations, and we are ready to predict user events. Whenever a human interacts with a system, user events are dispatched. They can be as simple as a mouse click on a menu item or more complex, such as buying a product from an eCommerce site. Collaborative filtering (CF) has proven to be an excellent approach to predict events. Because each user can generate many events, this inevitably leads to a vast number of events in a dataset. Unfortunately, the operation time of CF increases exponentially with the increase of data-points. This paper presents a generalized approach to reduce the dataset’s size without compromising prediction accuracy. Our solution transformed a dataset containing over 20 million user events (20,692,840 rows) into a sparse matrix in about 7 minutes (434.08 s). We have used this matrix to train a neural network to accurately predict user events.
2020年,我们见证了机器学习支持用户体验的曙光。现在我们可以预测用户将如何使用应用程序。研究进展超越了推荐,我们已经准备好预测用户事件。只要有人与系统交互,就会分派用户事件。它们可以像鼠标点击菜单项那样简单,也可以更复杂,比如从电子商务网站购买产品。协同过滤(CF)已被证明是一种很好的预测事件的方法。因为每个用户都可以生成许多事件,这不可避免地会导致数据集中出现大量事件。不幸的是,CF的运算时间随着数据点的增加呈指数增长。本文提出了一种在不影响预测精度的情况下减少数据集大小的通用方法。我们的解决方案在大约7分钟(434.08秒)内将包含超过2000万用户事件(20,692,840行)的数据集转换为稀疏矩阵。我们已经使用该矩阵来训练神经网络来准确预测用户事件。
{"title":"Efficient Behavior Prediction Based on User Events","authors":"Peter Szabó, B. Genge","doi":"10.24138/JCOMSS-2020-0011","DOIUrl":"https://doi.org/10.24138/JCOMSS-2020-0011","url":null,"abstract":"—In 2020 we have witnessed the dawn of machine learning enabled user experience. Now we can predict how users will use an application. Research progressed beyond recommendations, and we are ready to predict user events. Whenever a human interacts with a system, user events are dispatched. They can be as simple as a mouse click on a menu item or more complex, such as buying a product from an eCommerce site. Collaborative filtering (CF) has proven to be an excellent approach to predict events. Because each user can generate many events, this inevitably leads to a vast number of events in a dataset. Unfortunately, the operation time of CF increases exponentially with the increase of data-points. This paper presents a generalized approach to reduce the dataset’s size without compromising prediction accuracy. Our solution transformed a dataset containing over 20 million user events (20,692,840 rows) into a sparse matrix in about 7 minutes (434.08 s). We have used this matrix to train a neural network to accurately predict user events.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Two-hop D2D Communications Underlay 5G Networks: A Stackelberg Game Approach 节能两跳D2D通信底层5G网络:Stackelberg博弈方法
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/JCOMSS-2021-0008
S. Selmi, Ridha Boullègue
— Although coverage and capacity are the key elements of the 5G user experience, a dominant part of the population living in rural areas still experience inferior connectivity. Several solutions have been proposed to address this issue. They include deploying small cells, increasing the number of sectors per eNodeB, and reusing signal repetition. However, most of them require complex deployment and expensive fees. Accordingly, many efforts have been deployed on coverage extension software. Even so, many critical issues related to public safety, relay capacity, and devices power constraints are still challenging. As a contribution, we propose in this paper a spectral and energy-efficient two-hop device to device (D2D) relay selection algorithm. Our main goal is to extend the connectivity to the out-of-coverage (OOC) devices. Contrarily to previous solutions in which the relay is selected centrally or individually, we propose a distributed two-stage algorithm based on the Stackelberg game to involve all the competing devices. In the first stage, the OOC devices (OCDUs) are matched with the relays maximizing their spectral efficiency, and the required bandwidth for each one is determined. Then, a power control stage is investigated to calculate the optimal transmission power. The numerical and simulation analysis shows that the proposed schema outperforms the former solutions in total system capacity, spectral efficiency (SE), and energy efficiency (EE) while reducing the complexity.
尽管覆盖范围和容量是5G用户体验的关键要素,但生活在农村地区的大部分人口仍然体验到较差的连接。为了解决这个问题,已经提出了几种解决办法。它们包括部署小型蜂窝,增加每个eNodeB的扇区数量,以及重用信号重复。然而,它们中的大多数需要复杂的部署和昂贵的费用。因此,许多工作已经部署在覆盖扩展软件上。即便如此,许多与公共安全、继电器容量和设备功率限制相关的关键问题仍然具有挑战性。作为贡献,我们在本文中提出了一种频谱和节能的两跳设备到设备(D2D)中继选择算法。我们的主要目标是将连接扩展到覆盖外(OOC)设备。与以往集中或单独选择中继的解决方案不同,我们提出了一种基于Stackelberg博弈的分布式两阶段算法,使所有竞争设备都参与其中。在第一阶段,将OOC器件(ocdu)与中继进行匹配,最大限度地提高其频谱效率,并确定每个ocdu所需的带宽。然后,研究了功率控制阶段,以计算最优传输功率。数值和仿真分析表明,该方案在降低系统复杂度的同时,在系统总容量、频谱效率(SE)和能量效率(EE)方面均优于现有方案。
{"title":"Energy Efficient Two-hop D2D Communications Underlay 5G Networks: A Stackelberg Game Approach","authors":"S. Selmi, Ridha Boullègue","doi":"10.24138/JCOMSS-2021-0008","DOIUrl":"https://doi.org/10.24138/JCOMSS-2021-0008","url":null,"abstract":"— Although coverage and capacity are the key elements of the 5G user experience, a dominant part of the population living in rural areas still experience inferior connectivity. Several solutions have been proposed to address this issue. They include deploying small cells, increasing the number of sectors per eNodeB, and reusing signal repetition. However, most of them require complex deployment and expensive fees. Accordingly, many efforts have been deployed on coverage extension software. Even so, many critical issues related to public safety, relay capacity, and devices power constraints are still challenging. As a contribution, we propose in this paper a spectral and energy-efficient two-hop device to device (D2D) relay selection algorithm. Our main goal is to extend the connectivity to the out-of-coverage (OOC) devices. Contrarily to previous solutions in which the relay is selected centrally or individually, we propose a distributed two-stage algorithm based on the Stackelberg game to involve all the competing devices. In the first stage, the OOC devices (OCDUs) are matched with the relays maximizing their spectral efficiency, and the required bandwidth for each one is determined. Then, a power control stage is investigated to calculate the optimal transmission power. The numerical and simulation analysis shows that the proposed schema outperforms the former solutions in total system capacity, spectral efficiency (SE), and energy efficiency (EE) while reducing the complexity.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless Three-hop Relay Environment with Line-of-Sight: Investigation and Performance Analysis 具有视距的无线三跳中继环境:调查与性能分析
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/jcomss-2021-0013
D. Krstić, P. Nikolic, Z. Popovic, Sinisa Minic, M. Stefanovic
—Lately, the investigation of multi-hop relays is increased in both, academia and engineering practice. Multi-hop relay is introduced to enable data transmission between base station and mobile user dividing great distance into two or more segments to improve link quality. This improvement is specially expressed in environments under deep fading and shadow, where coverage is significantly increased using multi-hop relays. Here, wireless three-hop relay environment with line-of-sight was observed. Output signal from such system is defined as a product of three arbitrary, independent, but not necessarily identically distributed Rician random variables (RVs). For such system, some important performance of the first and second order were analyzed and graphically presented. The impact of Rician factor and signal powers on performance quantities was shown. Derived and displayed first order performance are: probability density function (PDF), cumulative distribution function (CDF), outage probability (Pout), moments, amount of fading (AoF) and channel capacity. Then, the following second order characteristics of wireless three-hop relay communication system working in Rician multipath fading environment were covered: level crossing rate (LCR) and average fade duration (AFD). These results have big application in wireless relay communications with a pronounced line-of-sight, where Rician model is used to describe fading.
近年来,学术界和工程实践对多跳中继的研究越来越多。引入多跳中继,使基站和移动用户之间的数据传输被分割成两个或多个段,以提高链路质量。这种改进特别表现在深衰落和阴影环境下,使用多跳中继可以显著增加覆盖范围。本文观察了视距下无线三跳中继环境。该系统的输出信号被定义为三个任意的、独立的、但不一定是同分布的随机变量(RVs)的乘积。针对该系统,分析了一阶和二阶的一些重要性能,并给出了图形。分析了信号功率和功率对系统性能的影响。导出和显示的一阶性能为:概率密度函数(PDF)、累积分布函数(CDF)、中断概率(Pout)、矩量、衰落量(AoF)和信道容量。然后,研究了无线三跳中继通信系统在多径衰落环境下的二阶特性:平交率(LCR)和平均衰落持续时间(AFD)。这些结果在具有明显视距的无线中继通信中有很大的应用,在这种情况下,使用了ricr模型来描述衰落。
{"title":"Wireless Three-hop Relay Environment with Line-of-Sight: Investigation and Performance Analysis","authors":"D. Krstić, P. Nikolic, Z. Popovic, Sinisa Minic, M. Stefanovic","doi":"10.24138/jcomss-2021-0013","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0013","url":null,"abstract":"—Lately, the investigation of multi-hop relays is increased in both, academia and engineering practice. Multi-hop relay is introduced to enable data transmission between base station and mobile user dividing great distance into two or more segments to improve link quality. This improvement is specially expressed in environments under deep fading and shadow, where coverage is significantly increased using multi-hop relays. Here, wireless three-hop relay environment with line-of-sight was observed. Output signal from such system is defined as a product of three arbitrary, independent, but not necessarily identically distributed Rician random variables (RVs). For such system, some important performance of the first and second order were analyzed and graphically presented. The impact of Rician factor and signal powers on performance quantities was shown. Derived and displayed first order performance are: probability density function (PDF), cumulative distribution function (CDF), outage probability (Pout), moments, amount of fading (AoF) and channel capacity. Then, the following second order characteristics of wireless three-hop relay communication system working in Rician multipath fading environment were covered: level crossing rate (LCR) and average fade duration (AFD). These results have big application in wireless relay communications with a pronounced line-of-sight, where Rician model is used to describe fading.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Trust Model in Unmanned Aerial Vehicle Ad Hoc Networks 无人机自组网中的信任模型研究
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/jcomss-2021-0049
Moualla Alaa, AlDakkak Oumayma, AlJnidi Mohamad
Unmanned Aerial Vehicle ad hoc networks (UAANETs) are originally designed to work in a cooperative environment. These networks are vulnerable to a wide range of attacks due to the lack of predefined infrastructure and the dynamic topology. Security in ad hoc networks, in general, is handled through authentication and encryption. This can be considered as a heavy way to protect the network due to the lack of resources in the nodes. However, trust can be introduced to address a light weight solution for some security issues. In this paper, we focus on the concept of decentralized trust to design an efficient and trustful routing protocol, and ensure stable routes between nodes in spite of the rapidly changing topology, and to provide a mechanism for detecting malicious incorrect packet forwarding attacks. The proposed light-weight trust-quality routing protocol (TQAODV) provides two main functionalities: monitoring the behavior of the neighboring nodes and computing the trust value based on the historical information in the network. Moreover, the new proposed model reduces routing overhead and route discovery frequency. The simulations we used in NS-2 show that the proposed routing scheme gives better performance against attacks compared to the traditional Ad-hoc On-demand Distance Vector (AODV), and improves the packets delivery ratio with about 15%, routing packets overhead and average delay with about 20%, compared to trust AODV.
无人机自组织网络(uaanet)最初设计用于在协作环境中工作。由于缺乏预定义的基础设施和动态拓扑结构,这些网络容易受到各种攻击。一般来说,临时网络中的安全性是通过身份验证和加密来处理的。由于节点中缺乏资源,这可以被认为是保护网络的一种繁重的方式。但是,可以引入信任来解决某些安全问题的轻量级解决方案。本文从分散信任的概念出发,设计了一种高效可信的路由协议,在拓扑结构快速变化的情况下保证节点间路由的稳定,并提供了一种检测恶意错误报文转发攻击的机制。提出的轻量级信任质量路由协议(TQAODV)提供两个主要功能:监视相邻节点的行为和基于网络中的历史信息计算信任值。此外,该模型还降低了路由开销和路由发现频率。在NS-2中进行的仿真表明,与传统的Ad-hoc按需距离矢量(AODV)相比,所提出的路由方案具有更好的抗攻击性能,与信任AODV相比,数据包投递率提高了约15%,路由数据包开销和平均延迟提高了约20%。
{"title":"Towards Trust Model in Unmanned Aerial Vehicle Ad Hoc Networks","authors":"Moualla Alaa, AlDakkak Oumayma, AlJnidi Mohamad","doi":"10.24138/jcomss-2021-0049","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0049","url":null,"abstract":"Unmanned Aerial Vehicle ad hoc networks (UAANETs) are originally designed to work in a cooperative environment. These networks are vulnerable to a wide range of attacks due to the lack of predefined infrastructure and the dynamic topology. Security in ad hoc networks, in general, is handled through authentication and encryption. This can be considered as a heavy way to protect the network due to the lack of resources in the nodes. However, trust can be introduced to address a light weight solution for some security issues. In this paper, we focus on the concept of decentralized trust to design an efficient and trustful routing protocol, and ensure stable routes between nodes in spite of the rapidly changing topology, and to provide a mechanism for detecting malicious incorrect packet forwarding attacks. The proposed light-weight trust-quality routing protocol (TQAODV) provides two main functionalities: monitoring the behavior of the neighboring nodes and computing the trust value based on the historical information in the network. Moreover, the new proposed model reduces routing overhead and route discovery frequency. The simulations we used in NS-2 show that the proposed routing scheme gives better performance against attacks compared to the traditional Ad-hoc On-demand Distance Vector (AODV), and improves the packets delivery ratio with about 15%, routing packets overhead and average delay with about 20%, compared to trust AODV.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Study of a Class of Irregular Near Capacity Achieving LDPC Codes 一类不规则近容量LDPC码的性能研究
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/JCOMSS-2020-0009
F. Vatta, A. Soranzo, M. Comisso, G. Buttazzoni, F. Babich
—This paper investigates the performance of a class of irregular low-density parity-check (LDPC) codes through a recently published low complexity upper bound on their belief- propagation decoding thresholds. Moreover, their performance analysis is carried out through a recently published algorithmic method, presented in Babich et al. 2017 paper. In particular, the class considered is characterized by variable node degree distributions λ ( x ) of minimum degree i 1 > 2 : being, in this case, λ (cid:48) (0) = λ 2 = 0 , this is useful to design LDPC codes presenting a linear minimum distance growth with the block length with probability 1, as shown in Di et al.’s 2006 paper. These codes unfortunately cannot reach capacity under iterative decoding, since the achievement of capacity requires λ 2 (cid:54) = 0 . However, in this latter case, the block error probability might converge to a constant, as shown in the aforementioned paper.
本文研究了一类不规则低密度奇偶校验码(LDPC)的性能,并给出了其信念传播译码阈值的低复杂度上界。此外,他们的性能分析是通过最近发表的一种算法方法进行的,该方法发表在Babich等人2017年的论文中。特别地,所考虑的类具有最小度为i 1 > 2的变节点度分布λ (x)的特征:在这种情况下,λ (cid:48) (0) = λ 2 = 0,这有助于设计具有线性最小距离增长的LDPC码,其块长度的概率为1,如Di等人2006年的论文所示。不幸的是,这些码在迭代解码下无法达到容量,因为实现容量需要λ 2 (cid:54) = 0。然而,在后一种情况下,块错误概率可能收敛到一个常数,如上述文章所示。
{"title":"Performance Study of a Class of Irregular Near Capacity Achieving LDPC Codes","authors":"F. Vatta, A. Soranzo, M. Comisso, G. Buttazzoni, F. Babich","doi":"10.24138/JCOMSS-2020-0009","DOIUrl":"https://doi.org/10.24138/JCOMSS-2020-0009","url":null,"abstract":"—This paper investigates the performance of a class of irregular low-density parity-check (LDPC) codes through a recently published low complexity upper bound on their belief- propagation decoding thresholds. Moreover, their performance analysis is carried out through a recently published algorithmic method, presented in Babich et al. 2017 paper. In particular, the class considered is characterized by variable node degree distributions λ ( x ) of minimum degree i 1 > 2 : being, in this case, λ (cid:48) (0) = λ 2 = 0 , this is useful to design LDPC codes presenting a linear minimum distance growth with the block length with probability 1, as shown in Di et al.’s 2006 paper. These codes unfortunately cannot reach capacity under iterative decoding, since the achievement of capacity requires λ 2 (cid:54) = 0 . However, in this latter case, the block error probability might converge to a constant, as shown in the aforementioned paper.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"45 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of Epidemic Interference on the Performance of M-ASK, M-PSK and M-QAM Modulation Schemes 流行干扰对M-ASK、M-PSK和M-QAM调制方案性能的影响
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/jcomss-2021-0179
Joel E. Cordeiro Jr, M. Alencar, M. Yashina, A. Tatashev
{"title":"Effect of Epidemic Interference on the Performance of M-ASK, M-PSK and M-QAM Modulation Schemes","authors":"Joel E. Cordeiro Jr, M. Alencar, M. Yashina, A. Tatashev","doi":"10.24138/jcomss-2021-0179","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0179","url":null,"abstract":"","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Demand Forecasting Tool For Inventory Control Smart Systems 库存控制智能系统的需求预测工具
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/jcomss-2021-0068
Fatima-Zohra Benhamida, Ouahiba Kaddouri, Tahar Ouhrouche, Mohammed Benaichouche, D. Casado-Mansilla, D. López-de-Ipiña
—With the availability of data and the increasing capabilities of data processing tools, many businesses are leveraging historical sales and demand data to implement smart inventory management systems. Demand forecasting is the process of estimating the consumption of products or services for future time periods. It plays an important role in the field of inventory control and Supply Chain, since it enables production and supply planning and therefore can reduce delivery times and optimize Supply Chain decisions. This paper presents an extensive literature review about demand forecasting methods for time-series data. Based on analysis results and findings, a new demand forecasting tool for inventory control is proposed. First, a forecasting pipeline is designed to allow selecting the most accurate demand forecasting method. The validation of the proposed solution is executed on Stock&Buy case study, a growing online retail platform. For this reason, two new methods are proposed: (1) a hybrid method, Comb-TSB, is proposed for intermittent and lumpy demand patterns. CombTSB automatically selects the most accurate model among a set of methods. (2) a clustering-based approach (ClustAvg) is proposed to forecast demand for new products which have very few or no sales history data. The evaluation process showed that the proposed tool achieves good forecasting accuracy by making the most appropriate choice while defining the forecasting method to apply for each product selection.
-随着数据的可用性和数据处理工具的能力不断增强,许多企业正在利用历史销售和需求数据来实施智能库存管理系统。需求预测是估计未来一段时间内产品或服务消费的过程。它在库存控制和供应链领域发挥着重要作用,因为它可以实现生产和供应计划,因此可以减少交货时间并优化供应链决策。本文对时间序列数据的需求预测方法进行了广泛的文献综述。根据分析结果和发现,提出了一种新的库存控制需求预测工具。首先,设计了一个预测管道,以便选择最准确的需求预测方法。在Stock&Buy案例研究中对所提出的解决方案进行了验证。为此,提出了两种新方法:(1)针对间歇性和块状需求模式,提出了一种混合方法Comb-TSB。CombTSB自动从一组方法中选择最准确的模型。(2)提出了一种基于聚类的方法(ClustAvg)来预测很少或没有销售历史数据的新产品的需求。评估过程表明,该工具在确定预测方法应用于每种产品选择的同时,做出了最合适的选择,达到了较好的预测精度。
{"title":"Demand Forecasting Tool For Inventory Control Smart Systems","authors":"Fatima-Zohra Benhamida, Ouahiba Kaddouri, Tahar Ouhrouche, Mohammed Benaichouche, D. Casado-Mansilla, D. López-de-Ipiña","doi":"10.24138/jcomss-2021-0068","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0068","url":null,"abstract":"—With the availability of data and the increasing capabilities of data processing tools, many businesses are leveraging historical sales and demand data to implement smart inventory management systems. Demand forecasting is the process of estimating the consumption of products or services for future time periods. It plays an important role in the field of inventory control and Supply Chain, since it enables production and supply planning and therefore can reduce delivery times and optimize Supply Chain decisions. This paper presents an extensive literature review about demand forecasting methods for time-series data. Based on analysis results and findings, a new demand forecasting tool for inventory control is proposed. First, a forecasting pipeline is designed to allow selecting the most accurate demand forecasting method. The validation of the proposed solution is executed on Stock&Buy case study, a growing online retail platform. For this reason, two new methods are proposed: (1) a hybrid method, Comb-TSB, is proposed for intermittent and lumpy demand patterns. CombTSB automatically selects the most accurate model among a set of methods. (2) a clustering-based approach (ClustAvg) is proposed to forecast demand for new products which have very few or no sales history data. The evaluation process showed that the proposed tool achieves good forecasting accuracy by making the most appropriate choice while defining the forecasting method to apply for each product selection.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"11 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Journal of Communications Software and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1