首页 > 最新文献

International Journal of Interdisciplinary Telecommunications and Networking最新文献

英文 中文
Design and Implementation of Advanced Encryption Standard by New Substitution Box in Galois Field (𝟐𝟖) 基于伽罗瓦领域新型替换盒的高级加密标准设计与实现(𝟖)
IF 0.8 Q4 TELECOMMUNICATIONS Pub Date : 2022-01-01 DOI: 10.21608/ijt.2022.266474
Wageda Alsobky, Abdelkader Ismail, A. Mohra, Ayman M. Hassan, Ayman Abdelaziem
: An inverse multiplexing method for irreducible polynomials is presented in this paper based on the theory of substitution boxes. The method is based on the theory of substitution boxes. Following a series of successful experiments, the new approach was put into practice. For reasons of increased complexity and security, the affine conversion period in the Galois field (2^8) has been increased to the maximum value of the period between input and output of 102, the Strict Avalanche Criterion (SAC) has been reduced to nearly half of its original value, and the results are bijective as a result. It was decided to use the number 112 after the Bit Independent Criterion effect had been reduced to produce good results. These breakthroughs are being used to protect information security and to strengthen the advanced encryption standard that is currently in use, according to the researchers. In addition to the addition of a new s-box, their encryption will be more secure and private, making our services even more valuable. Field, Bijective, Balance, SAC.
基于代入盒理论,提出了一种不可约多项式的逆复用方法。该方法基于替换盒理论。经过一系列成功的实验,这种新方法被付诸实施。由于增加复杂性和安全性的原因,伽罗瓦场的仿射转换周期(2^8)增加到输入和输出之间周期的最大值102,严格雪崩判据(SAC)减少到其原始值的近一半,结果是双射的。为了产生良好的结果,决定在减小位独立准则效应后使用数字112。研究人员表示,这些突破将被用于保护信息安全,并加强目前正在使用的高级加密标准。除了增加一个新的s-box,他们的加密将更加安全和私密,使我们的服务更有价值。场,双射,平衡,SAC。
{"title":"Design and Implementation of Advanced Encryption Standard by New Substitution Box in Galois Field (𝟐𝟖)","authors":"Wageda Alsobky, Abdelkader Ismail, A. Mohra, Ayman M. Hassan, Ayman Abdelaziem","doi":"10.21608/ijt.2022.266474","DOIUrl":"https://doi.org/10.21608/ijt.2022.266474","url":null,"abstract":": An inverse multiplexing method for irreducible polynomials is presented in this paper based on the theory of substitution boxes. The method is based on the theory of substitution boxes. Following a series of successful experiments, the new approach was put into practice. For reasons of increased complexity and security, the affine conversion period in the Galois field (2^8) has been increased to the maximum value of the period between input and output of 102, the Strict Avalanche Criterion (SAC) has been reduced to nearly half of its original value, and the results are bijective as a result. It was decided to use the number 112 after the Bit Independent Criterion effect had been reduced to produce good results. These breakthroughs are being used to protect information security and to strengthen the advanced encryption standard that is currently in use, according to the researchers. In addition to the addition of a new s-box, their encryption will be more secure and private, making our services even more valuable. Field, Bijective, Balance, SAC.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"117 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73749852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and Analysis Ads Through the Mini-Programs 通过小程序检测和分析广告
IF 0.8 Q4 TELECOMMUNICATIONS Pub Date : 2022-01-01 DOI: 10.4018/ijitn.309700
Biao Liu, Lin jie Liu, Jianyi Zhang
Due to the widespread application and rapid delivery of advertisements for mini-programs, mini-program users are increasingly being harassed by advertisements. However, due to the existence of mini-programs dependent on the corresponding platforms, traditional advertising detection methods cannot detect the advertisements of the mini-programs. In the process of collecting and studying advertising problems, the authors have developed a framework that can run continuously almost without human intervention. They have analyzed 4853 mini-programs in total and got a general understanding of the problems of mini-programs' advertisements. There are several interesting findings, such as frequent pop-up advertisements, redirection, pornographic advertisements, etc. The authors have further detected pornographic advertisements and analyzed the links obtained in mini-programs to identify the malicious nature of the links. Broadly speaking, the framework collects the advertising problems of mini-programs and detects and analyzes some advertisements and malicious links to strengthen the supervision of the platform.
由于小程序广告的广泛应用和快速投放,小程序用户越来越多地受到广告的骚扰。然而,由于存在依赖于相应平台的小程序,传统的广告检测方法无法检测到小程序的广告。在收集和研究广告问题的过程中,作者开发了一个几乎无需人工干预就能连续运行的框架。他们总共分析了4853个小程序,对小程序广告的问题有了大致的了解。有几个有趣的发现,如频繁的弹出式广告、重定向、色情广告等。作者进一步检测了色情广告,并分析了迷你程序中获得的链接,以确定链接的恶意性质。从广义上讲,该框架收集了小程序的广告问题,并检测和分析了一些广告和恶意链接,以加强对平台的监管。
{"title":"Detection and Analysis Ads Through the Mini-Programs","authors":"Biao Liu, Lin jie Liu, Jianyi Zhang","doi":"10.4018/ijitn.309700","DOIUrl":"https://doi.org/10.4018/ijitn.309700","url":null,"abstract":"Due to the widespread application and rapid delivery of advertisements for mini-programs, mini-program users are increasingly being harassed by advertisements. However, due to the existence of mini-programs dependent on the corresponding platforms, traditional advertising detection methods cannot detect the advertisements of the mini-programs. In the process of collecting and studying advertising problems, the authors have developed a framework that can run continuously almost without human intervention. They have analyzed 4853 mini-programs in total and got a general understanding of the problems of mini-programs' advertisements. There are several interesting findings, such as frequent pop-up advertisements, redirection, pornographic advertisements, etc. The authors have further detected pornographic advertisements and analyzed the links obtained in mini-programs to identify the malicious nature of the links. Broadly speaking, the framework collects the advertising problems of mini-programs and detects and analyzes some advertisements and malicious links to strengthen the supervision of the platform.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48188843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of COVID-19 Mobile Contact Tracing Applications and Their Impact on Privacy COVID-19手机接触者追踪应用及其对隐私的影响
IF 0.8 Q4 TELECOMMUNICATIONS Pub Date : 2022-01-01 DOI: 10.4018/ijitn.309696
Joanne C. Peca, Galen A. Grimes, M. Nasereddin, Edward J. Glantz
Contact tracing is a well-established process that has been utilized for years to assist in the effort to control the spread of contagious diseases. The rapid onset and spread of COVID-19 brought about the need for digital solutions which would help to speed up the collection and analysis of relevant health information. With the proliferation of mobile devices, the development of mobile device-based digital contact tracing applications appeared to be the solution. As countries around the globe created digital contact tracing applications for use by their respective populations, a variety of factors allowed for success for some and resulted in failure for others. This review highlights example countries with respect to their unique COVID-19 digital contact tracing solutions, the success or failure of the applications employed on mobile platforms, and the factors which have contributed to the success or failure of these solutions. Additionally, a review of research around data privacy and security in digital contact tracing apps is included.
追踪接触者是一个行之有效的过程,多年来一直用于协助控制传染病的传播。COVID-19的快速发作和传播带来了对数字解决方案的需求,这将有助于加快相关卫生信息的收集和分析。随着移动设备的普及,基于移动设备的数字接触追踪应用程序的开发成为解决方案。随着全球各国创建供各自人口使用的数字接触追踪应用程序,各种因素导致一些成功,而另一些则失败。本综述重点介绍了各国独特的COVID-19数字接触者追踪解决方案、移动平台上使用的应用程序的成功或失败,以及导致这些解决方案成功或失败的因素。此外,还包括对数字接触追踪应用程序中数据隐私和安全的研究综述。
{"title":"A Review of COVID-19 Mobile Contact Tracing Applications and Their Impact on Privacy","authors":"Joanne C. Peca, Galen A. Grimes, M. Nasereddin, Edward J. Glantz","doi":"10.4018/ijitn.309696","DOIUrl":"https://doi.org/10.4018/ijitn.309696","url":null,"abstract":"Contact tracing is a well-established process that has been utilized for years to assist in the effort to control the spread of contagious diseases. The rapid onset and spread of COVID-19 brought about the need for digital solutions which would help to speed up the collection and analysis of relevant health information. With the proliferation of mobile devices, the development of mobile device-based digital contact tracing applications appeared to be the solution. As countries around the globe created digital contact tracing applications for use by their respective populations, a variety of factors allowed for success for some and resulted in failure for others. This review highlights example countries with respect to their unique COVID-19 digital contact tracing solutions, the success or failure of the applications employed on mobile platforms, and the factors which have contributed to the success or failure of these solutions. Additionally, a review of research around data privacy and security in digital contact tracing apps is included.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41421788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G Mid-Range Electromagnetic Spectrum Implementation for Critical Infrastructure Development 用于关键基础设施开发的5G中程电磁频谱实施
IF 0.8 Q4 TELECOMMUNICATIONS Pub Date : 2022-01-01 DOI: 10.4018/ijitn.307103
U. O. Matthew, J. S. Kazaure, Prisca I. Okochi
The current research analysed the existing literature on the electromagnetic spectrum influences and made significant contributions in the perspective of the ongoing insinuations of electromagnetic frequency radiation emitted from the novel 5G network technology installations. In this case, the contemporary 5G network technology was tested along ANALOGY1, ANALOGY 2 and ANALOGY3 to find out if 5G network does emit electromagnetic non-ionizing radiation capable of destroying human body cells as already alleged. The paper observed that deploying the standalone 5G network on unmodulated ultra-high frequency beyond 20Gigahertz will produce non-ionizable, non-visible radiation (electrons and protons interacting as fields) capable of adverse health effect including heating up the human skin through polarisation and dipolar moment urtication , thereby destabilising the equilibrium of the human DNA charged particles through the formation of free radicals that are highly reactive due to the presence of unpaired electrons that occurred when water molecules are broken within the human cell.
目前的研究分析了有关电磁频谱影响的现有文献,并从新型5G网络技术装置发出的电磁频率辐射的持续暗示的角度做出了重大贡献。在这种情况下,当代5G网络技术按照模拟1、模拟2和模拟3进行了测试,以查明5G网络是否确实像已经声称的那样发射能够摧毁人体细胞的电磁非电离辐射。该论文观察到,在超过20千兆赫的未调制超高频上部署独立的5G网络将产生不可电离、不可见的辐射(电子和质子作为场相互作用),能够对健康产生不利影响,包括通过极化和偶极矩增热人体皮肤,从而通过形成自由基来破坏人类DNA带电粒子的平衡,所述自由基由于水分子在人类细胞内破碎时出现的不成对电子的存在而具有高度反应性。
{"title":"5G Mid-Range Electromagnetic Spectrum Implementation for Critical Infrastructure Development","authors":"U. O. Matthew, J. S. Kazaure, Prisca I. Okochi","doi":"10.4018/ijitn.307103","DOIUrl":"https://doi.org/10.4018/ijitn.307103","url":null,"abstract":"The current research analysed the existing literature on the electromagnetic spectrum influences and made significant contributions in the perspective of the ongoing insinuations of electromagnetic frequency radiation emitted from the novel 5G network technology installations. In this case, the contemporary 5G network technology was tested along ANALOGY1, ANALOGY 2 and ANALOGY3 to find out if 5G network does emit electromagnetic non-ionizing radiation capable of destroying human body cells as already alleged. The paper observed that deploying the standalone 5G network on unmodulated ultra-high frequency beyond 20Gigahertz will produce non-ionizable, non-visible radiation (electrons and protons interacting as fields) capable of adverse health effect including heating up the human skin through polarisation and dipolar moment urtication , thereby destabilising the equilibrium of the human DNA charged particles through the formation of free radicals that are highly reactive due to the presence of unpaired electrons that occurred when water molecules are broken within the human cell.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49086803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Coronavirus Pandemic (COVID-19) and Cooperative-Intelligent Transport Systems 冠状病毒大流行(COVID-19)与协同智能交通系统
IF 0.8 Q4 TELECOMMUNICATIONS Pub Date : 2022-01-01 DOI: 10.4018/ijitn.311827
Bettina Arnegger
Cooperative-intelligent transport systems (C-ITS) are a solution for the manifold challenges of traffic as well as a major competitive stepping stone for the European automotive and tele-communication industry. However, against the backdrop of far-reaching COVID-19 impacts, the management of such complex C-ITS megaprojects needs to be adapted. Insights from most recent research contributions on megaproject management and the unexpected have shown that fostering a common sense of action, intense and efficient communication, and a strong organizational culture can help C-ITS projects to cope with the unprecedented situation. The institutional role model has proven to be an effective implementation framework for employing such project management methods in the C-ITS context. By combining different strands of research in an analysis of the intersection between recent C-ITS findings and theory on megaproject management and the unexpected, this article contributes to a holistic understanding of the impact of COVID-19 on C-ITS.
协同智能交通系统(C-ITS)是解决交通诸多挑战的一种解决方案,也是欧洲汽车和电信行业竞争的重要跳板。然而,在2019冠状病毒病影响深远的背景下,此类复杂的智能交通系统大型项目的管理需要进行调整。最近关于大型项目管理和突发事件的研究成果表明,培养共同的行动意识、密集而有效的沟通以及强大的组织文化可以帮助C-ITS项目应对前所未有的情况。机构角色模型已被证明是在C-ITS环境中采用此类项目管理方法的有效实施框架。本文结合不同的研究方向,分析了最近的C-ITS研究结果与大型项目管理理论和意外事件之间的交集,有助于全面了解COVID-19对C-ITS的影响。
{"title":"The Coronavirus Pandemic (COVID-19) and Cooperative-Intelligent Transport Systems","authors":"Bettina Arnegger","doi":"10.4018/ijitn.311827","DOIUrl":"https://doi.org/10.4018/ijitn.311827","url":null,"abstract":"Cooperative-intelligent transport systems (C-ITS) are a solution for the manifold challenges of traffic as well as a major competitive stepping stone for the European automotive and tele-communication industry. However, against the backdrop of far-reaching COVID-19 impacts, the management of such complex C-ITS megaprojects needs to be adapted. Insights from most recent research contributions on megaproject management and the unexpected have shown that fostering a common sense of action, intense and efficient communication, and a strong organizational culture can help C-ITS projects to cope with the unprecedented situation. The institutional role model has proven to be an effective implementation framework for employing such project management methods in the C-ITS context. By combining different strands of research in an analysis of the intersection between recent C-ITS findings and theory on megaproject management and the unexpected, this article contributes to a holistic understanding of the impact of COVID-19 on C-ITS.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44902514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frequency Domain Transformations and CNNs to Predict Unlabeled Shark Behavior With GPS Data 频域变换和cnn用GPS数据预测未标记的鲨鱼行为
IF 0.8 Q4 TELECOMMUNICATIONS Pub Date : 2022-01-01 DOI: 10.4018/ijitn.309698
Geoffrey Daniel Farthing, Hen-Guel Yeh
This paper provides a comprehensive analysis of frequency domain transformations applied to convolutional neural networks (CNN) to model and predict unlabeled shark behavior in the open ocean with GPS position data. The frequency domain-based CNN networks are compared against the time domain CNN to contrast the two CNN architectures. The shark behavior data were obtained through two datasets where tri-axis accelerometer data were collected from live sharks. The first dataset was from the CSULB Shark Lab and consisted of labeled shark behavior into four shark behavioral categories. The second dataset used in this study was unlabeled and recorded from sharks in the open ocean and had GPS positioning data and depth data points. Findings show that the CNN architecture based on the frequency domain slightly outperforms time-based CNNs for classifying California horn shark behavior. Through spectral density analysis, prominent features are extracted and allow for distinguishing the shark behaviors.
本文全面分析了应用于卷积神经网络(CNN)的频域变换,利用GPS位置数据建模和预测公海中未标记的鲨鱼行为。将基于频域的CNN网络与时域CNN网络进行比较,对比两种CNN架构。鲨鱼行为数据是通过两个数据集获得的,其中三轴加速度计数据来自活体鲨鱼。第一个数据集来自CSULB鲨鱼实验室,包括标记为四种鲨鱼行为类别的鲨鱼行为。本研究中使用的第二个数据集是未标记的,记录的是公海上的鲨鱼,有GPS定位数据和深度数据点。研究结果表明,基于频域的CNN架构在对加州角鲨行为进行分类方面略优于基于时间的CNN。通过光谱密度分析,提取出突出的特征,并允许区分鲨鱼的行为。
{"title":"Frequency Domain Transformations and CNNs to Predict Unlabeled Shark Behavior With GPS Data","authors":"Geoffrey Daniel Farthing, Hen-Guel Yeh","doi":"10.4018/ijitn.309698","DOIUrl":"https://doi.org/10.4018/ijitn.309698","url":null,"abstract":"This paper provides a comprehensive analysis of frequency domain transformations applied to convolutional neural networks (CNN) to model and predict unlabeled shark behavior in the open ocean with GPS position data. The frequency domain-based CNN networks are compared against the time domain CNN to contrast the two CNN architectures. The shark behavior data were obtained through two datasets where tri-axis accelerometer data were collected from live sharks. The first dataset was from the CSULB Shark Lab and consisted of labeled shark behavior into four shark behavioral categories. The second dataset used in this study was unlabeled and recorded from sharks in the open ocean and had GPS positioning data and depth data points. Findings show that the CNN architecture based on the frequency domain slightly outperforms time-based CNNs for classifying California horn shark behavior. Through spectral density analysis, prominent features are extracted and allow for distinguishing the shark behaviors.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44761106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autonomous Flight of High-Endurance UAVs to Monitor Powerlines 高续航时间无人机自主飞行监测电力线
IF 0.8 Q4 TELECOMMUNICATIONS Pub Date : 2022-01-01 DOI: 10.4018/ijitn.309699
Derek M. Mata, Raffael Pillai, Ryan Sandoval, Shaker Ahmed, Do gyu Lee, Martin O'Connell, Joshua J. Kidwell, S. Dobbs, Zhen Yu
In this project, the authors will develop a highly efficient UAV (unmanned aerial vehicle) architecture for long endurance flights. The authors propose an IoT (internet of things) model that will connect a network of drones using a 4G LTE (long-term evolution) connection. The researchers also propose the use of MEC (mobile edge computing) stations, smart GCSs (ground control stations) for battery replacement, and wireless charging via powerline magnetic field harvesting. The authors will be applying these ideas to a powerline monitoring mission profile, creating a large sensor network with computer vision capabilities to detect powerline faults and report them to the proper authorities.
在这个项目中,作者将开发一种高效的无人机(无人机)架构,用于长时间飞行。作者提出了一种IoT(物联网)模型,该模型将使用4G LTE(长期演进)连接无人机网络。研究人员还建议使用MEC(移动边缘计算)站,智能GCSs(地面控制站)进行电池更换,以及通过电力线磁场收集进行无线充电。作者将把这些想法应用到电力线监测任务中,创建一个具有计算机视觉功能的大型传感器网络,以检测电力线故障并向有关当局报告。
{"title":"Autonomous Flight of High-Endurance UAVs to Monitor Powerlines","authors":"Derek M. Mata, Raffael Pillai, Ryan Sandoval, Shaker Ahmed, Do gyu Lee, Martin O'Connell, Joshua J. Kidwell, S. Dobbs, Zhen Yu","doi":"10.4018/ijitn.309699","DOIUrl":"https://doi.org/10.4018/ijitn.309699","url":null,"abstract":"In this project, the authors will develop a highly efficient UAV (unmanned aerial vehicle) architecture for long endurance flights. The authors propose an IoT (internet of things) model that will connect a network of drones using a 4G LTE (long-term evolution) connection. The researchers also propose the use of MEC (mobile edge computing) stations, smart GCSs (ground control stations) for battery replacement, and wireless charging via powerline magnetic field harvesting. The authors will be applying these ideas to a powerline monitoring mission profile, creating a large sensor network with computer vision capabilities to detect powerline faults and report them to the proper authorities.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45570971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Autonomous Rover for Groundwork Lawn Mowing 用于基础草坪修剪的自动漫游车
IF 0.8 Q4 TELECOMMUNICATIONS Pub Date : 2022-01-01 DOI: 10.4018/ijitn.309704
Tamer R. Omar, Van-Tao Chau, Marco Antonio Gallardo, Daniel R. Lopez, Alex Xavier Pazmino
The objective of this paper is to design and implement a lawnmower robot that can be used to mow grass from lawns and playgrounds remotely, online, or autonomously. The robot follows a rectangle zigzag trajectory through the lawn without any human interference. A set of concurrently running behaviors are defined to perform mowing operation. Sonar ranging is used to detect and avoid obstacles continuously throughout the route. The micro-controller connects to an ethernet board and uploads the robot's functions to a web server. Through the web server, users can monitor a 3D model of the moving rover and data from the lawnmower sensors. In addition, the robot's behaviors and connections are uploaded to IoT analytics platform to aid the performance evaluation and feature development.
本文的目标是设计和实现一个割草机机器人,它可以远程、在线或自主地从草坪和操场上割草。机器人在没有任何人为干扰的情况下沿着矩形之字形轨迹穿过草坪。定义了一组并发运行的行为来执行割草操作。声纳测距用于在整个路线中连续探测和避开障碍物。微控制器连接到以太网板,并将机器人的功能上传到网络服务器。通过web服务器,用户可以监控移动的漫游者的3D模型和来自割草机传感器的数据。此外,机器人的行为和连接被上传到物联网分析平台,以帮助性能评估和功能开发。
{"title":"Autonomous Rover for Groundwork Lawn Mowing","authors":"Tamer R. Omar, Van-Tao Chau, Marco Antonio Gallardo, Daniel R. Lopez, Alex Xavier Pazmino","doi":"10.4018/ijitn.309704","DOIUrl":"https://doi.org/10.4018/ijitn.309704","url":null,"abstract":"The objective of this paper is to design and implement a lawnmower robot that can be used to mow grass from lawns and playgrounds remotely, online, or autonomously. The robot follows a rectangle zigzag trajectory through the lawn without any human interference. A set of concurrently running behaviors are defined to perform mowing operation. Sonar ranging is used to detect and avoid obstacles continuously throughout the route. The micro-controller connects to an ethernet board and uploads the robot's functions to a web server. Through the web server, users can monitor a 3D model of the moving rover and data from the lawnmower sensors. In addition, the robot's behaviors and connections are uploaded to IoT analytics platform to aid the performance evaluation and feature development.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48974263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Network Anomaly Detection for Optimized Decision Development 用于优化决策开发的社交网络异常检测
IF 0.8 Q4 TELECOMMUNICATIONS Pub Date : 2022-01-01 DOI: 10.4018/ijitn.309697
Harshit Srivastava, E. Sheybani, R. Sankar
The paper presents the development of systems for improved source selection in a process that creates real-time categorization of events using only posts collected through various sensing applications that use social networks (such as Twitter or other mass dissemination networks) for reporting. The system recognizes critical instances in applications and simply views essential information from users (either by explicit user action or by default, as on Twitter) within the event and provides a textual description. As a result, social networks open up unprecedented possibilities for creating sensing applications by representing a set of tweets generated in a limited timeframe as a weighted network for influence concerning users. Obtaining data from a network of social site users substantiates the quality and dependability of data. It collects many users' dynamic behavior to construct and disseminate related information across the channel. The goal is to find a link between various data sources for event abnormalities.
本文介绍了在一个过程中改进来源选择的系统的开发,该过程仅使用通过使用社交网络(如推特或其他大规模传播网络)进行报告的各种传感应用程序收集的帖子来创建事件的实时分类。该系统识别应用程序中的关键实例,并简单地查看事件中用户的重要信息(通过明确的用户操作或默认情况下,如在Twitter上),并提供文本描述。因此,社交网络通过将在有限时间内生成的一组推文表示为影响用户的加权网络,为创建传感应用程序开辟了前所未有的可能性。从社交网站用户的网络中获得数据证实了数据的质量和可靠性。它收集了许多用户的动态行为,以构建和传播相关信息。目标是找到事件异常的各种数据源之间的联系。
{"title":"Social Network Anomaly Detection for Optimized Decision Development","authors":"Harshit Srivastava, E. Sheybani, R. Sankar","doi":"10.4018/ijitn.309697","DOIUrl":"https://doi.org/10.4018/ijitn.309697","url":null,"abstract":"The paper presents the development of systems for improved source selection in a process that creates real-time categorization of events using only posts collected through various sensing applications that use social networks (such as Twitter or other mass dissemination networks) for reporting. The system recognizes critical instances in applications and simply views essential information from users (either by explicit user action or by default, as on Twitter) within the event and provides a textual description. As a result, social networks open up unprecedented possibilities for creating sensing applications by representing a set of tweets generated in a limited timeframe as a weighted network for influence concerning users. Obtaining data from a network of social site users substantiates the quality and dependability of data. It collects many users' dynamic behavior to construct and disseminate related information across the channel. The goal is to find a link between various data sources for event abnormalities.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48080012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified Multipath Transmission Control Protocol Using Logarithmic Increase Under Long-Term Evolution and Wi-Fi Networks 长期演化与Wi-Fi网络下对数递增的改进多径传输控制协议
IF 0.8 Q4 TELECOMMUNICATIONS Pub Date : 2022-01-01 DOI: 10.4018/ijitn.311828
H. Nuha, Endro Ariyanto, Priyagung Yogitama, Ryan Wicaksono
Multipath transmission control protocol (MPTCP) has been proposed for devices with multiple network interfaces. This idea seems to be impossible for user implementation at the beginning of its proposal. However, the emergence of smartphones with multiple network access allows this idea to be implemented. This paper provides both theoretical and empirical throughput analysis of MPTCP under long term evolution (LTE) and Wi-Fi networks. First, a new modified congestion control is presented as an enhancement of standard TCP Reno using logarithmic function. Second, the existing MPTCP approaches like linked increase algorithm (LIA) and balanced LIA (BALIA) are discussed briefly. Finally, the experimental results under long term evolution (LTE) and Wi-Fi under software defined wireless networking (SDWN) are given along with the analysis. The experimental result shows that the proposed congestion control achieves higher average congestion window size. The BALIA MPTCP is shown to have higher throughput than that of the LIA MPTCP.
针对具有多个网络接口的设备,提出了多路径传输控制协议(MPTCP)。这个想法在提出之初似乎是不可能被用户实现的。然而,具有多种网络访问功能的智能手机的出现使这一想法得以实现。本文对长期演进(LTE)和Wi-Fi网络下MPTCP的吞吐量进行了理论和实证分析。首先,提出了一种改进的拥塞控制方法,作为对标准TCP Reno的对数函数增强。其次,简要讨论了现有的MPTCP算法,如链接增加算法(LIA)和平衡增加算法(BALIA)。最后给出了软件定义无线网络(SDWN)下长期演进(LTE)和Wi-Fi下的实验结果。实验结果表明,所提出的拥塞控制方法可以达到较高的平均拥塞窗口大小。BALIA MPTCP比LIA MPTCP具有更高的吞吐量。
{"title":"Modified Multipath Transmission Control Protocol Using Logarithmic Increase Under Long-Term Evolution and Wi-Fi Networks","authors":"H. Nuha, Endro Ariyanto, Priyagung Yogitama, Ryan Wicaksono","doi":"10.4018/ijitn.311828","DOIUrl":"https://doi.org/10.4018/ijitn.311828","url":null,"abstract":"Multipath transmission control protocol (MPTCP) has been proposed for devices with multiple network interfaces. This idea seems to be impossible for user implementation at the beginning of its proposal. However, the emergence of smartphones with multiple network access allows this idea to be implemented. This paper provides both theoretical and empirical throughput analysis of MPTCP under long term evolution (LTE) and Wi-Fi networks. First, a new modified congestion control is presented as an enhancement of standard TCP Reno using logarithmic function. Second, the existing MPTCP approaches like linked increase algorithm (LIA) and balanced LIA (BALIA) are discussed briefly. Finally, the experimental results under long term evolution (LTE) and Wi-Fi under software defined wireless networking (SDWN) are given along with the analysis. The experimental result shows that the proposed congestion control achieves higher average congestion window size. The BALIA MPTCP is shown to have higher throughput than that of the LIA MPTCP.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41550530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Interdisciplinary Telecommunications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1