Pub Date : 2021-12-18DOI: 10.21608/ijt.2021.266285
Mustafa Abd el rahman, Mohamed elharmel, Roshdy Abdelrasol, Mohamed Zagloul, M. Elghamry
: Positioning is very important worldwide in several fields, and it can be deter-mined by several ways. The most popular ways are Global Navigation Satellite System (GNSS) and Inertial Navigation Systems (INS). Both techniques have advantages and disadvantages. Accurate positioning is one of the privileges of GNSS, while INS overtops in indoor places, despite low accuracy after long duration. Sensibility to interference and multipath are the principal downsides of GNSS structure, which might be the two primary assets of mistakes in position estimations. The main impact of interference at (GNSS) receiver, consequently dropping its cap potential to navigate, is that it lessens the signal to noise ratio (SNR) of navigational signal such that the receiver is not able to reap measure-ments from the satellite. A comprehensive survey of interference suppression methods is presented in this paper and the interference suppression techniques are compared. Two new recommended filter designs to detect spoofing and optimize acquisition in the presence of interference are proposed.
{"title":"GNSS Interference Suppression Techniques: A Survey","authors":"Mustafa Abd el rahman, Mohamed elharmel, Roshdy Abdelrasol, Mohamed Zagloul, M. Elghamry","doi":"10.21608/ijt.2021.266285","DOIUrl":"https://doi.org/10.21608/ijt.2021.266285","url":null,"abstract":": Positioning is very important worldwide in several fields, and it can be deter-mined by several ways. The most popular ways are Global Navigation Satellite System (GNSS) and Inertial Navigation Systems (INS). Both techniques have advantages and disadvantages. Accurate positioning is one of the privileges of GNSS, while INS overtops in indoor places, despite low accuracy after long duration. Sensibility to interference and multipath are the principal downsides of GNSS structure, which might be the two primary assets of mistakes in position estimations. The main impact of interference at (GNSS) receiver, consequently dropping its cap potential to navigate, is that it lessens the signal to noise ratio (SNR) of navigational signal such that the receiver is not able to reap measure-ments from the satellite. A comprehensive survey of interference suppression methods is presented in this paper and the interference suppression techniques are compared. Two new recommended filter designs to detect spoofing and optimize acquisition in the presence of interference are proposed.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74889237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-18DOI: 10.21608/ijt.2021.266219
Youssef Fayad, M. Mostafa, Hossam Reda, K. Saad, M. Mohamed
: The COVID-19 precautions had forced us to look for different techniques that enable the continuity of our ordinary life activities, especially the sports ones. In addition, the need for accurate and fast auto judgment techniques to measure physical fitness performance is constantly emerging. The artificial intelligence (AI) with multi-resolution counter had introduced method relays on Artificial Intelligence to realize this purpose, but this method has a high processing time. Modifying the algorithm structure and the inputs features leads to low computational cost. This paper presents a modified algorithm that reduces the computational costs for the optical flow equation This reduction is executed via two techniques; the first one is to execute Gunner Franeback algorithm for number of pixels less than had been used in the previous model via selecting the more weighted pixels that closer to the central pixel, the second one is to employ Model Quantization technique by using Tensor flow Lite as a proposed model. Experimental results indicate that the proposed method has low computational cost, reliable and robust, and can be applied as practical applications. The performance of the experiments was verified by comparing its time complexity with the AI with multi-resolution counter depending on ground truth data. complexity.
{"title":"Improving Performance of the Fitness Exercises Repetitions Counter via Computational Complexity Reduction","authors":"Youssef Fayad, M. Mostafa, Hossam Reda, K. Saad, M. Mohamed","doi":"10.21608/ijt.2021.266219","DOIUrl":"https://doi.org/10.21608/ijt.2021.266219","url":null,"abstract":": The COVID-19 precautions had forced us to look for different techniques that enable the continuity of our ordinary life activities, especially the sports ones. In addition, the need for accurate and fast auto judgment techniques to measure physical fitness performance is constantly emerging. The artificial intelligence (AI) with multi-resolution counter had introduced method relays on Artificial Intelligence to realize this purpose, but this method has a high processing time. Modifying the algorithm structure and the inputs features leads to low computational cost. This paper presents a modified algorithm that reduces the computational costs for the optical flow equation This reduction is executed via two techniques; the first one is to execute Gunner Franeback algorithm for number of pixels less than had been used in the previous model via selecting the more weighted pixels that closer to the central pixel, the second one is to employ Model Quantization technique by using Tensor flow Lite as a proposed model. Experimental results indicate that the proposed method has low computational cost, reliable and robust, and can be applied as practical applications. The performance of the experiments was verified by comparing its time complexity with the AI with multi-resolution counter depending on ground truth data. complexity.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86302295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-18DOI: 10.21608/ijt.2021.266173
Ehab Ali, A. Abdelsalam, Ahmed HossamEldin
: Photovoltaics are extensively used as a premium device for generating electricity from solar planet's power. Under uniform radiation, the photovoltaics' output characteristics have a non-linear frame with a unique maximum power point. This point changes its position when a sudden change in solar radiation occurs. Otherwise, when the PV string is subjected to partial shading conditions, several power peaks have appeared with only one Global maximum power. The classical maximum power point tracking strategies always fails to deal with these dynamic difficulties, especially, under unex-pected climatic changes. Many soft computing methods are previously constructed to deal with these problems, but the main hurdles remain how to manage this tracking with the fastest time, the smallest power oscillations, and the greatest efficiency. In this paper, a modified Particle Swarm Optimization algorithm was proposed that capable of excluding or promoting certain parts of the solution search area until reach and track the max power point. The suggested method has been simulated and practically tested and the results indicate that the suggested method outperforms the typical Particle Swarm Optimization algorithm with regards to the speed of Global maximum power point tracking with the lowest oscillation and highest efficiency. (PS); Particle Swarm Optimization (PSO); Global Maximum Power Point (GMPP).
{"title":"Fast Convergence Modified Particle Swarm Optimization Al-gorithm to Follow up String PV Modules Maximum Power Point under Different Climatic Conditions","authors":"Ehab Ali, A. Abdelsalam, Ahmed HossamEldin","doi":"10.21608/ijt.2021.266173","DOIUrl":"https://doi.org/10.21608/ijt.2021.266173","url":null,"abstract":": Photovoltaics are extensively used as a premium device for generating electricity from solar planet's power. Under uniform radiation, the photovoltaics' output characteristics have a non-linear frame with a unique maximum power point. This point changes its position when a sudden change in solar radiation occurs. Otherwise, when the PV string is subjected to partial shading conditions, several power peaks have appeared with only one Global maximum power. The classical maximum power point tracking strategies always fails to deal with these dynamic difficulties, especially, under unex-pected climatic changes. Many soft computing methods are previously constructed to deal with these problems, but the main hurdles remain how to manage this tracking with the fastest time, the smallest power oscillations, and the greatest efficiency. In this paper, a modified Particle Swarm Optimization algorithm was proposed that capable of excluding or promoting certain parts of the solution search area until reach and track the max power point. The suggested method has been simulated and practically tested and the results indicate that the suggested method outperforms the typical Particle Swarm Optimization algorithm with regards to the speed of Global maximum power point tracking with the lowest oscillation and highest efficiency. (PS); Particle Swarm Optimization (PSO); Global Maximum Power Point (GMPP).","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84751608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The continuous development of modern society, science and technology has promoted the rapid development of various industries in China and greatly supported social development and people’s lives. Among them, the power system is an important part. Perfecting the power system and building a high-quality power grid system need to be focused on at present. This article mainly analyzes the necessity of applying power communication technology in smart grid and the demand of smart grid for power communication technology. Some specific application suggestions are put forward for reference.
{"title":"Research on the Application of Power Communication Technology in Smart Grid","authors":"Qian Zhou","doi":"10.18282/JNT.V2I4.1437","DOIUrl":"https://doi.org/10.18282/JNT.V2I4.1437","url":null,"abstract":"The continuous development of modern society, science and technology has promoted the rapid development of various industries in China and greatly supported social development and people’s lives. Among them, the power system is an important part. Perfecting the power system and building a high-quality power grid system need to be focused on at present. This article mainly analyzes the necessity of applying power communication technology in smart grid and the demand of smart grid for power communication technology. Some specific application suggestions are put forward for reference.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85750714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of computer network, the fully opened network has greatly changed people’s production and daily life and the traditional industries are no longer closed. However, there are also many network security problems. To deal with it, this article explores the computer applications based on management of network information security technology. It analyzes the main factors threatening network information security from the security problems caused by computer applications. Combining with the application practice, specific measures are put forward for reference.
{"title":"Research on Computer Applications Based on Management of Network Information Security Technology","authors":"Xiaofeng Ma, Norriza Hussin","doi":"10.18282/jnt.v2i3.1113","DOIUrl":"https://doi.org/10.18282/jnt.v2i3.1113","url":null,"abstract":"With the rapid development of computer network, the fully opened network has greatly changed people’s production and daily life and the traditional industries are no longer closed. However, there are also many network security problems. To deal with it, this article explores the computer applications based on management of network information security technology. It analyzes the main factors threatening network information security from the security problems caused by computer applications. Combining with the application practice, specific measures are put forward for reference.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90570270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
On the point of view of Largest Number of Node-Disjoint Path (LNNDP for short) between a node pair in a network, this article states the importance of LNNDP to global survivability of topology at first, then proposes an algorithm to compute maximal number of node-disjoint paths between node pairs. A new topology survivability metric based on LNNDP is put forward to evaluate the global survivability of network topology. It can be used to evaluate the survivability of topology provided. This metric can express accurately global topology survivability.
{"title":"Evaluating on Topology Survivability Based on Largest Number of Node-Disjoint Paths","authors":"Qiurong Chen","doi":"10.18282/jnt.v2i3.1107","DOIUrl":"https://doi.org/10.18282/jnt.v2i3.1107","url":null,"abstract":"On the point of view of Largest Number of Node-Disjoint Path (LNNDP for short) between a node pair in a network, this article states the importance of LNNDP to global survivability of topology at first, then proposes an algorithm to compute maximal number of node-disjoint paths between node pairs. A new topology survivability metric based on LNNDP is put forward to evaluate the global survivability of network topology. It can be used to evaluate the survivability of topology provided. This metric can express accurately global topology survivability.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73160680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.4018/ijitn.2020100109
Mingsheng Yin, Santiago Figueroa, J. Añorga, S. Arrizabalaga, Y. Sun
With the expansion and development of the internet protocol, the number of cybersecurity vulnerabilities has also increased. However, it is difficult to find a reliable way to detect the vulnerability in the internet-exposed asset. This paper proposes a new design of analysis platform that integrates the cybersecurity data and an internet-exposed asset search engine. Based on this design, it provides a convenient and up-to-date solution for the users to detect the devices' vulnerability crossing internet. Meanwhile, this platform offers suggestions in terms of resolving the cybersecurity problem.
{"title":"IACAP: Internet-Exposed Assets Cybersecurity Analysis Platform","authors":"Mingsheng Yin, Santiago Figueroa, J. Añorga, S. Arrizabalaga, Y. Sun","doi":"10.4018/ijitn.2020100109","DOIUrl":"https://doi.org/10.4018/ijitn.2020100109","url":null,"abstract":"With the expansion and development of the internet protocol, the number of cybersecurity vulnerabilities has also increased. However, it is difficult to find a reliable way to detect the vulnerability in the internet-exposed asset. This paper proposes a new design of analysis platform that integrates the cybersecurity data and an internet-exposed asset search engine. Based on this design, it provides a convenient and up-to-date solution for the users to detect the devices' vulnerability crossing internet. Meanwhile, this platform offers suggestions in terms of resolving the cybersecurity problem.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of science and technology, the network in human society continues to be improved and enriched, as well as the ability of database technology, which is of super cloud computing ability and extensive data sharing and brings great convenience to the whole country. But at the same time, the data that is used improperly in the network environment not only poses a certain threat to the network system, but also gradually erodes people's lives. For the computer network security problems in the era of big data, this paper first analyzes the location of the problems, and then puts forward the means to solve and prevent the security problems.
{"title":"Analysis of Computer Network Security and Preventive Measures in the Data Age","authors":"Zhi Li","doi":"10.18282/jnt.v2i1.796","DOIUrl":"https://doi.org/10.18282/jnt.v2i1.796","url":null,"abstract":"With the development of science and technology, the network in human society continues to be improved and enriched, as well as the ability of database technology, which is of super cloud computing ability and extensive data sharing and brings great convenience to the whole country. But at the same time, the data that is used improperly in the network environment not only poses a certain threat to the network system, but also gradually erodes people's lives. For the computer network security problems in the era of big data, this paper first analyzes the location of the problems, and then puts forward the means to solve and prevent the security problems.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78654521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/ijitn.2020040101
Kinjal Gala, Paul David Bryden, Christopher Paolini, Matthew Wang, Dimitrova Mihovska Albena, Mahasweta Sarkar
A leading cause of physical injury sustained by elderly persons is the event of unintentionally falling. A delay between the time of fall and the time of medical attention can exacerbate injury if the fall resulted in a concussion, traumatic brain injury, or bone fracture. The authors present a solution capable of finding and tracking, in real-time, the location of an elderly person within an indoor facility, using only existing Wi-Fi infrastructure. This paper discusses the development of an open source software framework capable of finding the location of an individual within 3m accuracy using 802.11 Wi-Fi in good coverage areas. This framework is comprised of an embedded software layer, a Web Services layer, and a mobile application for monitoring the location of individuals, calculated using trilateration, with Kalman filtering employed to reduce the effect of multipath interference. The solution provides a real-time, low cost, extendible solution to the problem of indoor geolocation to mitigate potential harm to elderly persons who have fallen and require immediate medical help.
{"title":"Real-Time Indoor Geolocation Tracking for Assisted Healthcare Facilities.","authors":"Kinjal Gala, Paul David Bryden, Christopher Paolini, Matthew Wang, Dimitrova Mihovska Albena, Mahasweta Sarkar","doi":"10.4018/ijitn.2020040101","DOIUrl":"https://doi.org/10.4018/ijitn.2020040101","url":null,"abstract":"<p><p>A leading cause of physical injury sustained by elderly persons is the event of unintentionally falling. A delay between the time of fall and the time of medical attention can exacerbate injury if the fall resulted in a concussion, traumatic brain injury, or bone fracture. The authors present a solution capable of finding and tracking, in real-time, the location of an elderly person within an indoor facility, using only existing Wi-Fi infrastructure. This paper discusses the development of an open source software framework capable of finding the location of an individual within 3m accuracy using 802.11 Wi-Fi in good coverage areas. This framework is comprised of an embedded software layer, a Web Services layer, and a mobile application for monitoring the location of individuals, calculated using trilateration, with Kalman filtering employed to reduce the effect of multipath interference. The solution provides a real-time, low cost, extendible solution to the problem of indoor geolocation to mitigate potential harm to elderly persons who have fallen and require immediate medical help.</p>","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4018/ijitn.2020040101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9876101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-01DOI: 10.4018/IJITN.2016040104
Hailong Zhao, Junyan Yi
In recent years, automatic ear recognition has become a popular research. Effective feature extraction is one of the most important steps in Content-based ear image retrieval applications. In this paper, the authors proposed a new vectors construction method for ear retrieval based on Block Discriminative Common Vector. According to this method, the ear image is divided into 16 blocks firstly and the features are extracted by applying DCV to the sub-images. Furthermore, Support Vector Machine is used as classifier to make decision. The experimental results show that the proposed method performs better than classical PCA+LDA, so it is an effective human ear recognition method.
{"title":"Combining Block DCV and Support Vector Machine for Ear Recognition","authors":"Hailong Zhao, Junyan Yi","doi":"10.4018/IJITN.2016040104","DOIUrl":"https://doi.org/10.4018/IJITN.2016040104","url":null,"abstract":"In recent years, automatic ear recognition has become a popular research. Effective feature extraction is one of the most important steps in Content-based ear image retrieval applications. In this paper, the authors proposed a new vectors construction method for ear retrieval based on Block Discriminative Common Vector. According to this method, the ear image is divided into 16 blocks firstly and the features are extracted by applying DCV to the sub-images. Furthermore, Support Vector Machine is used as classifier to make decision. The experimental results show that the proposed method performs better than classical PCA+LDA, so it is an effective human ear recognition method.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2016-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}