首页 > 最新文献

J. Mobile Multimedia最新文献

英文 中文
An Enhance the Performance of Mining Vehicular and Machinery Security Systems Using Artificial Intelligence in VANET Cloud Computing 利用人工智能在VANET云计算中提高矿用车辆和机械安全系统的性能
Pub Date : 2022-07-18 DOI: 10.13052/jmm1550-4646.18612
M. Al-Shabi
Over the recent decades, incorporating Vehicular Ad-hoc Network (VANET) into Cloud computing plays a vital role, since it provides a reliable safety journey to vehicular drivers, passengers, etc. However, attaining security and emergency message dissemination is still major bottleneck in VANET combined Cloud, due to the dynamic nature of vehicles and wireless communication. Our major intention is to provide high level security in VANET-Cloud environment. In addition to it, we also reduce delay in emergency dissemination. Our proposed Delay aware Emergency Message Dissemination and Data Retrieval in secure (DEMD22RS) VANET-Cloud is composed of four sequential processes: Authentication, Clustering, Data Retrieval and Data dissemination. In regard to maintaining security for both Road Side Unit (RSU) and Vehicles, we propose Hash based Credential Authentication Scheme (HCAS) that affords authentication using Secure Hash Algorithm-3 (SHA-3) and Elliptic Curve Points (ECP). To sustain a stable cluster, Firm Aware Clustering Scheme (FACS) is pursued where Stud Krill Herd (SKH) algorithm is exploited. In the data retrieval process, cloud provides requested information to the RSU in encrypted form using the Twofish algorithm. RSU discover the path to deliver received data through executing Artificial Neural Network (ANN) algorithm. In order to diminish delay in emergency message dissemination, best disseminator is selected by cluster head using Fuzzy-Topsis (FT) algorithm. Our DEMD22RS VANET-Cloud network is implemented in Network Simulator 3 tool. Finally, the evaluation of DEMD22RS work performance is achieved by computing consequent metrics that are Throughput, Packet Delivery Ratio, Transmission delay, Average delay, Key generation time, Encryption time and Decryption time.
近几十年来,将车载自组织网络(VANET)整合到云计算中起着至关重要的作用,因为它为车辆驾驶员、乘客等提供了可靠的安全旅程。然而,由于车辆和无线通信的动态性,实现安全和应急信息传播仍然是VANET组合云的主要瓶颈。我们的主要目的是在VANET-Cloud环境中提供高水平的安全性。除此之外,我们还减少了紧急情况传播的延误。我们提出的延迟感知安全紧急消息传播和数据检索(DEMD22RS) VANET-Cloud由四个顺序的过程组成:认证、聚类、数据检索和数据分发。关于维护道路侧单元(RSU)和车辆的安全性,我们提出了基于哈希的凭据认证方案(HCAS),该方案使用安全哈希算法-3 (SHA-3)和椭圆曲线点(ECP)提供身份验证。为了维持稳定的集群,采用了企业感知聚类方案(FACS),其中利用了螺磷虾群(SKH)算法。在数据检索过程中,cloud使用Twofish算法将请求的信息以加密的形式提供给RSU。RSU通过执行人工神经网络(Artificial Neural Network, ANN)算法来发现接收数据的传递路径。为了减少紧急消息传播的延迟,采用模糊topsis (Fuzzy-Topsis)算法,通过簇头选择最佳传播器。我们的DEMD22RS VANET-Cloud网络是在network Simulator 3工具中实现的。最后,通过计算吞吐量、分组传送率、传输延迟、平均延迟、密钥生成时间、加密时间和解密时间等后续指标,实现对DEMD22RS工作性能的评估。
{"title":"An Enhance the Performance of Mining Vehicular and Machinery Security Systems Using Artificial Intelligence in VANET Cloud Computing","authors":"M. Al-Shabi","doi":"10.13052/jmm1550-4646.18612","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.18612","url":null,"abstract":"Over the recent decades, incorporating Vehicular Ad-hoc Network (VANET) into Cloud computing plays a vital role, since it provides a reliable safety journey to vehicular drivers, passengers, etc. However, attaining security and emergency message dissemination is still major bottleneck in VANET combined Cloud, due to the dynamic nature of vehicles and wireless communication. Our major intention is to provide high level security in VANET-Cloud environment. In addition to it, we also reduce delay in emergency dissemination. Our proposed Delay aware Emergency Message Dissemination and Data Retrieval in secure (DEMD22RS) VANET-Cloud is composed of four sequential processes: Authentication, Clustering, Data Retrieval and Data dissemination. In regard to maintaining security for both Road Side Unit (RSU) and Vehicles, we propose Hash based Credential Authentication Scheme (HCAS) that affords authentication using Secure Hash Algorithm-3 (SHA-3) and Elliptic Curve Points (ECP). To sustain a stable cluster, Firm Aware Clustering Scheme (FACS) is pursued where Stud Krill Herd (SKH) algorithm is exploited. In the data retrieval process, cloud provides requested information to the RSU in encrypted form using the Twofish algorithm. RSU discover the path to deliver received data through executing Artificial Neural Network (ANN) algorithm. In order to diminish delay in emergency message dissemination, best disseminator is selected by cluster head using Fuzzy-Topsis (FT) algorithm. Our DEMD22RS VANET-Cloud network is implemented in Network Simulator 3 tool. Finally, the evaluation of DEMD22RS work performance is achieved by computing consequent metrics that are Throughput, Packet Delivery Ratio, Transmission delay, Average delay, Key generation time, Encryption time and Decryption time.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114381303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context-aware Based Personalized Recommendation on Mobile for Monitoring Excessive Sugar Consumption of Thai Adolescents 基于情境感知的个性化手机推荐,用于监测泰国青少年的过度糖消费
Pub Date : 2022-07-18 DOI: 10.13052/jmm1550-4646.18618
Rodjana Suwan, P. Temdee, R. V. Prasad
Given the harmful effects of excessive sugar consumption, everyone should be aware of the amount of sugar they consume in daily life. Generally, managing nutrition and preventing negative effects from sugar intake requires a nutritional specialist or specialized knowledge, which may not always be readily accessible or understandable. Therefore, there is a need for a mobile application that can track excessive sugar consumption. This study proposes a context-aware personalized recommendation mobile application for monitoring excessive sugar consumption and providing individual recommendations (based on a predefined set of 144 rules) to Thai adolescents. The application is user friendly and can be used to provide recommendations to users for sugar consumption and proper exercise each day. Personal, health, and lifestyle data are collected and analyzed to provide individualized recommendations to each user. Experiments were conducted with 140 Thai adolescents aged 15 to 25 years old. Users’ preferences regarding degree of awareness in presentation style were also investigated. Users rated their satisfaction with the proposed mobile application as very high in terms of both function and personalization. In addition, fully automated recommendations were found to be the preferred degree of awareness among the test group.
考虑到过量摄入糖的有害影响,每个人都应该意识到他们在日常生活中摄入的糖量。一般来说,管理营养和防止糖摄入的负面影响需要营养专家或专业知识,这可能并不总是容易获得或理解。因此,有必要开发一款可以追踪过量糖分摄入的移动应用程序。本研究提出了一个情境感知的个性化推荐移动应用程序,用于监测过量的糖消耗,并为泰国青少年提供个性化建议(基于一组预定义的144条规则)。该应用程序是用户友好的,可以用来为用户提供建议的糖消耗和适当的锻炼,每天。收集和分析个人、健康和生活方式数据,为每个用户提供个性化的建议。实验对象为140名15至25岁的泰国青少年。用户对呈现风格的意识程度的偏好也进行了调查。在功能和个性化方面,用户对拟议的移动应用程序的满意度非常高。此外,在测试组中,发现完全自动化的推荐是首选的意识程度。
{"title":"Context-aware Based Personalized Recommendation on Mobile for Monitoring Excessive Sugar Consumption of Thai Adolescents","authors":"Rodjana Suwan, P. Temdee, R. V. Prasad","doi":"10.13052/jmm1550-4646.18618","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.18618","url":null,"abstract":"Given the harmful effects of excessive sugar consumption, everyone should be aware of the amount of sugar they consume in daily life. Generally, managing nutrition and preventing negative effects from sugar intake requires a nutritional specialist or specialized knowledge, which may not always be readily accessible or understandable. Therefore, there is a need for a mobile application that can track excessive sugar consumption. This study proposes a context-aware personalized recommendation mobile application for monitoring excessive sugar consumption and providing individual recommendations (based on a predefined set of 144 rules) to Thai adolescents. The application is user friendly and can be used to provide recommendations to users for sugar consumption and proper exercise each day. Personal, health, and lifestyle data are collected and analyzed to provide individualized recommendations to each user. Experiments were conducted with 140 Thai adolescents aged 15 to 25 years old. Users’ preferences regarding degree of awareness in presentation style were also investigated. Users rated their satisfaction with the proposed mobile application as very high in terms of both function and personalization. In addition, fully automated recommendations were found to be the preferred degree of awareness among the test group.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122028904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
B-Spot: Blockchain and Steganography based Robust and Secure Photo Transmission Mechanism B-Spot:基于区块链和隐写术的健壮和安全的照片传输机制
Pub Date : 2022-07-18 DOI: 10.13052/jmm1550-4646.18610
Dongchi Li, Pushpendu Kar
In this paper, a Steganography and Blockchain based robust and secure photo transmission mechanism, named B-Spot, is proposed. At the sender side, firstly, a 3-3-2 LSB image steganography algorithm is used to hide a secret photo into a cover photo. Therefore, the existence of the secret photo is concealed. Then the stego-image is broken down into pixels and embedded into blocks. Blocks are connected by the hash values forming a blockchain. Any modifications on the blocks are reflected by the breakage of the chain, which makes the mechanism tamper-evident. Another copy of the blockchain is stored in a hash table for the latter recovery process. The blockchain and the hash table can be transmitted via any network. When the receiver receives the data, it firstly executes the verification process to check integrity of the blockchain. Then the lost and tampered blocks are recovered by referring to the hash table, which makes the mechanism more robust to noises. Finally, the stego-image is reconstructed from the recovered blockchain. Then the receiver can obtain the secret photo following the extraction algorithm. The simulation results show that the proposed mechanism has high data capacity, better imperceptibility, reasonable computing time, and strong robustness to noise. This mechanism adds an extra layer of security and robustness to the existing schemes.
本文提出了一种基于隐写和区块链的稳健安全的图像传输机制——B-Spot。在发送端,首先使用3-3-2 LSB图像隐写算法将秘密照片隐藏为封面照片。因此,秘密照片的存在是隐藏的。然后将隐写图像分解成像素并嵌入到块中。块通过形成区块链的哈希值连接。对区块的任何修改都会通过链的断裂来反映,这使得该机制具有明显的篡改性。区块链的另一个副本存储在散列表中,以供后一个恢复过程使用。区块链和哈希表可以通过任何网络传输。接收方收到数据后,首先执行验证过程,检查区块链的完整性。然后通过引用哈希表恢复丢失和篡改的块,使机制对噪声具有更强的鲁棒性。最后,从恢复的区块链中重建隐写图像。然后,根据提取算法,接收方可以获得秘密照片。仿真结果表明,该机制具有数据容量大、不可感知性好、计算时间合理、对噪声的鲁棒性强等优点。这种机制为现有方案增加了一层额外的安全性和健壮性。
{"title":"B-Spot: Blockchain and Steganography based Robust and Secure Photo Transmission Mechanism","authors":"Dongchi Li, Pushpendu Kar","doi":"10.13052/jmm1550-4646.18610","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.18610","url":null,"abstract":"In this paper, a Steganography and Blockchain based robust and secure photo transmission mechanism, named B-Spot, is proposed. At the sender side, firstly, a 3-3-2 LSB image steganography algorithm is used to hide a secret photo into a cover photo. Therefore, the existence of the secret photo is concealed. Then the stego-image is broken down into pixels and embedded into blocks. Blocks are connected by the hash values forming a blockchain. Any modifications on the blocks are reflected by the breakage of the chain, which makes the mechanism tamper-evident. Another copy of the blockchain is stored in a hash table for the latter recovery process. The blockchain and the hash table can be transmitted via any network. When the receiver receives the data, it firstly executes the verification process to check integrity of the blockchain. Then the lost and tampered blocks are recovered by referring to the hash table, which makes the mechanism more robust to noises. Finally, the stego-image is reconstructed from the recovered blockchain. Then the receiver can obtain the secret photo following the extraction algorithm. The simulation results show that the proposed mechanism has high data capacity, better imperceptibility, reasonable computing time, and strong robustness to noise. This mechanism adds an extra layer of security and robustness to the existing schemes.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128942598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved 30 Gbps-Class Large-Capacity Packet Processing Method Using Core Isolation Technology 一种基于核心隔离技术的30gbps级大容量分组处理方法
Pub Date : 2022-07-02 DOI: 10.13052/jmm1550-4646.1862
Y. Kwon, Moonhee Son, Hoon Chang
With the spread of 5G services and the development of IoT technology, network traffic for information delivery is increasing in capacity. As network traffic increases, cyber threats also increase, resulting in an increasing importance on traffic analysis. The existing packet processing engine generates a signature by analyzing the characteristics of the attack after the occurrence of suspicious traffic, and based on this, it is difficult to properly respond to new and variant attack traffic because a manual response method is performed to detect the same attack. In addition, even during a network operation, only analysis results generated by passive filtering appear, and when abnormal or suspicious traffic is observed, the quality of the report is often affected by the analysis capability of the administrator. The packet processing method proposed in this paper applies the core isolation method to the NUMA structure applied to the existing 20 Gbps packet processing engine to increase the accessibility of the existing NUMA memory structure and lower the packet drop rate to enable high-capacity 30 Gbps traffic processing. Using the proposed processing engine, it is possible to determine the degree of possibility of abnormal traffic, preferentially by a quick analysis of suspicious traffic rather than a detailed analysis of traffic.
随着5G业务的普及和物联网技术的发展,用于信息传递的网络流量容量不断增加。随着网络流量的增加,网络威胁也随之增加,流量分析的重要性日益凸显。现有的报文处理引擎在出现可疑流量后,通过分析攻击特征来生成签名,在此基础上,由于检测同一种攻击时采用手动响应的方式,难以对新的和变型的攻击流量做出正确的响应。此外,即使在网络运行过程中,也只会出现被动过滤产生的分析结果,当观察到异常或可疑流量时,报告的质量往往会受到管理员分析能力的影响。本文提出的分组处理方法将核心隔离方法应用于现有20gbps分组处理引擎上的NUMA结构,增加了现有NUMA内存结构的可访问性,降低了丢包率,实现了高容量30gbps流量处理。使用提出的处理引擎,可以优先通过快速分析可疑流量而不是详细分析流量来确定异常流量的可能性程度。
{"title":"An Improved 30 Gbps-Class Large-Capacity Packet Processing Method Using Core Isolation Technology","authors":"Y. Kwon, Moonhee Son, Hoon Chang","doi":"10.13052/jmm1550-4646.1862","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1862","url":null,"abstract":"With the spread of 5G services and the development of IoT technology, network traffic for information delivery is increasing in capacity. As network traffic increases, cyber threats also increase, resulting in an increasing importance on traffic analysis. The existing packet processing engine generates a signature by analyzing the characteristics of the attack after the occurrence of suspicious traffic, and based on this, it is difficult to properly respond to new and variant attack traffic because a manual response method is performed to detect the same attack. In addition, even during a network operation, only analysis results generated by passive filtering appear, and when abnormal or suspicious traffic is observed, the quality of the report is often affected by the analysis capability of the administrator. The packet processing method proposed in this paper applies the core isolation method to the NUMA structure applied to the existing 20 Gbps packet processing engine to increase the accessibility of the existing NUMA memory structure and lower the packet drop rate to enable high-capacity 30 Gbps traffic processing. Using the proposed processing engine, it is possible to determine the degree of possibility of abnormal traffic, preferentially by a quick analysis of suspicious traffic rather than a detailed analysis of traffic.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132851154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STeSH: Intelligent Speech Technology Enabled Smart Home Automation Using IoT STeSH:使用物联网的智能语音技术实现智能家居自动化
Pub Date : 2022-07-02 DOI: 10.13052/jmm1550-4646.1861
S. Sahoo, S. K. Pattnaik, S. Samal, Chinmay Kumar Nayak, Jitendra Kuma Das, V. Poulkov
Due to the advancement in recent technologies and emergence of Internet of Things (IoT), Smart Home Automation (SHA) plays a vital role in today’s lifestyle. Many users are showing their keen interest to move towards this era of digital transformation in order to take the potential benefits of such intelligent and smart application. Traditional smart home systems have several limitations e.g. connectivity, coverage area, device dependability, platform supportability etc. which makes the system less sustainable. In this paper, the proposed technique introduces a novel scheme to operate the devices in an intelligent manner. The scheme implements a system named as “Speech Technology enabled Smart Home (STeSH)”, which supports voice assisted home automation with extreme security and range-free localization. The idea of the proposed technique is to integrate the power of IoT with classical home automation by using an advanced speech technology service. The entire processing of Speech Enabled Services (SES) is applied with this proposed technique and the detailed analysis is presented with proper experimental proof.
由于最近技术的进步和物联网(IoT)的出现,智能家居自动化(SHA)在当今的生活方式中起着至关重要的作用。许多用户都表现出浓厚的兴趣,希望进入这个数字化转型的时代,以利用这种智能和智能应用程序的潜在好处。传统的智能家居系统存在着连接性、覆盖范围、设备可靠性、平台可支持性等方面的限制,使得系统的可持续性较差。在本文中,该技术引入了一种以智能方式操作设备的新方案。该计划实施了一个名为“语音技术智能家居(STeSH)”的系统,该系统支持语音辅助的家庭自动化,具有极高的安全性和无距离定位。所提出的技术的思想是通过使用先进的语音技术服务,将物联网的功能与传统的家庭自动化相结合。将该技术应用于语音支持业务(SES)的整个处理过程,并进行了详细的分析和实验证明。
{"title":"STeSH: Intelligent Speech Technology Enabled Smart Home Automation Using IoT","authors":"S. Sahoo, S. K. Pattnaik, S. Samal, Chinmay Kumar Nayak, Jitendra Kuma Das, V. Poulkov","doi":"10.13052/jmm1550-4646.1861","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1861","url":null,"abstract":"Due to the advancement in recent technologies and emergence of Internet of Things (IoT), Smart Home Automation (SHA) plays a vital role in today’s lifestyle. Many users are showing their keen interest to move towards this era of digital transformation in order to take the potential benefits of such intelligent and smart application. Traditional smart home systems have several limitations e.g. connectivity, coverage area, device dependability, platform supportability etc. which makes the system less sustainable. In this paper, the proposed technique introduces a novel scheme to operate the devices in an intelligent manner. The scheme implements a system named as “Speech Technology enabled Smart Home (STeSH)”, which supports voice assisted home automation with extreme security and range-free localization. The idea of the proposed technique is to integrate the power of IoT with classical home automation by using an advanced speech technology service. The entire processing of Speech Enabled Services (SES) is applied with this proposed technique and the detailed analysis is presented with proper experimental proof.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed JPEG Compression and Decompression for Big Image Data Using Map-Reduce Paradigm 基于Map-Reduce范式的分布式JPEG大图像数据压缩和解压缩
Pub Date : 2022-07-02 DOI: 10.13052/jmm1550-4646.1863
U. Raju, Hillol Barman, R. K. Netalkar, Sanjay Kumar, Hariom Kumar
Digital data is primarily created and delivered in the form of images and videos in today’s world. Storing and transmitting such a large number of images necessitates a lot of computer resources, such as storage and bandwidth. So, rather than keeping the image data as is, the data could be compressed and then stored, which saves a lot of space. Image compression is the process of removing as much redundant data from an image as feasible while retaining only the non-redundant data. In this paper, the traditional JPEG compression technique is executed in the distributed environment with map-reduce paradigm on big image data. This technique is carried out in serial as well as in parallel fashion with different number of workers in order to show the time comparisons between these setups with the self-created large image dataset. In this, more than one Lakh (121,856) images are compressed and decompressed and the execution times are compared with three different setups: single system, Map-Reduce (MR) with 2 workers and MR with 4 workers. Compression on more than one Million (1,096,704) images using single system and MR with 4 workers is also done. To evaluate the efficiency of JPEG technique, two performance measures such as Compression Ratio (CR) and Peak Signal to Noise Ratio (PSNR) are used.
在当今世界,数字数据主要以图像和视频的形式创建和传递。存储和传输如此大量的图像需要大量的计算机资源,如存储和带宽。因此,与其保持图像数据的原样,不如将数据压缩然后存储,这样可以节省大量空间。图像压缩是从图像中删除尽可能多的冗余数据,同时只保留非冗余数据的过程。本文将传统的JPEG压缩技术应用于分布式环境下,采用map-reduce范式对大图像数据进行压缩。该技术以串行和并行的方式进行,使用不同数量的工作人员,以便显示这些设置与自创建的大型图像数据集之间的时间比较。在这个过程中,超过10万张(121,856张)图像被压缩和解压缩,执行时间在三种不同的设置下进行了比较:单系统、2个工人的Map-Reduce (MR)和4个工人的MR。使用单个系统和具有4个工人的MR对超过一百万(1,096,704)张图像进行压缩。为了评价JPEG技术的有效性,采用了压缩比(CR)和峰值信噪比(PSNR)两个性能指标。
{"title":"Distributed JPEG Compression and Decompression for Big Image Data Using Map-Reduce Paradigm","authors":"U. Raju, Hillol Barman, R. K. Netalkar, Sanjay Kumar, Hariom Kumar","doi":"10.13052/jmm1550-4646.1863","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1863","url":null,"abstract":"Digital data is primarily created and delivered in the form of images and videos in today’s world. Storing and transmitting such a large number of images necessitates a lot of computer resources, such as storage and bandwidth. So, rather than keeping the image data as is, the data could be compressed and then stored, which saves a lot of space. Image compression is the process of removing as much redundant data from an image as feasible while retaining only the non-redundant data. In this paper, the traditional JPEG compression technique is executed in the distributed environment with map-reduce paradigm on big image data. This technique is carried out in serial as well as in parallel fashion with different number of workers in order to show the time comparisons between these setups with the self-created large image dataset. In this, more than one Lakh (121,856) images are compressed and decompressed and the execution times are compared with three different setups: single system, Map-Reduce (MR) with 2 workers and MR with 4 workers. Compression on more than one Million (1,096,704) images using single system and MR with 4 workers is also done. To evaluate the efficiency of JPEG technique, two performance measures such as Compression Ratio (CR) and Peak Signal to Noise Ratio (PSNR) are used.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demystifying Blockchain in 5G and Beyond Technologies 揭秘5G及其他技术中的区块链
Pub Date : 2022-04-04 DOI: 10.13052/jmm1550-4646.18513
Keshav Kaushik
5G and beyond systems are being built to be prospective by responding to the different needs of a diverse range of applications, which represents a significant departure from this approach. Owing to its openness, encryption techniques, verifiability, integrity, and decentralized design, blockchain has evolved as an important approach. 5G and Blockchain might transform emerging technology. 5G offers consumers high speeds and QoS, while blockchain ensures peer-to-peer trust and privacy. Blockchain is a revolutionary technology having wide range of applications in various domains like Artificial Intelligence, Internet of Things (IoT), Cybersecurity, Wireless networks, 5G and beyond networks, etc. In this paper, the role of Blockchain technology in 5G and beyond networks is discussed. This paper also highlights the various challenges that acts as a hindrance while implementing the Blockchain in 5G and beyond networks. Moreover, the paper also discusses the future aspect of Blockchain in 5G networks.
5G及以后的系统正在通过响应各种应用的不同需求来构建前瞻性,这与这种方法有很大的不同。由于其开放性、加密技术、可验证性、完整性和去中心化设计,区块链已经发展成为一种重要的方法。5G和区块链可能会改变新兴技术。5G为消费者提供高速和QoS,而区块链则确保点对点信任和隐私。区块链是一项革命性的技术,在人工智能、物联网、网络安全、无线网络、5G及以上网络等各个领域都有广泛的应用。本文讨论了区块链技术在5G及以后网络中的作用。本文还强调了在5G及以后的网络中实施区块链时阻碍的各种挑战。此外,本文还讨论了区块链在5G网络中的未来发展方向。
{"title":"Demystifying Blockchain in 5G and Beyond Technologies","authors":"Keshav Kaushik","doi":"10.13052/jmm1550-4646.18513","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.18513","url":null,"abstract":"5G and beyond systems are being built to be prospective by responding to the different needs of a diverse range of applications, which represents a significant departure from this approach. Owing to its openness, encryption techniques, verifiability, integrity, and decentralized design, blockchain has evolved as an important approach. 5G and Blockchain might transform emerging technology. 5G offers consumers high speeds and QoS, while blockchain ensures peer-to-peer trust and privacy. Blockchain is a revolutionary technology having wide range of applications in various domains like Artificial Intelligence, Internet of Things (IoT), Cybersecurity, Wireless networks, 5G and beyond networks, etc. In this paper, the role of Blockchain technology in 5G and beyond networks is discussed. This paper also highlights the various challenges that acts as a hindrance while implementing the Blockchain in 5G and beyond networks. Moreover, the paper also discusses the future aspect of Blockchain in 5G networks.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved Next-Generation Radio Access Networks Using a Centralized Opto-Electronic Oscillator 使用集中式光电振荡器改进的下一代无线接入网
Pub Date : 2022-04-04 DOI: 10.13052/jmm1550-4646.1855
M. A. Ilgaz, Kristjan Vuk Baliž, B. Batagelj
Next-generation 5G and 6G radio access networks (RANs) require millimetre-wave (mm-W) oscillators to generate extremely low phase-noise signals for the frequency up-conversion and down-conversion in radio units (RUs). The opto-electronic oscillator (OEO) is an outstanding candidate for generating a high-purity mm-W signal in a centralized radio access network (C-RAN) where the distributed base-stations are dislocated from the digital units (DUs) and there are only RUs on the remote side. In this paper we propose placing an OEO in the central-office, while distributing its signal from there to multiple RU base-stations through the mobile front-haul network using a radio-over-fibre (RoF) transmission approach. This new approach was used in experiments that proved the smaller degradation of the phase noise compared to a degradation of 6 dB for the well-known frequency-doubling electrical oscillator in the RU. In addition, we present the signal-strength degradation due to fibre dispersion in mm-W signal distribution, as well as the challenges in long-term stability and multimode operation. We propose solutions to overcome these drawbacks and make our new approach useful for a centralized carrier signal distribution in next-generation RANs.
下一代5G和6G无线接入网络(ran)需要毫米波(mm-W)振荡器来产生极低的相位噪声信号,用于无线电单元(RUs)的频率上变频和下变频。光电振荡器(OEO)是在集中式无线接入网(C-RAN)中产生高纯度mm-W信号的杰出候选者,其中分布式基站与数字单元(du)错位,并且远程侧只有RUs。在本文中,我们建议在中央局放置一个OEO,同时使用光纤无线电(RoF)传输方法,通过移动前端传输网络将其信号从那里分发到多个RU基站。这种新方法在实验中得到了应用,证明了与RU中众所周知的倍频电子振荡器的6 dB衰减相比,相位噪声的衰减更小。此外,我们还提出了在mm-W信号分布中由于光纤色散导致的信号强度下降,以及在长期稳定性和多模操作方面的挑战。我们提出了克服这些缺点的解决方案,并使我们的新方法对下一代ran中的集中载波信号分配有用。
{"title":"Improved Next-Generation Radio Access Networks Using a Centralized Opto-Electronic Oscillator","authors":"M. A. Ilgaz, Kristjan Vuk Baliž, B. Batagelj","doi":"10.13052/jmm1550-4646.1855","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1855","url":null,"abstract":"Next-generation 5G and 6G radio access networks (RANs) require millimetre-wave (mm-W) oscillators to generate extremely low phase-noise signals for the frequency up-conversion and down-conversion in radio units (RUs). The opto-electronic oscillator (OEO) is an outstanding candidate for generating a high-purity mm-W signal in a centralized radio access network (C-RAN) where the distributed base-stations are dislocated from the digital units (DUs) and there are only RUs on the remote side. In this paper we propose placing an OEO in the central-office, while distributing its signal from there to multiple RU base-stations through the mobile front-haul network using a radio-over-fibre (RoF) transmission approach. This new approach was used in experiments that proved the smaller degradation of the phase noise compared to a degradation of 6 dB for the well-known frequency-doubling electrical oscillator in the RU. In addition, we present the signal-strength degradation due to fibre dispersion in mm-W signal distribution, as well as the challenges in long-term stability and multimode operation. We propose solutions to overcome these drawbacks and make our new approach useful for a centralized carrier signal distribution in next-generation RANs.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129876358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Design of FANET Routing Protocol Aided 5G Communication Using IoT 一种基于物联网的辅助5G通信的FANET路由协议设计
Pub Date : 2022-04-04 DOI: 10.13052/jmm1550-4646.1851
I. Khan, Asrin Abdollahi, Abdul Jamil, Bisma Baig, M. A. Aziz, F. Subhan
Flying-Thing is a new promising area, while in last few years Unmanned Aerial Vehicles are emerged. UAVs are very efficient in completing tasks also organizing ad hoc behaviour of networks, thus making flying ad hoc networks. The formation of aerial nodes is not feasible until we use Mobility models for communication between UAV’s. Mobile ad hoc networks & wireless sensor networks are mostly static in behaviour but UAVs are dynamic and deployed in sky using mobility models. In flying ad hoc networks effective communication can be made possible using 5G networks while designing routing protocols. In this paper a comprehensive study is formally introduced covering routing protocols used in flying ad hoc networks, mobility models, heuristic computations, architecture and optimization techniques for improving parameters in flying ad hoc networks. This paper reflects and explains future challenges and help scientists, Researchers to discover more research gaps that have been discussed in the literature and need more investigation. Also, different applications of flying things can be used in IoT based forestry which includes forest mapping, management where optimal results can be obtained. The uniqueness of this research study is to provide heuristic computational algorithm called AntHocNet, Mobility models, drawbacks of traditional technologies, flying-things architecture will be the core interest of this research study.
飞行器是一个很有前途的新领域,而无人机是近几年出现的。无人机在完成任务和组织网络的自组织行为方面非常高效,从而形成飞行自组织网络。在采用机动性模型进行无人机间通信之前,空中节点的形成是不可实现的。移动自组织网络和无线传感器网络在行为上大多是静态的,但无人机是动态的,并使用移动模型部署在天空中。在飞行自组织网络中,可以在设计路由协议时使用5G网络实现有效通信。本文正式介绍了飞行自组织网络中使用的路由协议、移动模型、启发式计算、结构和优化技术,以改善飞行自组织网络中的参数。这篇论文反映和解释了未来的挑战,并帮助科学家,研究人员发现更多的研究差距,这些差距已经在文献中讨论过,需要更多的调查。此外,飞行物的不同应用可以用于基于物联网的林业,包括森林测绘,管理,可以获得最佳结果。本研究的独特之处在于提供启发式计算算法AntHocNet,机动性模型、传统技术的弊端、飞行器架构将是本研究的核心兴趣。
{"title":"A Novel Design of FANET Routing Protocol Aided 5G Communication Using IoT","authors":"I. Khan, Asrin Abdollahi, Abdul Jamil, Bisma Baig, M. A. Aziz, F. Subhan","doi":"10.13052/jmm1550-4646.1851","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1851","url":null,"abstract":"Flying-Thing is a new promising area, while in last few years Unmanned Aerial Vehicles are emerged. UAVs are very efficient in completing tasks also organizing ad hoc behaviour of networks, thus making flying ad hoc networks. The formation of aerial nodes is not feasible until we use Mobility models for communication between UAV’s. Mobile ad hoc networks & wireless sensor networks are mostly static in behaviour but UAVs are dynamic and deployed in sky using mobility models. In flying ad hoc networks effective communication can be made possible using 5G networks while designing routing protocols. In this paper a comprehensive study is formally introduced covering routing protocols used in flying ad hoc networks, mobility models, heuristic computations, architecture and optimization techniques for improving parameters in flying ad hoc networks. This paper reflects and explains future challenges and help scientists, Researchers to discover more research gaps that have been discussed in the literature and need more investigation. Also, different applications of flying things can be used in IoT based forestry which includes forest mapping, management where optimal results can be obtained. The uniqueness of this research study is to provide heuristic computational algorithm called AntHocNet, Mobility models, drawbacks of traditional technologies, flying-things architecture will be the core interest of this research study.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130000454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Impact of LoRA and 5G on Smart Manufacturing from Automation Perspective 自动化视角下LoRA和5G对智能制造的影响
Pub Date : 2022-04-04 DOI: 10.13052/jmm1550-4646.1852
Muhammad Ayoub Kamal, M. Alam, Aznida Abu Bakar Sajak, M. M. Su’ud
The Industrial Internet of Things (IIoT), also known as Industry 4.0, is a forward-thinking industrial era in which numerous developing technologies are combined to produce digital solutions. In industrial enterprises, Industry 4.0 technologies are separated into base and front-end technologies. Cloud computing, IoT, analytics, and big data are all essential technologies. In this article, we evaluate the current landscape of factory automation and the influence of 5G and LoRA communication on smart manufacturing automation, while front-end technologies are split into four categories: smart goods, smart working, smart manufacturing, and smart supply chain. First, we looked at the idea of Industry 4.0, as well as the four front-end dimensions and four basic technological components. Second, we spoke about smart industrial automation and the influence of 5G and LoRA communication. The broad use of front-end technology, of which Smart Manufacturing is a crucial component, is required for Industry 4.0 to succeed. However, the implementation of the foundation technologies is difficult. Current automation standards will serve as a solid foundation for future smart manufacturing systems. The distribution, adoption, and development of relevant morality in a requirement-driven process may result in faster, deeper, and bigger implementation of smart industrial automation.
工业物联网(IIoT),也被称为工业4.0,是一个具有前瞻性的工业时代,在这个时代,许多发展中的技术相结合,产生了数字解决方案。在工业企业中,工业4.0技术分为基础技术和前端技术。云计算、物联网、分析和大数据都是必不可少的技术。在本文中,我们评估了工厂自动化的现状以及5G和LoRA通信对智能制造自动化的影响,而前端技术分为四类:智能商品,智能工作,智能制造和智能供应链。首先,我们研究了工业4.0的概念,以及四个前端维度和四个基本技术组件。其次,我们谈到了智能工业自动化以及5G和LoRA通信的影响。前端技术的广泛应用是工业4.0取得成功所必需的,而智能制造是前端技术的关键组成部分。然而,基础技术的实施是困难的。目前的自动化标准将为未来的智能制造系统奠定坚实的基础。在需求驱动的过程中,相关道德的分布、采用和发展可能会导致智能工业自动化更快、更深、更大的实现。
{"title":"Impact of LoRA and 5G on Smart Manufacturing from Automation Perspective","authors":"Muhammad Ayoub Kamal, M. Alam, Aznida Abu Bakar Sajak, M. M. Su’ud","doi":"10.13052/jmm1550-4646.1852","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1852","url":null,"abstract":"The Industrial Internet of Things (IIoT), also known as Industry 4.0, is a forward-thinking industrial era in which numerous developing technologies are combined to produce digital solutions. In industrial enterprises, Industry 4.0 technologies are separated into base and front-end technologies. Cloud computing, IoT, analytics, and big data are all essential technologies. In this article, we evaluate the current landscape of factory automation and the influence of 5G and LoRA communication on smart manufacturing automation, while front-end technologies are split into four categories: smart goods, smart working, smart manufacturing, and smart supply chain. First, we looked at the idea of Industry 4.0, as well as the four front-end dimensions and four basic technological components. Second, we spoke about smart industrial automation and the influence of 5G and LoRA communication. The broad use of front-end technology, of which Smart Manufacturing is a crucial component, is required for Industry 4.0 to succeed. However, the implementation of the foundation technologies is difficult. Current automation standards will serve as a solid foundation for future smart manufacturing systems. The distribution, adoption, and development of relevant morality in a requirement-driven process may result in faster, deeper, and bigger implementation of smart industrial automation.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"3 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131943362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
J. Mobile Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1