首页 > 最新文献

Journal of Ubiquitous Computing and Communication Technologies最新文献

英文 中文
Construction of a Framework for Selecting an Effective Learning Procedure in the School-Level Sector of Online Teaching Informatics 校级网络教学信息学领域有效学习过程选择框架的构建
Pub Date : 2022-01-17 DOI: 10.36548/jucct.2021.4.002
H. Andi
Currently, there is no way soon to stop the coronavirus epidemic that has spread over the globe. People are alarmed by its quick and widespread expansion. COVID-19's transmission chain was then broken by everyone. There was a gradual decrease in social and physical closeness. Distancing yourself from others is a way to prevent the transmission of disease. The purpose of this research is to investigate how online learning can be implemented in Tamil Nadu, India, during the COVID-19 epidemic. This research works focuses to find efficient learning procedure in eLearning protocols. The findings indicated that Google Classroom, WhatsApp, and Zoom Clouds Meeting were consecutively the most commonly utilized programs to help in remote learning. Despite this, most instructors continue to use the learning paradigm while teaching in virtual environments. Online learning and remote education are the most common methods of learning. The instructor claims that the learning model used is beneficial to their work in creating a virtual classroom since it adheres to the model's structured grammar. The experimental test has been conducted with 125 students who anonymously filled out a questionnaire and voted for more visual based eLearning. The findings show that students in distance education believed that there were more tasks than in face-to-face education. At the same time, students indicated that they spent more time studying at home than in school.
目前,没有办法很快阻止在全球蔓延的冠状病毒疫情。人们对其迅速而广泛的扩张感到震惊。COVID-19的传播链被大家打破了。社交和身体亲密度逐渐减少。与他人保持距离是防止疾病传播的一种方式。本研究的目的是调查在2019冠状病毒病流行期间如何在印度泰米尔纳德邦实施在线学习。本研究的重点是在电子学习协议中寻找有效的学习过程。研究结果表明,Google Classroom、WhatsApp和Zoom Clouds Meeting连续是最常用于帮助远程学习的程序。尽管如此,大多数教师在虚拟环境中教学时仍继续使用这种学习模式。在线学习和远程教育是最常见的学习方法。讲师声称,所使用的学习模型对他们创建虚拟教室的工作是有益的,因为它遵循模型的结构化语法。125名学生匿名填写了一份调查问卷,并投票支持更多基于视觉的在线学习。研究结果表明,远程教育的学生认为有更多的任务比面对面的教育。与此同时,学生们表示他们花在家里学习的时间比在学校的时间多。
{"title":"Construction of a Framework for Selecting an Effective Learning Procedure in the School-Level Sector of Online Teaching Informatics","authors":"H. Andi","doi":"10.36548/jucct.2021.4.002","DOIUrl":"https://doi.org/10.36548/jucct.2021.4.002","url":null,"abstract":"Currently, there is no way soon to stop the coronavirus epidemic that has spread over the globe. People are alarmed by its quick and widespread expansion. COVID-19's transmission chain was then broken by everyone. There was a gradual decrease in social and physical closeness. Distancing yourself from others is a way to prevent the transmission of disease. The purpose of this research is to investigate how online learning can be implemented in Tamil Nadu, India, during the COVID-19 epidemic. This research works focuses to find efficient learning procedure in eLearning protocols. The findings indicated that Google Classroom, WhatsApp, and Zoom Clouds Meeting were consecutively the most commonly utilized programs to help in remote learning. Despite this, most instructors continue to use the learning paradigm while teaching in virtual environments. Online learning and remote education are the most common methods of learning. The instructor claims that the learning model used is beneficial to their work in creating a virtual classroom since it adheres to the model's structured grammar. The experimental test has been conducted with 125 students who anonymously filled out a questionnaire and voted for more visual based eLearning. The findings show that students in distance education believed that there were more tasks than in face-to-face education. At the same time, students indicated that they spent more time studying at home than in school.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"8 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121217872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational Enhancements of Wearable Healthcare Devices on Pervasive Computing System 普适计算系统下可穿戴医疗设备的计算增强
Pub Date : 2020-05-27 DOI: 10.36548/jucct.2020.2.005
Subarna Shakya
The diverse user demands in the system supported with the internet of things are often managed efficiently, using the computing system that is pervasive. Pervasive computing system in an integration of heterogeneous distributed network and communication technologies and other referred as the ubiquitous computing. All though it handles the user requirement properly. The ingenuousness in the conveyance of the information, in the standard of handling and extending the heterogeneity assistance for the dispersed clients are still under construction in the as it is very challenging in the pervasive computing system. In order to provide proper and a steadfast communication for the users using an IOT based wearable health care device the paper introduces the new dispersed and elastic computing model (DECM). The developed system utilizes the recurrent-learning for the examining the allocation of resources according to the requirements as well as the allotment aspects. Based on the determined requirements of the resources, the pervasive computing system provide services to the user in the end with minimized delay and enhanced rate of communication for the health care wearable devices. The developed system emphasis also on managing the mobility, apart from allocation of resources and distribution for proper data conveyance over the wearable health care device. The working of the laid out system is determined by the experimental analysis. The constancy of the model developed is demonstrated utilizing the metrics such as the failure of request, time of response, managed and backlogged requests, bandwidth as well as storage used. The developed model heightens the number of request managed properly (handled) along with the bandwidth and storage and minimizes the failure in requests, backlogs and the time taken for response.
利用无处不在的计算系统,物联网支持的系统中多样的用户需求往往得到有效的管理。普适计算系统集成了异构分布式网络和通信技术等,称为普适计算。尽管它正确地处理了用户需求。在普适计算系统中,信息传输的巧妙性、处理的标准以及对分散客户端的异构性支持的扩展仍在建设中,这是一个非常具有挑战性的问题。为了在基于物联网的可穿戴医疗设备中为用户提供正确、稳定的通信,本文引入了一种新的分散弹性计算模型(DECM)。所开发的系统利用循环学习的方法来检查资源的需求分配和分配方面。普适计算系统根据确定的资源需求,以最小的延迟和提高的通信速率为医疗可穿戴设备最终向用户提供服务。除了资源分配和分配外,开发的系统还强调管理移动性,以便在可穿戴医疗保健设备上进行适当的数据传输。通过实验分析,确定了所布置系统的工作原理。利用诸如请求失败、响应时间、管理的和积压的请求、带宽以及使用的存储等指标来演示所开发模型的稳定性。所开发的模型增加了正确管理(处理)的请求数量以及带宽和存储,并最大限度地减少了请求失败、积压和响应时间。
{"title":"Computational Enhancements of Wearable Healthcare Devices on Pervasive Computing System","authors":"Subarna Shakya","doi":"10.36548/jucct.2020.2.005","DOIUrl":"https://doi.org/10.36548/jucct.2020.2.005","url":null,"abstract":"The diverse user demands in the system supported with the internet of things are often managed efficiently, using the computing system that is pervasive. Pervasive computing system in an integration of heterogeneous distributed network and communication technologies and other referred as the ubiquitous computing. All though it handles the user requirement properly. The ingenuousness in the conveyance of the information, in the standard of handling and extending the heterogeneity assistance for the dispersed clients are still under construction in the as it is very challenging in the pervasive computing system. In order to provide proper and a steadfast communication for the users using an IOT based wearable health care device the paper introduces the new dispersed and elastic computing model (DECM). The developed system utilizes the recurrent-learning for the examining the allocation of resources according to the requirements as well as the allotment aspects. Based on the determined requirements of the resources, the pervasive computing system provide services to the user in the end with minimized delay and enhanced rate of communication for the health care wearable devices. The developed system emphasis also on managing the mobility, apart from allocation of resources and distribution for proper data conveyance over the wearable health care device. The working of the laid out system is determined by the experimental analysis. The constancy of the model developed is demonstrated utilizing the metrics such as the failure of request, time of response, managed and backlogged requests, bandwidth as well as storage used. The developed model heightens the number of request managed properly (handled) along with the bandwidth and storage and minimizes the failure in requests, backlogs and the time taken for response.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"211 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131990969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Concept of Li-Fi on Smart Communication between Vehicles and Traffic Signals 关于车辆与交通信号之间智能通信的 Li-Fi 概念
Pub Date : 2020-05-26 DOI: 10.36548/jucct.2020.2.001
Dr. Mugunthan S. R.
Communication is an essential thing for any work to be done on desired condition. There are several ways are there to communicate between a person to a machine. Switches are made as primary communication medium to do a specific task by a machine. The advancement of technologies introduced a remote switch for operation. The advancement is still continuing with voice recognition, hand gesture movement and mind reading models. Recently machine to machine communication was introduced to communicate their status between another machine or a system for implementing smart work on its own intelligence. The paper introduces a smart communication between vehicles to traffic signals and vehicle to vehicle using Li-Fi (Light Fidelity) technology for sharing necessary information to the nearby vehicle. The paper also describes the limitations and challenges in the Li-Fi technology for further communication improvement.
要在理想的条件下完成任何工作,通信都是必不可少的。人与机器之间有多种通信方式。开关是机器完成特定任务的主要通信媒介。随着技术的进步,出现了用于操作的远程开关。语音识别、手势动作和读心模型仍在继续发展。最近,机器对机器通信被引入,用于在另一台机器或一个系统之间交流它们的状态,以实现自身智能的智能工作。本文介绍了车辆与交通信号之间以及车辆与车辆之间使用 Li-Fi(光保真)技术进行的智能通信,以便与附近的车辆共享必要的信息。论文还介绍了 Li-Fi 技术的局限性和挑战,以便进一步改进通信。
{"title":"Concept of Li-Fi on Smart Communication between Vehicles and Traffic Signals","authors":"Dr. Mugunthan S. R.","doi":"10.36548/jucct.2020.2.001","DOIUrl":"https://doi.org/10.36548/jucct.2020.2.001","url":null,"abstract":"Communication is an essential thing for any work to be done on desired condition. There are several ways are there to communicate between a person to a machine. Switches are made as primary communication medium to do a specific task by a machine. The advancement of technologies introduced a remote switch for operation. The advancement is still continuing with voice recognition, hand gesture movement and mind reading models. Recently machine to machine communication was introduced to communicate their status between another machine or a system for implementing smart work on its own intelligence. The paper introduces a smart communication between vehicles to traffic signals and vehicle to vehicle using Li-Fi (Light Fidelity) technology for sharing necessary information to the nearby vehicle. The paper also describes the limitations and challenges in the Li-Fi technology for further communication improvement.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"9 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141203033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A Methodology of Atmospheric Deterioration Forecasting and Evaluation through Data Mining and Business Intelligence 通过数据挖掘和商业智能进行大气恶化预测和评估的方法
Pub Date : 2020-05-26 DOI: 10.36548/jucct.2020.2.003
Anand J.V.
The paper emphasis on an instinctual and efficacious method to forecast and analyze the condition of different atmospheric determinants all over the world. The difficulty in the extant remedies or the apparatus is its incapability to provide a comprehensive information regarding the evaluation of the attributes of the atmosphere. The proposed methodology in the paper gathers the actual information about the atmospheric attributes such as the water, air, the forest and the tree cover etc. from the government bases and processes the collective information. The methodology does the extrication transformation load over the original collective data’s that are in its raw format. The converted information sets are imported into the database to develop a dash boards with the multiple information’s displayed on it. This allows to have an evaluated data about the various atmospheric factors. To forecast the deteriorations and the conditions of the atmospheric attributes the methodology proffered utilizes the Fuzzy C means clustering, R-studio, and the ARIMA frame work. The dash board assists the NLP enabling the end users to post their queries as input and get back the desired output. The developed deterioration forecasting and evaluation can be used in the evaluation of the conditions of atmospheric attributes for the different countries in the world.
本文强调了一种预报和分析全球不同大气决定因素状况的直观有效的方法。现有补救措施或仪器的难点在于无法提供有关大气属性评估的全面信息。本文提出的方法从政府数据库中收集有关大气属性的实际信息,如水、空气、森林和树木覆盖等,并对这些集体信息进行处理。该方法对原始格式的集体数据进行提取转换加载。转换后的信息集被导入数据库,以开发显示多种信息的仪表板。这样就可以获得有关各种大气因素的评估数据。为了预测大气属性的恶化和状况,所提出的方法利用了模糊 C 表示聚类、R-studio 和 ARIMA 框架。仪表板协助 NLP 使最终用户能够将其查询作为输入,并获得所需的输出。所开发的恶化预测和评估可用于评估全球不同国家的大气属性条件。
{"title":"A Methodology of Atmospheric Deterioration Forecasting and Evaluation through Data Mining and Business Intelligence","authors":"Anand J.V.","doi":"10.36548/jucct.2020.2.003","DOIUrl":"https://doi.org/10.36548/jucct.2020.2.003","url":null,"abstract":"The paper emphasis on an instinctual and efficacious method to forecast and analyze the condition of different atmospheric determinants all over the world. The difficulty in the extant remedies or the apparatus is its incapability to provide a comprehensive information regarding the evaluation of the attributes of the atmosphere. The proposed methodology in the paper gathers the actual information about the atmospheric attributes such as the water, air, the forest and the tree cover etc. from the government bases and processes the collective information. The methodology does the extrication transformation load over the original collective data’s that are in its raw format. The converted information sets are imported into the database to develop a dash boards with the multiple information’s displayed on it. This allows to have an evaluated data about the various atmospheric factors. To forecast the deteriorations and the conditions of the atmospheric attributes the methodology proffered utilizes the Fuzzy C means clustering, R-studio, and the ARIMA frame work. The dash board assists the NLP enabling the end users to post their queries as input and get back the desired output. The developed deterioration forecasting and evaluation can be used in the evaluation of the conditions of atmospheric attributes for the different countries in the world.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"3 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141202887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Secure Protocol for Smart Meters using IoT Enabled Distribution Networks and Blockchain Security Mechanism 使用物联网配电网络和区块链安全机制的智能电表安全协议
Pub Date : 2020-03-30 DOI: 10.36548/jucct.2020.1.006
Madhura .S, Thilak Raj L
Smart Cities, Homes and Communities are the spaces where IoT sensors are used to the fullest in the Utilities sector. Advanced Metering Infrastructure (AMI) providing the peer-to-peer communication between metering equipment that reads, calculate and provides the information related to distribution and measure the consumption. This paper outlines the network monitoring and management architecture that can be used in Smart Cities, homes and communities using the integrated IoT and Blockchain technology. Blockchain technology provides trustworthy resource monitoring of utilities for all members of the smart community that in-turn benefit the members of smart communities with enhanced monitoring and optimize the consumption of resources in protected and transparent way.
智能城市、家庭和社区是物联网传感器在公用事业领域得到最充分应用的空间。先进计量基础设施(AMI)提供计量设备之间的点对点通信,这些设备读取、计算并提供与配电和计量消费相关的信息。本文概述了可用于智能城市、家庭和社区的网络监控和管理架构,其中集成了物联网和区块链技术。区块链技术为智能社区的所有成员提供了值得信赖的公用事业资源监控,从而使智能社区的成员受益于强化的监控,并以受保护和透明的方式优化资源消耗。
{"title":"A Secure Protocol for Smart Meters using IoT Enabled Distribution Networks and Blockchain Security Mechanism","authors":"Madhura .S, Thilak Raj L","doi":"10.36548/jucct.2020.1.006","DOIUrl":"https://doi.org/10.36548/jucct.2020.1.006","url":null,"abstract":"Smart Cities, Homes and Communities are the spaces where IoT sensors are used to the fullest in the Utilities sector. Advanced Metering Infrastructure (AMI) providing the peer-to-peer communication between metering equipment that reads, calculate and provides the information related to distribution and measure the consumption. This paper outlines the network monitoring and management architecture that can be used in Smart Cities, homes and communities using the integrated IoT and Blockchain technology. Blockchain technology provides trustworthy resource monitoring of utilities for all members of the smart community that in-turn benefit the members of smart communities with enhanced monitoring and optimize the consumption of resources in protected and transparent way.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":" 0","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141220047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ELASTIC CLOUD COMPUTING APPROACH FOR BIG DATA ANALYTICS 大数据分析的弹性云计算方法
Pub Date : 2019-12-21 DOI: 10.36548/jucct.2019.2.003
Suma
The latest developments in the communication and the information technologies have turned out to be the foundationfor the emergence of the industrial developments and progress in the business causing digital transformation in the industrial andthe business operations. The clubbing of the internet and the information technology along with the tangible things that are theresponsible for the industrial operations, generate a huge set of data that requires enormous network bandwidth, high processingpower and accessible resolutions. So the paper presents the elastic cloud computing approach to bring down the complexities indeploying, cost of the groundwork and maintenance and provide an automated resource provisioning according to the demands.This method increases the amount of the computing power available, network properties and the storage. The experimentalresults for the novel elastic approach for the big data analytics is obtained by the simulation through MATLAB in terms responsetime, processing power and cost.
通信和信息技术的最新发展成为工业发展和商业进步的基础,导致工业和商业运营的数字化转型。互联网和信息技术的发展,以及负责工业运营的有形物品,产生了大量的数据,这些数据需要巨大的网络带宽、高处理能力和可访问的分辨率。因此,本文提出了弹性云计算方法,以降低部署的复杂性、基础和维护的成本,并根据需求提供自动化的资源配置。这种方法提高了可用的计算能力、网络性能和存储容量。通过MATLAB仿真,从响应时间、处理能力和成本等方面得到了大数据分析弹性方法的实验结果。
{"title":"ELASTIC CLOUD COMPUTING APPROACH FOR BIG DATA ANALYTICS","authors":"Suma","doi":"10.36548/jucct.2019.2.003","DOIUrl":"https://doi.org/10.36548/jucct.2019.2.003","url":null,"abstract":"The latest developments in the communication and the information technologies have turned out to be the foundation\u0000for the emergence of the industrial developments and progress in the business causing digital transformation in the industrial and\u0000the business operations. The clubbing of the internet and the information technology along with the tangible things that are the\u0000responsible for the industrial operations, generate a huge set of data that requires enormous network bandwidth, high processing\u0000power and accessible resolutions. So the paper presents the elastic cloud computing approach to bring down the complexities in\u0000deploying, cost of the groundwork and maintenance and provide an automated resource provisioning according to the demands.\u0000This method increases the amount of the computing power available, network properties and the storage. The experimental\u0000results for the novel elastic approach for the big data analytics is obtained by the simulation through MATLAB in terms response\u0000time, processing power and cost.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123006575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A STOCHASTIC MOBILE DATA TRAFFIC MODEL FOR VEHICULAR AD HOC NETWORKS 车辆自组织网络的随机移动数据流量模型
Pub Date : 2019-09-30 DOI: 10.36548/jucct.2019.1.006
S. Smys, J. S. Raj
Routing and mobile data traffic management is a major performance affecting issue in vehicular Ad Hoc networks (VANET). High-rise structures and such radio obstacles cause trouble in proper reception of signals when position-based routing schemes are used. Other major challenges include constrained mobility and irregular distribution of vehicular nodes. A stochastic mobile data traffic model is presented in this paper. This model offers security, reliability, safety and comfort for driving by overcoming the problems of traffic congestion, interference and jamming. It also addresses the handover (HO) issue that occurs during fast mobility. Along with this, the quality parameters of the system such as throughput, packet delivery ratio and delay are also evaluated.
路由和移动数据流量管理是影响车载自组织网络(VANET)性能的主要问题。当使用基于位置的路由方案时,高层结构和此类无线电障碍物会给信号的正确接收带来麻烦。其他主要挑战包括机动受限和车辆节点的不规则分布。提出了一种随机移动数据流量模型。这种模式克服了交通拥堵、干扰和干扰等问题,为驾驶提供了安全、可靠、安全和舒适。它还解决了在快速移动过程中发生的切换(HO)问题。同时,还对系统的吞吐量、包投递率、时延等质量参数进行了评价。
{"title":"A STOCHASTIC MOBILE DATA TRAFFIC MODEL FOR VEHICULAR AD HOC NETWORKS","authors":"S. Smys, J. S. Raj","doi":"10.36548/jucct.2019.1.006","DOIUrl":"https://doi.org/10.36548/jucct.2019.1.006","url":null,"abstract":"Routing and mobile data traffic management is a major performance affecting issue in vehicular Ad Hoc networks (VANET). High-rise structures and such radio obstacles cause trouble in proper reception of signals when position-based routing schemes are used. Other major challenges include constrained mobility and irregular distribution of vehicular nodes. A stochastic mobile data traffic model is presented in this paper. This model offers security, reliability, safety and comfort for driving by overcoming the problems of traffic congestion, interference and jamming. It also addresses the handover (HO) issue that occurs during fast mobility. Along with this, the quality parameters of the system such as throughput, packet delivery ratio and delay are also evaluated.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127783041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN 使用区块链的安全和隐私机制
Pub Date : 2019-09-23 DOI: 10.36548/jucct.2019.1.005
Suma
Block chain being a foundational technology impacting and attracting a wide range of applications has become predominant in solving the problem of privacy preserving and security in multitude sectors that is under the control of the government and the private. The paper also presents the security and the privacy mechanism using the block chain to prevent the misuse and the corruption in the sharing of huge set of data generated from the judiciary, security, legislature, commercial code registries etc. The proposed system enables reliability and the trust in the data sharing in the communication channels utilizing the block chain with the RSA digital signature. The proposed system is simulated as a java programming version to evince the enhancement in the latency in the sharing of the information’s along with the privacy and the security.
区块链作为一项影响和吸引广泛应用的基础技术,在解决政府和私人控制下的众多部门的隐私保护和安全问题方面占据主导地位。本文还介绍了使用区块链的安全性和隐私机制,以防止在司法,安全,立法,商业代码登记处等产生的大量数据共享中的滥用和腐败。该系统利用区块链和RSA数字签名实现了通信通道中数据共享的可靠性和信任度。通过对该系统的java编程仿真,验证了该系统在提高信息共享延迟的同时,提高了隐私性和安全性。
{"title":"SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN","authors":"Suma","doi":"10.36548/jucct.2019.1.005","DOIUrl":"https://doi.org/10.36548/jucct.2019.1.005","url":null,"abstract":"Block chain being a foundational technology impacting and attracting a wide range of applications has become predominant in solving the problem of privacy preserving and security in multitude sectors that is under the control of the government and the private. The paper also presents the security and the privacy mechanism using the block chain to prevent the misuse and the corruption in the sharing of huge set of data generated from the judiciary, security, legislature, commercial code registries etc. The proposed system enables reliability and the trust in the data sharing in the communication channels utilizing the block chain with the RSA digital signature. The proposed system is simulated as a java programming version to evince the enhancement in the latency in the sharing of the information’s along with the privacy and the security.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORKUSING MACHINE LEARNING 基于机器学习的电信网络Ddos攻击检测
Pub Date : 2019-09-21 DOI: 10.36548/jucct.2019.1.004
A Pasumponpandian, S. Smys
The telecommunication network that is the assemblage of the terminal nodes enables the whole to be connected. The swift progress in the telecommunication networks and the information technology has enabled a seamless connection and the capacity to store and communicate vast scale of information in the form of text and voice that are sensitive. This makes the telecommunication networks prey to multiple cyber-threats of which the DDOS (distributed denial of service) are the more predominant type of the cyber-threat causing the denial of the services to the users. So the paper utilizing the combination of the neural network and the support vector machine presents the detection and the classification method for the DDOS attacks in the telecommunication network. The performance evaluation using the network simulator-2 enables to have the enhanced detection accuracy for the proposed method.
电信网络是终端节点的集合,使整体得以连接。电信网络和信息技术的飞速发展使无缝连接成为可能,使人们能够以敏感的文本和语音形式存储和传播大量信息。这使得电信网络成为多种网络威胁的牺牲品,其中DDOS(分布式拒绝服务)是导致用户拒绝服务的更主要的网络威胁类型。因此,本文利用神经网络与支持向量机相结合的方法,提出了电信网络中DDOS攻击的检测与分类方法。利用网络模拟器-2进行性能评估,提高了该方法的检测精度。
{"title":"DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORK\u0000USING MACHINE LEARNING","authors":"A Pasumponpandian, S. Smys","doi":"10.36548/jucct.2019.1.004","DOIUrl":"https://doi.org/10.36548/jucct.2019.1.004","url":null,"abstract":"The telecommunication network that is the assemblage of the terminal nodes enables the whole to be connected. The swift progress in the telecommunication networks and the information technology has enabled a seamless connection and the capacity to store and communicate vast scale of information in the form of text and voice that are sensitive. This makes the telecommunication networks prey to multiple cyber-threats of which the DDOS (distributed denial of service) are the more predominant type of the cyber-threat causing the denial of the services to the users. So the paper utilizing the combination of the neural network and the support vector machine presents the detection and the classification method for the DDOS attacks in the telecommunication network. The performance evaluation using the network simulator-2 enables to have the enhanced detection accuracy for the proposed method.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115110489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
INTELLIGENT DEVELOPMENT OF BIG DATA ANALYTICS FOR MANUFACTURING INDUSTRY IN CLOUD COMPUTING 云计算下制造业大数据分析智能化发展
Pub Date : 2019-09-16 DOI: 10.36548/jucct.2019.1.002
A. Bashar
Big-data analytics being a useful technique in the analyzing the deeper values hidden inside a huge set of data flow that are generated in our day today lives, has almost become more prominent in variety of applications such as industrial development, smart home to smart city development and security management etc., despite its high potentials the challenges incurred makes it insufficient with certain applications that include a real time monitoring, so the paper proposes the real time monitoring of the developing manufacturing industry by proffering the intelligent big data analytics and cloud computing to present with the maximum possible insights to improvise the process of the manufacturing , by retaining the product consistency, optimal throughput and increasing the productivity.
大数据分析是一种有用的技术,可以分析隐藏在我们日常生活中产生的大量数据流中的更深层次的价值,在工业发展,智能家居到智能城市发展和安全管理等各种应用中几乎变得更加突出,尽管它具有很高的潜力,但所带来的挑战使其不足以满足某些应用,包括实时监控,因此,本文提出通过提供智能大数据分析和云计算,对发展中的制造业进行实时监控,以提供最大可能的见解,以即兴制造过程,通过保持产品一致性,最佳吞吐量和提高生产力。
{"title":"INTELLIGENT DEVELOPMENT OF BIG DATA ANALYTICS FOR MANUFACTURING INDUSTRY IN CLOUD COMPUTING","authors":"A. Bashar","doi":"10.36548/jucct.2019.1.002","DOIUrl":"https://doi.org/10.36548/jucct.2019.1.002","url":null,"abstract":"Big-data analytics being a useful technique in the analyzing the deeper values hidden inside a huge set of data flow that are generated in our day today lives, has almost become more prominent in variety of applications such as industrial development, smart home to smart city development and security management etc., despite its high potentials the challenges incurred makes it insufficient with certain applications that include a real time monitoring, so the paper proposes the real time monitoring of the developing manufacturing industry by proffering the intelligent big data analytics and cloud computing to present with the maximum possible insights to improvise the process of the manufacturing , by retaining the product consistency, optimal throughput and increasing the productivity.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116886688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
Journal of Ubiquitous Computing and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1