Christos Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado
Nowadays, IoT has been introduced in different aspects of our lives giving solutions to several problems, one of which is the Search and Rescue (SAR) operations. People that suffer from dementia or people with disease in the autism spectrum tend to elope from their caretaker’s attention, a fact that can lead to serious problems. Thus, a system that takes into consideration of the multiple requirements is of paramount importance. In this paper, a LoRa based SAR system is proposed in order to help in the localization of people with high risk of going missing. In contrast to most of the related systems, in this research article a different approach has been followed. Instead of focusing on the technology, in our approach a human-centered design has been used, leveraging the knowledge of Human-Computer Interaction (HCI) domain. Thus, the technologies used, are an outcome of the initial study. Finally, the system is evaluated using heuristic evaluation and questionnaires.
{"title":"Long Range Based IoT Search and Rescue System, a Human-Computer Interaction Preliminary Study and Implementation","authors":"Christos Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado","doi":"10.37256/cnc.1120231753","DOIUrl":"https://doi.org/10.37256/cnc.1120231753","url":null,"abstract":"Nowadays, IoT has been introduced in different aspects of our lives giving solutions to several problems, one of which is the Search and Rescue (SAR) operations. People that suffer from dementia or people with disease in the autism spectrum tend to elope from their caretaker’s attention, a fact that can lead to serious problems. Thus, a system that takes into consideration of the multiple requirements is of paramount importance. In this paper, a LoRa based SAR system is proposed in order to help in the localization of people with high risk of going missing. In contrast to most of the related systems, in this research article a different approach has been followed. Instead of focusing on the technology, in our approach a human-centered design has been used, leveraging the knowledge of Human-Computer Interaction (HCI) domain. Thus, the technologies used, are an outcome of the initial study. Finally, the system is evaluated using heuristic evaluation and questionnaires.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86570100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. H. Sackey, Michael Ansong, S. N. Kofie, Abdul Karim Armahy
The term Massive MIMO means, Massive multiple input multiple output also known as (large-scale antenna system, very large MIMO). Massive Multiple-Input-MultipleOutput (MIMO) is the major key technique for the future Fifth Generation (5G) of mobile wireless communication network due to its characteristics, elements and advantages. Massive MIMO will be comprised of five major elements; antennas, electronic components, network architectures, protocols and signal processing. We realize that precoding technique is a processing technique that utilizes Channel State Information Technique (CSIT) by operating on the signals before transmitting them. This technique varies base on the type of CSIT and performance criterion. Precoding technique is the last digital processing block at the transmitting side. In this paper, linear and non-linear Precoding technique was reviewed and we proposed two techniques under each that is Minimum Mean Square Error (MMSE), Block Diagonalization (BD), Tomlinson-Harashima (TH) and Dirty paper coding (DPC). Four Precoding techniques: MMSE, BD, DPC and TH were used in the studies to power consumption, energy efficiency and area throughput for single-cell and multi-cell scenarios. In comparing the proposed techniques, in terms of energy efficiency and area throughput, reuse factor (Reuse 4) performs better than other techniques when there is an imperfect CSI is used
大规模MIMO这个术语的意思是,大规模多输入多输出也被称为(大规模天线系统,超大型MIMO)。海量多输入多输出(Massive multi - input - multioutput, MIMO)由于其特点、构成要素和优势,是未来第五代(5G)移动无线通信网络的主要关键技术。大规模MIMO将由五大要素组成;天线,电子元件,网络架构,协议和信号处理。我们认识到预编码技术是利用信道状态信息技术(CSIT)在信号发送前对其进行操作的一种处理技术。这种技术根据CSIT的类型和性能标准而有所不同。预编码技术是发送端的最后一个数字处理模块。本文对线性和非线性预编码技术进行了综述,提出了最小均方误差(MMSE)、块对角化(BD)、Tomlinson-Harashima (TH)和脏纸编码(DPC)两种预编码技术。四种预编码技术:MMSE、BD、DPC和TH在研究中被用于单蜂窝和多蜂窝场景的功耗、能源效率和面积吞吐量。在比较所提出的技术时,就能源效率和面积吞吐量而言,当使用不完美的CSI时,重用因子(重用4)比其他技术表现更好
{"title":"Energy Efficient Linear and Non-Linear Precoders for Massive MIMO Systems","authors":"S. H. Sackey, Michael Ansong, S. N. Kofie, Abdul Karim Armahy","doi":"10.47277/ijcncs/8(8)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(8)1","url":null,"abstract":"The term Massive MIMO means, Massive multiple input multiple output also known as (large-scale antenna system, very large MIMO). Massive Multiple-Input-MultipleOutput (MIMO) is the major key technique for the future Fifth Generation (5G) of mobile wireless communication network due to its characteristics, elements and advantages. Massive MIMO will be comprised of five major elements; antennas, electronic components, network architectures, protocols and signal processing. We realize that precoding technique is a processing technique that utilizes Channel State Information Technique (CSIT) by operating on the signals before transmitting them. This technique varies base on the type of CSIT and performance criterion. Precoding technique is the last digital processing block at the transmitting side. In this paper, linear and non-linear Precoding technique was reviewed and we proposed two techniques under each that is Minimum Mean Square Error (MMSE), Block Diagonalization (BD), Tomlinson-Harashima (TH) and Dirty paper coding (DPC). Four Precoding techniques: MMSE, BD, DPC and TH were used in the studies to power consumption, energy efficiency and area throughput for single-cell and multi-cell scenarios. In comparing the proposed techniques, in terms of energy efficiency and area throughput, reuse factor (Reuse 4) performs better than other techniques when there is an imperfect CSI is used","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48503049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Javeed, U. MohammedBadamasi, C. Ndubuisi, F. Soomro, M. Asif
Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area
{"title":"Man in the Middle Attacks: Analysis, Motivation and Prevention","authors":"D. Javeed, U. MohammedBadamasi, C. Ndubuisi, F. Soomro, M. Asif","doi":"10.47277/ijcncs/8(7)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(7)1","url":null,"abstract":"Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44006369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, many biometric based security systems depend on the iris images for authentication because of their features and ease of use. However, storing and sharing these sensitive images through open access networks will expose them to tampering. In order to ensure the safety of the iris images, this paper presents a new tampering reveal technique based on watermarking in the transform domain. In the proposed technique, the iris region is selected and isolated using interactive segmentation process (ISA). The authentication bits have been generated from the iris region (IR) and embedded in the Slantlet transform coefficients of the remaining part of the iris image which has been named as non-iris region (NIR). The use of ISA ensures the intactness of IR because it has been excluded from the embedding process. Several experiments have been conducted to test the visual quality, capacity, payload, and the tampering reveal performance. The experiments proved the ability of the proposed technique to reveal and localize any tampering in IR, in addition, the difference between the original iris image and the watermarked iris image is imperceptible
{"title":"Tampering Reveal Technique for Iris Images","authors":"Rasha Thabit, J. Ali, Doaa Subhi","doi":"10.47277/ijcncs/8(6)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(6)1","url":null,"abstract":"Nowadays, many biometric based security systems depend on the iris images for authentication because of their features and ease of use. However, storing and sharing these sensitive images through open access networks will expose them to tampering. In order to ensure the safety of the iris images, this paper presents a new tampering reveal technique based on watermarking in the transform domain. In the proposed technique, the iris region is selected and isolated using interactive segmentation process (ISA). The authentication bits have been generated from the iris region (IR) and embedded in the Slantlet transform coefficients of the remaining part of the iris image which has been named as non-iris region (NIR). The use of ISA ensures the intactness of IR because it has been excluded from the embedding process. Several experiments have been conducted to test the visual quality, capacity, payload, and the tampering reveal performance. The experiments proved the ability of the proposed technique to reveal and localize any tampering in IR, in addition, the difference between the original iris image and the watermarked iris image is imperceptible","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43096220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This community empowerment aims to explore the natural potential of the village of Wukirsari, Sleman Regency, as well as develop the villages creative economy through ecoprint training, as a vehicle for the villages creative economy based on leaf potential. The training method using various references and empowering the community to make ecoprints was followed by 15 mothers who were representatives of the joint business group. The results of this community empowerment produce village potential namely leaves, and training approaches by studying the conditions and rural life of, with, and by village communities. The concept of the ecoprint training approach emphasizes community involvement in all activities. The community is involved in the planners and implementers of the ecoprint training program and not just as an audience in ecoprint making training. The results of the ecoprint training are expected to increase the creative economy that has the potential to be developed by villagers, as a form of participation in building village businesses, and to be able to provide welfare for the residents of their village
{"title":"Community Development Training with Eco-print Training Wukirsari Village,\u0000 Sleman District, Indonesia","authors":"T. Mardiana, A. Warsiki, Sucahyo Heriningsih","doi":"10.47277/ijcncs/8(4)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(4)1","url":null,"abstract":"This community empowerment aims to explore the natural potential of the\u0000 village of Wukirsari, Sleman Regency, as well as develop the villages\u0000 creative economy through ecoprint training, as a vehicle for the villages\u0000 creative economy based on leaf potential. The training method using various\u0000 references and empowering the community to make ecoprints was followed by 15\u0000 mothers who were representatives of the joint business group. The results of\u0000 this community empowerment produce village potential namely leaves, and\u0000 training approaches by studying the conditions and rural life of, with, and\u0000 by village communities. The concept of the ecoprint training approach\u0000 emphasizes community involvement in all activities. The community is\u0000 involved in the planners and implementers of the ecoprint training program\u0000 and not just as an audience in ecoprint making training. The results of the\u0000 ecoprint training are expected to increase the creative economy that has the\u0000 potential to be developed by villagers, as a form of participation in\u0000 building village businesses, and to be able to provide welfare for the\u0000 residents of their village","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47374924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}