Int. J. Interdiscip. Telecommun. Netw.最新文献

筛选
英文 中文
Method of Combining Cryptography and LDPC Coding for Enhanced Privacy 结合密码学和LDPC编码增强隐私的方法
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-10-01 DOI: 10.4018/ijitn.2021100105
B. Comar
{"title":"Method of Combining Cryptography and LDPC Coding for Enhanced Privacy","authors":"B. Comar","doi":"10.4018/ijitn.2021100105","DOIUrl":"https://doi.org/10.4018/ijitn.2021100105","url":null,"abstract":"This paper describes a method of combining cryptographic encoding and low density parity check (LDPC) encoding for the purpose of enhancing privacy. This method uses pseudorandom number generators (PRNGs) to create parity check matrices that are constantly updated. The generated cyphertext is at least as private as a standard additive (XORing) cryptosystem, and also has error correcting capability. The eavesdropper, Eve, has the expanded burden of having to perform cryptanalysis and error correction simultaneously.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122592112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Low Complexity Non-Distortion Clipping Technique PAPR Reduction of MIMO-OFDM Systems 一种降低MIMO-OFDM系统PAPR的低复杂度无失真裁剪技术
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-10-01 DOI: 10.4018/ijitn.2021100102
Tahreer Mahmood, S. Mohan
{"title":"A Low Complexity Non-Distortion Clipping Technique PAPR Reduction of MIMO-OFDM Systems","authors":"Tahreer Mahmood, S. Mohan","doi":"10.4018/ijitn.2021100102","DOIUrl":"https://doi.org/10.4018/ijitn.2021100102","url":null,"abstract":"Amplitude clipping is one of the techniques used to reduce PAPR. This technique does not demand side information; therefore, there is no reduction in the system's data throughput. However, it leads to additional distortion (in-band signal distortion and out-of-band radiation). To overcome this problem, low complexity non-distortion clipping technique is proposed for MIMO-OFDM system. The main concept of this proposed method is how to convert the generated distortion (in-band and out-of-band signals distortion) when using clipping at transmitter to impulse noise (error), which is possible by using a simple coding technique to cover error at the receiver. The proposed method does not clip the signal in time domain. The clipping use for discrete samples directly after IFFT. Simulation outcome detects that the proposed non-distortion clipping technique provides an efficient reduction in PAPR, best performance compared with conventional clipping technique, and less cost and complexity.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125830174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experiential Cyber Education 体验式网络教育
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-10-01 DOI: 10.4018/ijitn.2021100107
Edward J. Glantz, M. Nasereddin, D. Fusco, Devin Kachmar
{"title":"Experiential Cyber Education","authors":"Edward J. Glantz, M. Nasereddin, D. Fusco, Devin Kachmar","doi":"10.4018/ijitn.2021100107","DOIUrl":"https://doi.org/10.4018/ijitn.2021100107","url":null,"abstract":"There is a gap between available cyber professionals with necessary skills and experience to meet industry requirements. Institutions of higher education (IHE)—as well as other programs—have begun increasing course and degree offerings to help educate, train, and even retrain working professionals to close this gap. Of growing importance are tools and techniques to supplement theoretical development with accelerated experiential cyber training. Fortunately, there has been an increase in providers offering these services, although they vary substantially in features, costs, and opportunities. The purpose of this research is to identify a current spectrum of vendors and opportunities providing hands-on cyber training. The authors of this paper include cyber faculty at a university offering undergraduate and master's cybersecurity degrees. Both degrees are offered to resident as well as online students.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128938528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling 5G and IoT: In Search of More Spectrum for Connected Devices 启用5G和物联网:为连接设备寻找更多频谱
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-10-01 DOI: 10.4018/ijitn.2021100101
E. Some, B. Boots, Gregory Gondwe
{"title":"Enabling 5G and IoT: In Search of More Spectrum for Connected Devices","authors":"E. Some, B. Boots, Gregory Gondwe","doi":"10.4018/ijitn.2021100101","DOIUrl":"https://doi.org/10.4018/ijitn.2021100101","url":null,"abstract":"The internet of things (IoT) is the notion of all devices and products being connected to the internet rather than only computers and mobile devices, as has been the case until the recent past. The IoT is already booming, and its adoption will only accelerate in coming years. At the same time, the world continues to go wireless. Wired internet and telephone connections are becoming rarer with each passing year, and consumers expect and demand wireless communications more and more. One critical enabling technology for the IoT is wireless communications: IP-cameras, printers, kitchen appliances, and more deliver greater flexibility in their design when they do not need a wired connection to access the internet. In this paper, a flexible spectrum management framework to enable greater innovation, investment, and flexibility in IoT products, as well as the necessary architecture that will enable a wider deployment of IoT is proposed. An illustration and analogy from the success of the unlicensed bands used for Wi-Fi technology, and the accompanying supporting organizations that enable Wi-Fi's success are drawn.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131924671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-Time V2V Communication With a Machine Learning-Based System for Detecting Drowsiness of Drivers 基于机器学习系统的实时V2V通信,用于检测驾驶员的困倦状态
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-10-01 DOI: 10.4018/ijitn.2021100104
A. Awad, S. Mohan
{"title":"Real-Time V2V Communication With a Machine Learning-Based System for Detecting Drowsiness of Drivers","authors":"A. Awad, S. Mohan","doi":"10.4018/ijitn.2021100104","DOIUrl":"https://doi.org/10.4018/ijitn.2021100104","url":null,"abstract":"This article applies machine learning to detect whether a driver is drowsy and alert the driver. The drowsiness of a driver can lead to accidents resulting in severe physical injuries, including deaths, and significant economic losses. Driver fatigue resulting from sleep deprivation causes major accidents on today's roads. In 2010, nearly 24 million vehicles were involved in traffic accidents in the U.S., which resulted in more than 33,000 deaths and over 3.9 million injuries, according to the U.S. NHTSA. A significant percentage of traffic accidents can be attributed to drowsy driving. It is therefore imperative that an efficient technique is designed and implemented to detect drowsiness as soon as the driver feels drowsy and to alert and wake up the driver and thereby preventing accidents. The authors apply machine learning to detect eye closures along with yawning of a driver to optimize the system. This paper also implements DSRC to connect vehicles and create an ad hoc vehicular network on the road. When the system detects that a driver is drowsy, drivers of other nearby vehicles are alerted.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128806067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Optimized Bandwidth Estimation for Adaptive Video Streaming Systems Using WLBWO Algorithm 基于WLBWO算法的自适应视频流系统优化带宽估计
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-07-01 DOI: 10.4018/IJITN.2021070107
S. Agal, P. Gokani
{"title":"An Optimized Bandwidth Estimation for Adaptive Video Streaming Systems Using WLBWO Algorithm","authors":"S. Agal, P. Gokani","doi":"10.4018/IJITN.2021070107","DOIUrl":"https://doi.org/10.4018/IJITN.2021070107","url":null,"abstract":"The increasing popularity of streaming video is a cause of concern for the stability of the internet because most streaming video content is currently delivered via UDP without any end-to-end congestion control. Since the internet relies on end systems implementing transmit rate regulation, there has recently been significant interest in congestion control mechanisms that are both fair to TCP and effective in delivering real-time streams. Streaming video over the internet requires dealing with bandwidth and delay that vary over time. Many video streaming applications address this problem by adapting the quality of the scalable video. But it produces poor quality service, and sending data on this channel results in buffering time. To trounce these issues, this paper proposed optimized bandwidth estimation for adaptive video streaming systems using the WLBWO algorithm. Originally, the input video is compressed by using the UHE algorithm. Next, the system proposes a KEECC to securely transfer the data. Then, the encrypted data is sent to the receiver via a multipath channel. Before sending the data to the receiver, the bandwidth is estimated by using the WLBWO. Finally, the inverse process is performed. Extensive experimental results showed the effectiveness of the proposed system than conventional methods.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transmit Power and Rate Control for Spatial Reuse in Dense Wireless LANs 密集无线局域网空间复用的发射功率和速率控制
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-07-01 DOI: 10.4018/IJITN.2021070102
M. Knitter, R. Kays, W. Endemann
{"title":"Transmit Power and Rate Control for Spatial Reuse in Dense Wireless LANs","authors":"M. Knitter, R. Kays, W. Endemann","doi":"10.4018/IJITN.2021070102","DOIUrl":"https://doi.org/10.4018/IJITN.2021070102","url":null,"abstract":"Spatial reuse is an approach to better utilize the wireless medium in dense networks. In contrast to time multiplexed channel access, the idea is to allow a certain level of interference between parallel transmitting links. Depending on transmit power and rate settings, such parallel transmissions may result in increased overall system performance. This paper presents a systematic approach to model dense networks and optimize transmit power and rate settings for best total system performance. It discusses driving factors and limitations for spatial reuse. The paper introduces two algorithms for concurrent optimal transmit power and rate selection. System simulations using a fading channel model compare the performance of the algorithms against CSMA/CA. The simulation results show that average system performance can be increased by 100% and more.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134244968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Conceptual Modeling of an IP Phone Communication System: A Case Study IP电话通信系统的概念建模:一个案例研究
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-07-01 DOI: 10.4018/IJITN.2021070106
S. Al-Fedaghi, Ghadeer Aldamkhi
{"title":"Conceptual Modeling of an IP Phone Communication System: A Case Study","authors":"S. Al-Fedaghi, Ghadeer Aldamkhi","doi":"10.4018/IJITN.2021070106","DOIUrl":"https://doi.org/10.4018/IJITN.2021070106","url":null,"abstract":"In computing, a network generally denotes devices, often referred to as nodes, connected by links. Networks that are modeled with diagrams consist of hundreds of symbols, images, pictures, and icons, such as a computer, a server rack, or a cloud-based storage system. Network representations provide valuable insights into understanding the systems' underlying structures and mechanisms. Nevertheless, this unusually large number of superficial symbols and icons reflects a need for more systematic representations of the interiority of nodes. To give uniformity to this cascade of notions of basic units of nodes in network diagrams, the authors propose adoption of a new modeling methodology, called a thinging (abstract) machine (TM) (abstract machine of things) that represents all notions as a single diagrammatic machine. Because of the large number of network types, in this paper, they specifically and without loss of generality focus on IP telephone (internet protocol telephone) networks to exemplify communication networks. A real case study of IP telephone networks is modeled using TM.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125837529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Design, Implementation, and Analysis of Vertical Handoff Decision Algorithm 垂直切换决策算法的设计、实现与分析
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-07-01 DOI: 10.4018/IJITN.2021070103
S. Goutam, S. Unnikrishnan
{"title":"Design, Implementation, and Analysis of Vertical Handoff Decision Algorithm","authors":"S. Goutam, S. Unnikrishnan","doi":"10.4018/IJITN.2021070103","DOIUrl":"https://doi.org/10.4018/IJITN.2021070103","url":null,"abstract":"The increasing use of mobile communication and computing has made accurate and efficient methods of executing vertical handoff a necessity. This research paper captures the design and implementation of an effectual algorithm for making decision for vertical handoff based on fuzzy logic. The input parameters considered are bandwidth, battery status, and cost. The authors present analysis of the handover value, which gives the handoff decision, in relation to the input attributes, using regression analysis, correlation analysis, and ANOVA.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121302955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the Physical Layer in the OFDM-Based Internet of Things (IoT) by Using Frequency Hopping Technique 基于ofdm的物联网(IoT)物理层的跳频保护
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2021-07-01 DOI: 10.4018/IJITN.2021070105
Ali Alsadi, S. Mohan
{"title":"Securing the Physical Layer in the OFDM-Based Internet of Things (IoT) by Using Frequency Hopping Technique","authors":"Ali Alsadi, S. Mohan","doi":"10.4018/IJITN.2021070105","DOIUrl":"https://doi.org/10.4018/IJITN.2021070105","url":null,"abstract":"The physical layer security in the context of the internet of things is still one of the challenges due to the resource constraints of the end terminals and the IoT network heterogeneity. Although it has been adopted by different wireless applications due to its high spectral efficiency, the OFDM physical layer remains a challenge. The frequency hopping technique is used to protect the nodes from jamming and eavesdropping attacks. The cyclic prefix manipulation has been simulated against different time-delayed paths and the simulated results compared to the theoretical ones. The comparison shows a close match and the guard width encryption mechanism worked as desired.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116995925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信