J. Comput. Mediat. Commun.最新文献

筛选
英文 中文
High-Accuracy Visualization-Based Grouping of MIMO Multipath Waves 基于可视化的MIMO多径波高精度分组
J. Comput. Mediat. Commun. Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.1.68-75
Emmanuel T. Trinidad, Lawrence Materum
{"title":"High-Accuracy Visualization-Based Grouping of MIMO Multipath Waves","authors":"Emmanuel T. Trinidad, Lawrence Materum","doi":"10.12720/jcm.18.1.68-75","DOIUrl":"https://doi.org/10.12720/jcm.18.1.68-75","url":null,"abstract":"Wireless multipath propagation causes different paths taken by the signal due to interacting objects present in the environment producing multipath components (MPCs). Cluster-based channel models characterize the wireless channel, and different approaches are utilized to cluster the MPCs. Data mining requires different techniques such as visualization to extract important information and find patterns and clusters in the data. A Graphical User Interface (GUI) is developed in this paper to aid the visualization and the manual clustering of MPCs using t-distributed Stochastic Neighborhood Embedding (t-SNE) and Uniform Manifold Approximation and Projection (UMAP). The clustering results of Simultaneous Clustering and Model Selection (SCAMS) are used in this paper. The datasets are embedded into low-dimensional projection and are manually re-clustered. The manual clustering was performed visually and interactively, which achieves a higher Jaccard membership index with a low value of 0.3368, a median of 0.4697, and a high value of 0.8884 for all the datasets.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"27 1","pages":"68-75"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83367245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Proposed Compact Broadband Meander Antenna for RFID Applications 一种用于RFID应用的紧凑型宽带弯曲天线
J. Comput. Mediat. Commun. Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.3.140-146
A. Al-Ka'bi
{"title":"A Proposed Compact Broadband Meander Antenna for RFID Applications","authors":"A. Al-Ka'bi","doi":"10.12720/jcm.18.3.140-146","DOIUrl":"https://doi.org/10.12720/jcm.18.3.140-146","url":null,"abstract":"Radio Frequency Identification technology aims at identifying and tracking objects labeled with tags. To achieve this goal, the need for antennas with certain characteristics and specifications becomes of great importance. In this research work, a proposed compact broadband meander antenna for Radio Frequency Identification Applications is presented. In the proposed model of the antenna, the inductive strips are bent to generate capacitive effects between them. To achieve an acceptable impedance matching at a frequency of 876MHz between the antenna and the receiving microchip of model “NXP UCODE G2XL”, shorting lines created along the antenna structure together with a T-shaped matching circuit are used. This proposed design of the antenna results in a compact size antenna (75×25×1.6mm3) with a resonance frequency that lies in theEuropean band of 867MHz, and it has an input impedance of Z = 16 - j156 Ω. The antenna is made from copper strip with a thickness of 35 μm and fabricated on an FR4 epoxy substrate with a thickness of 1.6 mm. This paper presents the proposed antenna simulation results performed in various situations and conditions. The antenna performance is investigated in terms of various aspects such as gain, radiation pattern, return loss, and input impedance.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"61 1","pages":"140-146"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89957623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Communication Digital FIR Filter for Audio Signals on the FPGA Platform 基于FPGA平台的音频信号通信数字FIR滤波器设计与实现
J. Comput. Mediat. Commun. Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.2.89-96
Mohammed Abdulzahra Ahmed Al-Dulaimi, Husam A. Wahhab, Ahmed Abdulhussein Amer
{"title":"Design and Implementation of Communication Digital FIR Filter for Audio Signals on the FPGA Platform","authors":"Mohammed Abdulzahra Ahmed Al-Dulaimi, Husam A. Wahhab, Ahmed Abdulhussein Amer","doi":"10.12720/jcm.18.2.89-96","DOIUrl":"https://doi.org/10.12720/jcm.18.2.89-96","url":null,"abstract":"Digital Signal Processing (DSP) in telecommunications is widely used for its outstanding performance. Hence, optimal results would be obtained with the sophisticated design and implementation of the digital Finite Impulse Response (FIR) filter. In this paper, the design and implementation of the FIR filter for processing the audio signal are obtained through the Field-Programmable Gate Array (FPGA) platform -Altera DE1 board. The design is divided into three primary blocks, which are the S2P Adapter block, Codec initialization block, as well as FIR filter block, which were then interfaced together; then, every block was compiled and simulated in order to obtain accurate results. The whole system was built to be functional, and finally, the frequency response was obtained. 100% significant accuracy and high quality are examined for implementing the filter in FPGA platform chip board programmed in (VHDL).","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"29 1","pages":"89-96"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85552030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Accuracy and Cluster Analysis of 5.3 GHz Indoor and 285 MHz Semi-urban MIMO LOS and NLOS Propagation Multipaths 5.3 GHz室内和285 MHz半城市MIMO LOS和NLOS传播多径精度和聚类分析
J. Comput. Mediat. Commun. Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.2.135-139
Antipas T. Teologo, Lawrence Materum
{"title":"Accuracy and Cluster Analysis of 5.3 GHz Indoor and 285 MHz Semi-urban MIMO LOS and NLOS Propagation Multipaths","authors":"Antipas T. Teologo, Lawrence Materum","doi":"10.12720/jcm.18.2.135-139","DOIUrl":"https://doi.org/10.12720/jcm.18.2.135-139","url":null,"abstract":"Over the past decade, several studies have been conducted to discover a better-performing multipath clustering technique. Developing a multipath clustering technique with better accuracy performance is a big challenge considering the varying properties of the multipath propagations that change over time. In this study, several clustering techniques have been investigated and compared to the newly-developed technique for performance analysis. Using the Jaccard score as a metric for the accuracy of grouping correctly the wireless multipaths, the performance of the different clustering techniques has been determined and compared to the newly-developed technique. The proposed clustering algorithm shows improved performance in the indoor channel scenarios but needs further investigation in the semi-urban environment.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"14 1","pages":"135-139"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88333346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimizing Data Transport Efficiency in Datacenters through Traffic Shaping of BBR Congestion Control 通过BBR拥塞控制的流量整形优化数据中心的数据传输效率
J. Comput. Mediat. Commun. Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.2.97-108
S. Ahmad, Sadia Khalid
{"title":"Optimizing Data Transport Efficiency in Datacenters through Traffic Shaping of BBR Congestion Control","authors":"S. Ahmad, Sadia Khalid","doi":"10.12720/jcm.18.2.97-108","DOIUrl":"https://doi.org/10.12720/jcm.18.2.97-108","url":null,"abstract":"Compared to commonly used loss-based congestion control algorithms predominantly used in Transmission Control Protocol (TCP) implementations, congestion-based congestion control called BBR has shown much better performance in resource-abundant modern communication links. However, for a high influx of TCP sessions on the bottleneck switch, clusters in High-Performance Compute (HPC) nodes and data centers face resource constraints because of the immense workload during orchestration and relocation of workflows across the resource pool. This article discusses how to resolve this problem, commonly known as TCP incast, through efficient queue management of the bottleneck link and adding a shaper function in the standard BBR algorithm. We analyzed TCP incast issue for two efficient versions of congestion control i.e., BBR and CUBIC (named after the cubic function used instead of linear function), in a highly overloaded convergent switch of the cluster. It is noticeable that the queuing delay and buffer build-up are two essential parameters in causing TCP Incast. Hence, we used the M/G/1/B queuing model when multiple TCP sessions generate the network traffic and different buffer build-up scenarios are analyzed in the bottleneck node of HPC clusters. Based on the findings of our queuing analysis, we propose an incast recovery BBR algorithm that introduces additional controls like Incast shaping to deal with queue build-up during TCP incast. The effects of these modifications in BBR implementation are studied in terms of performance parameters like flow completion time, throughput, RTT variations, and fairness to other competing flows are significant compared with standard BBR and CUBIC implementations.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"11 1","pages":"97-108"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87212112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensing technologies, digital inclusion, and disability diversity 传感技术、数字包容和残疾人多样性
J. Comput. Mediat. Commun. Pub Date : 2023-01-01 DOI: 10.1093/jcmc/zmad026
Sarah Nectoux, Liam Magee, K. Soldatic
{"title":"Sensing technologies, digital inclusion, and disability diversity","authors":"Sarah Nectoux, Liam Magee, K. Soldatic","doi":"10.1093/jcmc/zmad026","DOIUrl":"https://doi.org/10.1093/jcmc/zmad026","url":null,"abstract":"","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86467467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-cooperative Game Leach for Cluster Distribution Routing Method on Wireless Sensor Network (WSN) 无线传感器网络(WSN)集群分布路由方法的非合作博弈过滤
J. Comput. Mediat. Commun. Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.3.198-206
M. Asvial, Awangga Febian Surya Admaja, Muh Asnoer Laagu
{"title":"Non-cooperative Game Leach for Cluster Distribution Routing Method on Wireless Sensor Network (WSN)","authors":"M. Asvial, Awangga Febian Surya Admaja, Muh Asnoer Laagu","doi":"10.12720/jcm.18.3.198-206","DOIUrl":"https://doi.org/10.12720/jcm.18.3.198-206","url":null,"abstract":"A wireless sensor network (WSN) is a group of sensor nodes that take data with specific measurement parameters and then send the data wirelessly to a central node or server for data processing. WSN nodes are designed to be compact; therefore, the energy of sensor nodes usually depends on the integrated battery. The sensor node must work as efficiently as possible so that energy use can be more efficient and WSN life can be prolonged. The longer the lifespan of the WSN, the higher the throughput. One of the many ways to extend the life of the WSN is to use the concept of grouping nodes or the so-called cluster method. This study proposes the The Division Non-Cooperative Game LEACH (DivNCGL) routing method, a modified method based on Low Energy Adaptive Clustering Hierarchy (LEACH) by distributing cluster heads (CHs). The distribution process is performed by dividing the distribution area of the nodes into subregions. The subregion division process uses the probability value obtained by the non-cooperative game method based on the remaining active nodes, the total remaining energy, and the energy required for transmission. The simulation results, the lifespan of WSN using the DivNCGL method increases up to 30% with stable energy dissipation compared to the LEACH protocol. The increasing lifespan of the WSN also increases the amount of data transmitted, thereby increasing the received throughput. Received data increases up to 70% using the DivNCGL method compared to LEACH.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"20 1","pages":"198-206"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77137780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Traffic Models under Multiple Black hole Attack in Wireless Mesh Network 无线网状网络多重黑洞攻击下的流量模型评估
J. Comput. Mediat. Commun. Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.3.172-179
Dr. Pushpender Sarao
{"title":"Evaluation of Traffic Models under Multiple Black hole Attack in Wireless Mesh Network","authors":"Dr. Pushpender Sarao","doi":"10.12720/jcm.18.3.172-179","DOIUrl":"https://doi.org/10.12720/jcm.18.3.172-179","url":null,"abstract":"Wireless networks are the networks in which data communication is done through the wireless channels and wireless nodes. In such type of the networks, cooperation of the all nodes is required. Due to which, chances of security attacks is possible and network performance and security is badly affected. Black hole attack is a security attack comes under the active, internal as well as external attacks. In black hole attack, malicious node presents a suitable, shortest and low cost path. If the above path is selected for data transmission, malicious node drops the received packets and as a result performance of the network is degraded. In this paper, impact of Random Direction (RD) and Reference Point Group Mobility (RPGM) models have been analyzed for wireless mesh network in the presence of multiple black hole attacks. By varying the number of network connections and node density, (Ad hoc on demand distance vector) AODV routing protocol is evaluated. Normalized routing load, average end to end delay, average throughput, and total number of packets received are considered as performance metrics. Bonn-motion tool has been used to create the scenario of mobility models. In the presence of black hole attack, and under RPGM mobility model, AODV routing protocol presents better results in respect of average throughput, normalized routing load. Simulation work has been carried out on network simulator version NS-2.35.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"10 2 1","pages":"172-179"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78316760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Comparison of SOM and ACO for Travelling Salesman Problem-Case Study on the Indonesia Palapa Ring Network 旅行推销员SOM与蚁群算法的性能比较——以印尼帕拉帕环网络为例
J. Comput. Mediat. Commun. Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.2.109-115
R. Negara, Ratna Mayasari, Nana R. Syambas
{"title":"Performance Comparison of SOM and ACO for Travelling Salesman Problem-Case Study on the Indonesia Palapa Ring Network","authors":"R. Negara, Ratna Mayasari, Nana R. Syambas","doi":"10.12720/jcm.18.2.109-115","DOIUrl":"https://doi.org/10.12720/jcm.18.2.109-115","url":null,"abstract":"Indonesia is an archipelagic country separated by the sea, so it has unique characteristics. Building a telecommunications network that optimally connects Indonesia's islands is essential. Currently, telecommunications networks in Indonesia are connected using the Palapa Ring Indonesia network. Several adjacent islands must specify the closest point to choose a neighbouring route. This paper uses a travelling salesman problem (TSP) that uses the Self-Organizing Map (SOM) and Ant-Colony Optimization (ACO) algorithms to determine the shortest route and optimal computation time. Paper modification has several parameters: number of iterations, neuron size, and space. The measurement results show that SOM is better at measuring the shortest route length and computational time than ACO. By setting the number of iterations below 500 and the M value as much as the number of neurons, the route obtained by SOM will be shorter with a shorter time.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"31 1","pages":"109-115"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90913755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Lightweight Encryption Algorithm to Enhance Wireless Sensor Network Security on the Internet of Things 一种增强物联网无线传感器网络安全的轻量级加密算法
J. Comput. Mediat. Commun. Pub Date : 2023-01-01 DOI: 10.12720/jcm.18.1.47-57
Ntebatseng Mahlake, Topside E. Mathonsi, D. D. Plessis, Tonderai Muchenje
{"title":"A Lightweight Encryption Algorithm to Enhance Wireless Sensor Network Security on the Internet of Things","authors":"Ntebatseng Mahlake, Topside E. Mathonsi, D. D. Plessis, Tonderai Muchenje","doi":"10.12720/jcm.18.1.47-57","DOIUrl":"https://doi.org/10.12720/jcm.18.1.47-57","url":null,"abstract":"The Internet of Things (IoT) is an anticipated future technology that promises to connect a massive number of devices over the internet. Wireless Sensor Networks (WSNs) are regarded as one of the most essential subnetworks of the IoT. Sensor networks are being utilized by IoT to gather, monitor, and send sensitive data across wireless networks. Because the information transferred through WSNs is easily exposed to cyber-attacks, data security is critical. In WSNs, the attacker's adversary aims are to deteriorate and halt the network's effective use, as well as to interrupt network services, rendering them unreachable to the users or providing a user with false feedback. Since the users don’t have control over their data transmitted on the wireless medium or stored in the middleware, anyone with internet access can access it. This puts data confidentiality, authenticity, and integrity at risk since users with unauthorized access can easily access, alter, and manipulate data in transit. The proposed Lightweight Security Algorithm (LSA) is a hybrid algorithm created by combining the Security Protocol for Sensor Networks (SPINS) with the Secure IoT (SIT) encryption technique to improve WSN’s data security while lowering the threshold of attacks and minimize power consumption in WSNs without impacting network performance. Furthermore, the proposed LSA reduces the key generation time by 102mS thus improving the security by 99%. During data transmission, the power consumption is reduced by an average of 411.2uJ and the Packet Drop Ratio (PDR) is between 90 and 99% when comparing it with SPN and Feistel techniques.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"262 1","pages":"47-57"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75770730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信