{"title":"Performance Evaluation of Lightweight Cryptographic Algorithms for Heterogeneous IoT Environment","authors":"Mounika Jammula, V. V. Mani, Sai Krishna Kondoju","doi":"10.1142/s0219265921410310","DOIUrl":"https://doi.org/10.1142/s0219265921410310","url":null,"abstract":"Internet-of-Things (IoT) is an advanced intelligent infrastructure, which is formed by using multiple self-organizing devices. Here, the devices are utilized to examine the network and transfers the important information over internet. In this huge network, the unknown devices can create various attacks, thus the security and privacy of data is the major concerns. The major limitation in the IoT network is the devices are battery powered, so they can store low inbuilt resources. Thus, it is necessary to identify more resource optimized and security related solutions to address the problems generated in the network. In addition, the resources of the devices are consuming in higher speed due to the complex cryptography algorithms to maintain. Further, it is necessary to identify the suitable cryptography procedure for an automated IoT network along with data integrity. Therefore, this article aims to introduce the detailed survey on various cryptographic methods with their operational behavior such as asymmetric key cryptography (AKC) and symmetric key cryptography (SKC). This survey mainly focused on the cryptographic methods with respect to various attacks such as forgery and chosen-cipher text, denial of service; replay man-in-the middle, key reset, device capture and brute force attacks. Hence, the lightweight cryptography (LWC) is the prominent solution to mitigate all these attacks by using the deep learning methods and can maintain the higher security standards with the lower resource utilization in IoT environment.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Control Method of Big Data Information Flow Based on Semantic Characteristics in Cloud Computing Environment","authors":"Li Li","doi":"10.1142/s0219265921430386","DOIUrl":"https://doi.org/10.1142/s0219265921430386","url":null,"abstract":"The control of local network information flow can effectively improve the real-time and smooth transmission of network information. Therefore, a big data information flow control method based on semantic features in the cloud computing environment is proposed. In the cloud computing environment, by calculating the network big data information frame size, calculating the data frame rate adjustment series, according to the detected big data information flow rate and transmission rate, to ensure that the big data information flow transmission rate is not less than the frame rate. The big data information flow is dynamically corrected and hierarchical controlled. According to the semantic feature extraction coefficient obtained by decomposition, a threshold is selected to reconstruct the original signal of the big data information flow and remove the communication interference of the big data information flow. Referring to the idea of network link weight, when balancing network congestion, the load of each big data information flow is balanced according to the bandwidth occupancy ratio of each big data information flow, and the load of each sub flow is balanced by setting the network bandwidth occupancy ratio parameter. By setting the network bandwidth occupancy ratio parameter of big data information flow, the load of each sub flow is balanced, and the real-time control of big data information flow is realized. Experimental results show that the big data information flow control method based on semantic features in the cloud computing environment can not only reduce the noise content of big data information flow, but also improve the control speed of big data information flow, with better control performance.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124432871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Rao, K. Lakshmi, Ch. Raja, P. B. Varma, Ganga Rama Koteswara Rao, Anitha Patibandla
{"title":"Real-Time Implementation and Testing of VoIP Vocoders with Asterisk PBX Using Wireshark Packet Analyzer","authors":"R. Rao, K. Lakshmi, Ch. Raja, P. B. Varma, Ganga Rama Koteswara Rao, Anitha Patibandla","doi":"10.1142/s0219265921410309","DOIUrl":"https://doi.org/10.1142/s0219265921410309","url":null,"abstract":"In the present-day digital world, the transmission of information like voice, text, video, etc. demands more bandwidth for fast and accurate transmission. Usually, 90% of information transmitted is the human voice, and various speech processing techniques are adapted for optimizing the bandwidth requirement and enhancing the performance of multiple modules like vocoders in mobile networks. To test the performance analysis of various vocoders, we used a Wireshark simulator with an Asterisk, and it is a software implementation of a private branch exchange (PBX). This work presents the performance evolution of existing voice over internet protocol (VoIP) vocoders using Wireshark with PBX Asterisk’s, The PBX Asterisk’s to analyze and capture the packets or sniffers. The Wireshark tools can diagnose the errors, the traffic flow with a graphical view and generate the statistics in the network. It is a software tool to analyze the traffic data with an intuitive and simple graphical interface in software tools are used to study. The extensive simulations are performed, and the percentage of data saved was calculated and compared with the various vocoders.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127376953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Construction Operation Simulation Based on BIM Technology and Intelligent Robots","authors":"H. Cai","doi":"10.1142/s0219265921450055","DOIUrl":"https://doi.org/10.1142/s0219265921450055","url":null,"abstract":"In order to improve the effect of artificial intelligence technology in construction operations, this paper conducts in-depth research on the trajectory planning algorithm and servo system controller of artificial construction machinery structure, analyzes the operation system of intelligent construction structure, and establishes an error model based on the D-H rule, which provides a research basis for calibration and trajectory planning. Moreover, this paper constructs a construction operation simulation system based on BIM technology and artificial intelligence, which mainly analyzes the simulation technology of construction operation intelligent mechanism movement and construction operation. In addition, this paper combines BIM technology and artificial intelligence technology according to the actual needs of construction operations, simulate robot operations in BIM. Finally, this paper proves the effectiveness of the intelligent system proposed in this paper through experimental research.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130568748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Detection Method of Disconnection of Low Voltage Anti-Theft Transformer","authors":"Xiaowei Cai","doi":"10.1142/s0219265921430222","DOIUrl":"https://doi.org/10.1142/s0219265921430222","url":null,"abstract":"Theft of electricity is a significant loss of power sources. This fraud is mostly attributed to users’ actions such as removing the power supply, misuse of the power supply, etc. This analysis provides a way to handle the bypass and abuse of energy meters. A detection method of disconnection of low voltage anti-theft transformer (DM-DLVATT) to detect electricity theft is proposed in this research. The device architecture on a designed microcontroller’s measurement of two sensors. Although one of the new sensors controls the consumer charge’s power, the consumer has mounted the energy consumed by all modules while maintaining the device. The robbery suggests some difference between the interpreted values. There is also a temporary adjustment in the meter to restart the meter until it is altered. To recharge power products and track carbon emissions, the consumer often has remote access to electricity monitors. The device has been calculated correctly, and any effort has been made to circumvent or modify the voltage regulator. Finally, all disreputable actions using GSM technologies have been registered.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130252499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Satyanarayana, T. Mahalakshmi, P. R. K. Rao, A. Sheeba, Jampani Ravi, Dr.J.Nageswara Rao
{"title":"Enhancement of Energy Efficiency and Network Lifetime Using Modified MPCT Algorithm in Wireless Sensor Networks","authors":"P. Satyanarayana, T. Mahalakshmi, P. R. K. Rao, A. Sheeba, Jampani Ravi, Dr.J.Nageswara Rao","doi":"10.1142/s0219265921440126","DOIUrl":"https://doi.org/10.1142/s0219265921440126","url":null,"abstract":"Wireless sensor networks (WSN) allude to gathering of spatially fragmented and committed sensors for observing and documenting various physical and climatic variables like temperature, moistness and, so on. WSN is quickly growing its work in different fields like clinical, enterprises, climate following and so on. However, the sensor nodes have restricted battery life and substitution or re-energizing of these batteries in the sensor nodes is exceptionally troublesome for the most parts. Energy effectiveness is the significant worry in the remote sensor networks as it is significant for keeping up its activity. In this paper, clustering algorithms based on sensor module energy states to strengthen the network longevity of wireless sensor networks is proposed (i.e. modified MPCT algorithm) in which cluster head determination depends on the every cluster power centroid as well as power of the sensor nodes. Correspondence between cluster leader and sink module employ a parameter distance edge for lessening energy utilization. The outcome got shows a normal increment of 60% in network lifetime compared to Low energy adaptive protocol, Energy efficient midpoint initialization algorithm (EECPK-means), Park K-means algorithm and Mobility path selection protocol.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130274237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI Intelligence Chatbot to Improve Students Learning in the Higher Education Platform","authors":"Li Liu, Rama Subbareddy, C. G. Raghavendra","doi":"10.1142/s0219265921430325","DOIUrl":"https://doi.org/10.1142/s0219265921430325","url":null,"abstract":"The integrated chatbot for artificial intelligence customizes the learning experience for the students in higher education platform. The chatbot tests the answers of the students and offers insights for the students to improve their learning skills. Further, It helps to improve students’ thinking ability and expectations in higher education platform. The demanding factors for the students in the higher education platform include the need for interactive learning in a non-linear world, enhancing the thinking ability and expectations of the students. This paper proposes Artificial Intelligence Based Inquiry Evaluation Student Learning System (AI-IESLS) to increase interactive learning experience in a non-linear environment. The principal aim of this system is to improve the learning ability of the student on a specific subject using concept mapping in the chatbot. In addition, mapping has been validated for students based on the probability distribution analysis using a concept mapping. Besides, the probability graph’s curve generated by this system assesses the student’s understanding of the topic. The simulation results have been analyzed among students based on concept mapping using the AI-IESLS system in correlation with the traditional approach based on assessment ratio, feedbacks, reciprocity, timing analysis, expectation ratio, and active learning factor.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127255394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some Properties of the Balanced Hypercube","authors":"Hui-Wen Cheng, Jin-Xin Zhou","doi":"10.1142/s0219265921500249","DOIUrl":"https://doi.org/10.1142/s0219265921500249","url":null,"abstract":"As a variant of [Formula: see text], Huang and Wu in [IEEE Transactions on Computers 46 (1997) 484–490] introduced the balanced hypercube [Formula: see text] as an interconnection network topology for computing systems. In this paper, we show that [Formula: see text] is a lexicographic product of two graphs, and using this, we show that every minimum cyclic vertex-cut of [Formula: see text] isolates a 4-cycle, and prove that the edge neighbor connectivity of [Formula: see text] is [Formula: see text].","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115732629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Hadoop-Based Cloud Computing in Teaching Platform Research","authors":"Chang Liu","doi":"10.1142/s0219265921470113","DOIUrl":"https://doi.org/10.1142/s0219265921470113","url":null,"abstract":"This article explains the knowledge properties for characterization and research outcomes. It deals with developing and integrating the Hadoop cloud computing platform. The platform utilized in this paper is a one-piece learning algorithm, a statistical model and a cloud-based selection model. Hadoop supports this model, which is suitable for data size computing. We develop Cloud Computing integrated Autocorrelation Function (CCiACF) computation model based on Hadoop learning and implement an efficient teaching platform research data processing and correlation system. Multiple simulations are conducted on the Hadoop platform under various operating conditions to check the training ability’s exactness and characteristics. The Spark Structure of this research is to successfully and effectively develop computational system performance and improve teaching platform research models using Hadoop based cloud computing. Various experimental studies have been performed, and findings indicate that the method proposed is highly successful in data collection, governance and analysis.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121949905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Task Modelling of Sports Event for Personalized Video Streaming Data in Augmentative and Alternative Communication","authors":"Xiao Li, P. Manivannan, M. Anand","doi":"10.1142/s0219265921410279","DOIUrl":"https://doi.org/10.1142/s0219265921410279","url":null,"abstract":"BCI games are widely familiar and accessible for brain stimulation; however, scientific research is insufficient to justify their effectiveness. Practical BCI game implementations are desperately required in concrete situations. Neurofeedback practice proposes a task modeling of a sports event in the Augmentative and Alternative Communication (TMSE-AAC) framework. People with autism will face new intellectual, engine, compartmental, and focus difficulties, which current techniques for other people cannot overcome. The game aims to keep children’s focus beyond a level to monitor a rider looking for missing farms. To monitor the viewer’s attention, TMSE-AAC uses BCI headphones. Via a 4-week implementation study of 12 autism students, TMSE-accessibility AAC’s and user interface were assessed. Our statistical findings indicate that TMSE-AAC is superior to a consumer BCI game used only to train guidance. TMSE-AAC can help children with autism effectively engage in guidance testing sessions by increasing their concentration and decreasing anxiety. Researchers focus closely on our architecture aspects and explore future job strategies.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123223613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}