2019 International Symposium on Networks, Computers and Communications (ISNCC)最新文献

筛选
英文 中文
Number Analysis and Operator Detection in Telecommunication Systems 电信系统中的号码分析与话务员检测
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909154
Murat Berk, Onder Aycicek, Ismail Ay, Seda Gonenc, S. Tosun
{"title":"Number Analysis and Operator Detection in Telecommunication Systems","authors":"Murat Berk, Onder Aycicek, Ismail Ay, Seda Gonenc, S. Tosun","doi":"10.1109/ISNCC.2019.8909154","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909154","url":null,"abstract":"In telecommunication systems, if there is a call (voice or short message) from one operator to another, the called number must be analyzed to determine its destination operator and to check if it has enough credit to start this call. This process must be very fast to reduce the switching cost of the call. Considering the dynamically updated number portability list and bulk calls, the number analysis process may take too much time, resulting in call drops. In this study, we present a number analysis system that is developed in order to start bulk calls in the fastest way. The developed system is able to detect the operators of the numbers by scanning both the continuously updated number potability list and the number data base having a large number of entries. In our experiments, we compared the proposed method with the classical relational database inquiry methods in terms of response times. We achieved 177X speed up for the analysis of thousand numbers. Reducing the number analysis times brought significant reductions in forwarding costs.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127482135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Matching-Theoretic Approach to Distributed SWIPT in Ad-Hoc Wireless Networks Ad-Hoc无线网络中分布式SWIPT的匹配理论研究
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909121
M. W. Baidas, Masoud M. Afghah, F. Afghah
{"title":"A Matching-Theoretic Approach to Distributed SWIPT in Ad-Hoc Wireless Networks","authors":"M. W. Baidas, Masoud M. Afghah, F. Afghah","doi":"10.1109/ISNCC.2019.8909121","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909121","url":null,"abstract":"This paper studies the problem of stable node matching for distributed simultaneous wireless information and power transfer in multi-user amplify-and-forward (AF) ad-hoc wireless networks. Particularly, each source node aims to be paired with another node that acts an AF relay to forward its signal to the destination, such that the achievable rate is improved, in return for some payment. In turn, a matching-theoretic solution based on the one-to-one Stable Marriage Matching game is considered, and a distributed polynomial-time complexity algorithm is proposed to pair each source node with its best potential relaying node based on the power-splitting ratios. Simulation results are presented to validate the proposed matching algorithm, and show that it yields sum-utility and sum-payment that are comparable to those of centralized schemes, with the added merits of low-complexity, and network stability.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131191553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Employing a Continuous Measurement Process During Digital Tool Validation 在数字工具验证过程中采用连续测量过程
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909102
Nicolas Hughes, Khaled Rabieh, A. Aydogan
{"title":"Employing a Continuous Measurement Process During Digital Tool Validation","authors":"Nicolas Hughes, Khaled Rabieh, A. Aydogan","doi":"10.1109/ISNCC.2019.8909102","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909102","url":null,"abstract":"As digital forensic laboratories face regulation and seek accreditation, examiners must fully validate the software and hardware used during forensic analysis. Tool validation is critical to any laboratory science as it provides analysts the empirical data necessary to draw conclusions about how laboratory instruments perform in realistic conditions. While digital forensic tools perform many common tasks, few robust validation methods exist for evaluating how tools perform those tasks. Developing validation methods that are feasible and robust is critical to both establishing digital forensics as a reliable discipline and accreditation requirements. This paper proposes a more comprehensive model of tool validation by taking continuous measurements a tool validation process. This continuous measurement process could later be repeated over all the scenarios that lab would expect to encounter in day-to-day operations. We attempt to determine whether or not a continuous model provides the sort of data necessary for empirical analysis of a digital forensic tool. Moreover, we propose a fully automated model for tool validation, permitting researchers to concentrate on validation study design rather than performing time-consuming, error-prone tasks on the test platform.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117261980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A High capacity Double-Layer Gray Code Based Security Scheme for Secure Data Embedding 一种基于高容量双层灰度码的数据嵌入安全方案
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909192
Ghadir Mostafa, Wassim Alexan
{"title":"A High capacity Double-Layer Gray Code Based Security Scheme for Secure Data Embedding","authors":"Ghadir Mostafa, Wassim Alexan","doi":"10.1109/ISNCC.2019.8909192","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909192","url":null,"abstract":"With the recent amelioration in digital communication and cloud storage, security remains a concern. Even though cryptographic algorithms have been readily used, they have been proved to be vulnerable to brute force and side channels attacks. Hence an additional security layer must be integrated to overcome the suspicion introduced by cryptography which is only concerned with the secrecy of the transmitted data. Adjacently, steganography tackles the secrecy of communication in the first place and hence a hybrid double layer security scheme that integrates both systems safeguards the data in terms of secrecy and imperceptibility. In this paper, we propose a double layer blind reversible security scheme which deploys Blowfish encryption as a cryptographic layer followed by a least significant bit image steganographic layer which spreads the encrypted secret data required to be transmitted over the pixels of an image cover medium. Our scheme also spreads the data again over the color channels of the pixels selected for embedding according to a gray code sequence. In order to judge the performance of our proposed scheme, the values of peak signal to noise ratio, mean squared error and structural similarity index have been computed and compared to other least significant bit schemes in the literature. The proposed scheme has been proved superior in terms of capacity, imperceptibility and computational complexity.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132019706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Low-cost sensor using a dsPIC for measuring a specific heat capacity of liquids 使用dsPIC的低成本传感器,用于测量液体的比热容
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909086
Swapna Chintakunta, K. R. Rao, P. Nkwari, K. Ouahada
{"title":"Low-cost sensor using a dsPIC for measuring a specific heat capacity of liquids","authors":"Swapna Chintakunta, K. R. Rao, P. Nkwari, K. Ouahada","doi":"10.1109/ISNCC.2019.8909086","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909086","url":null,"abstract":"This paper describes a low-cost sensor using a microcontroller dsPIC30F6014A. A simple method to measure the specific heat capacity of liquids using transient technique. A sensor has been designed to measure time and temperature accurately which in turn lead to the measurement of the specific heat capacity of liquids. To test the proposed solution in the present work, different liquids have been used include organic compounds, inorganic compounds and polymers. The results obtained using our sensor have been validated using data available in the literature.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115258838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Exploratory Data Analytics Platform for Factories of Future 面向未来工厂的探索性数据分析平台
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909119
E. Zeydan, Ömer Dedeoglu
{"title":"An Exploratory Data Analytics Platform for Factories of Future","authors":"E. Zeydan, Ömer Dedeoglu","doi":"10.1109/ISNCC.2019.8909119","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909119","url":null,"abstract":"Factories of Future (FoF) is an emerging vertical sector towards 5G network evolution. Fine-grained monitoring the network performance of FoF environment can help to extract insight on the quality-of-service (QoS) of a given industrial service provided by next generation cellular technologies. However, one of the main solutins that mobile network operators (MNOs) are investing today is on data evaluation tools that can be integrated withing their network infrastructure. In this paper using the open-source analytics tools, we analyze the industrial network traffic characteristics behaviour of an operational cellular network of a MNO. Our results finds out the relationship between various key performance indicators (KPIs) and extract insights on the performance and operational aspects of a factory environment using the cellular networks data with ElasticSearch stack's data analytics capabilities.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126370343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigation of Multi-Beam Interference Impact on State-of-Polarization OCDMA Optical Networks 多波束干扰对偏振态OCDMA光网络影响的研究
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909165
N. Tarhuni
{"title":"Investigation of Multi-Beam Interference Impact on State-of-Polarization OCDMA Optical Networks","authors":"N. Tarhuni","doi":"10.1109/ISNCC.2019.8909165","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909165","url":null,"abstract":"Optical Code Division Multiple Access (OCDMA) is a promising technology for efficiently sharing resource of future optical networks among multiple nodes while managing the unavoidable Multiple Beam Interference (MBI). MBI arises when multiple users share the optical channel concurrently using signature codes. In this work, we investigate the impact of MBI on OCDMA network based on State of Polarization (SOP) encoding. The signature codes rotate the beam SOP for each node attached to the optical network. The considered signature codes are the asynchronous Gold code set and the Synchronous Hadamard code set. It is well known that conventional CDMA systems provide significant processing gain improvement in terms of the required Signal to Noise Ratio SNR, to achieve a given Bit Error Rate (BER) performance for single node transmission. However, the performance deteriorates as more active concurrent nodes transmit on shared channel. Interestingly, we show that the BER performance improves as number of active nodes increases when synchronous Hadamard code set is used as the signature waveform. To the best of our knowledge, this is a novel behavior in OCDMA systems. For instance, it is found that, by using intensive numerical simulations, a Hadamard code set of length 32 chips at a fixed SNR of −4 dB, the BER drops from~~ 10−2 for a single user scenario to ~~ 10−6 for 32 concurrent users, i.e., a four order of magnitude improvement in BER performance.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124424715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quadrature Spatial Modulation OFDM System Performance in the Presence of High Power Amplifier Nonlinearities 正交空间调制OFDM系统在高功率放大器非线性存在下的性能
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909100
A. A. Ashqar, R. Mesleh
{"title":"Quadrature Spatial Modulation OFDM System Performance in the Presence of High Power Amplifier Nonlinearities","authors":"A. A. Ashqar, R. Mesleh","doi":"10.1109/ISNCC.2019.8909100","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909100","url":null,"abstract":"This paper proposes a combination between quadrature spatial modulation (QSM) multiple-input multiple-output (MIMO) system and orthogonal frequency division multiplexing (OFDM) aiming to benefit from their superior inherent advantages. The proposed system uses multiple transmit antennas and applies QSM technique on the different OFDM sub-carriers transmitted from the multiple antennas. Therefore, at each frequency sub-carrier, one antenna will be transmitting a real part of the modulated symbol and another or the same antenna will be transmitting the imaginary part of that symbol. As such, many of the transmitted sub-carriers in one OFDM symbol will be un-modulated and transmitting no data, which promises major reduction in the peak to average power ratio (PAPR). Typical OFDM systems generally suffer from high PAPR, which causes major performance degradation in the presence of high power amplifier (HPA) nonlinearities. It is revealed, in this paper, that the proposed system achieves superior performance as compared to it's spatial modulation and spatial multiplexing counterpart systems. Analytical analysis on the overall bit error probability is provided and corroborated through Monte Carlo simulation results.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125287923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
It is Probably Me: A Bayesian Approach to Weighting Digital Identity Sources 很可能是我:一种加权数字身份来源的贝叶斯方法
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909201
Juanita Blue, J. Condell, T. Lunney
{"title":"It is Probably Me: A Bayesian Approach to Weighting Digital Identity Sources","authors":"Juanita Blue, J. Condell, T. Lunney","doi":"10.1109/ISNCC.2019.8909201","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909201","url":null,"abstract":"As human-kind becomes increasingly dependent on online services to conduct the fundamental aspects of daily life, digital footprints and the associated online service digital identities have the capacity to provide verification that an individual is a ‘real person’ and possesses a true identity. A recognized challenge in utlising this data in this manner is that different types of online services possess different levels of reliability. This paper explores the application of naïve Bayes theorem to subsets of attributes contained within various types of online accounts that are presented as ‘identity sources’. This seeks to demonstrate that less reliable sources such as social media accounts will produce lower trust scores than more reliable sources following application of Bayes theorem. The results for which will be used to determine if digital identity sources can be relied upon in place of traditional paper identification documentation. This research and testing has been conducted as an element of a larger intelligent identity authentication system that seeks to create a solution that proves an identity is genuine via an individual's digital footprint.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130108873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-adapting Linear Network Coding Emulation 自适应线性网络编码仿真
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909124
N. B. Coelho, F. A. Monteiro, Rui J. Lopes
{"title":"Self-adapting Linear Network Coding Emulation","authors":"N. B. Coelho, F. A. Monteiro, Rui J. Lopes","doi":"10.1109/ISNCC.2019.8909124","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909124","url":null,"abstract":"Linear network coding (LNC) introduced a new paradigm for routing data across networks where the transported packets are not the original information packets but rather linear combinations of the original packets. This is known to allow a more efficient use of the network resources. With LNC based on systematic network codes, the network's capacity is chiefly defined by the rank of the end-to-end equivalent transfer matrix. This paper presents a network-layer emulator based on the obj ect-oriented programming paradigm, which allows, for any network topology, to have the network's capacity self-optimized by adapting the coding operations performed at each node, depending on the impact the changes have on the global rank of the global transfer matrix, and on a metric related to the use of network's resources.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132594440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信