M. Garcia, Hannah R. B. Chan, B. Comendador, G. B. Cornell, Christopher D. Celestial, Arc E. P. Mercolesia
{"title":"Smart Home Electricity Management System Using Cloud Computing (SHEMS)","authors":"M. Garcia, Hannah R. B. Chan, B. Comendador, G. B. Cornell, Christopher D. Celestial, Arc E. P. Mercolesia","doi":"10.7763/JACN.2013.V1.9","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.9","url":null,"abstract":"The paper promotes Smart Home Electricity Management System using Cloud Computing (SHEMS). Through the Internet it can collect on-line data power consumption, and can manipulate the power supply of the connected electrical appliances. In addition, it can generate daily, monthly and yearly reports on cost and kilo-watt per hour usage of each appliances/loads connected to the system. Thus, it enables the consumer or establishment to keep track the real-time power consumption which allows users to save electrical energy.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133240660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Estimation of Speech Quality through the Internet Using Echo State Networks","authors":"Sebastián Basterrech, G. Rubino","doi":"10.7763/JACN.2013.V1.37","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.37","url":null,"abstract":"Audio quality in the Internet can be strongly affected by network conditions. As a consequence, many techniques to evaluate it have been developed. In particular, the ITU-T adopted in 2001 a technique called Perceptual Evaluation of Speech Quality (PESQ) to automatically measuring speech quality. PESQ is a well-known and widely used procedure, providing in general an accurate evaluation of perceptual quality by comparing the original and received voice sequences. One obvious inherent limitation of PESQ is, thus, that it requires the original signal (we say the reference), to make its evaluation. This precludes the use of PESQ for assessing the perceived quality in real-time, as the reference is in general not available. In this paper, we describe a procedure for estimating PESQ output working only with measures taken on the network state and properties of the communication system, without any use of the reference. It is based on the use of statistical learning techniques. Specifically, we rely on recent ideas for learning with specific types of neural networks, known under the name of Echo State Networks (ESNs), a member of the class of Reservoir Computing systems. These tools have been proven to be very efficient and robust in many learning tasks. The experimental results obtained show the good accuracy of the resulting procedure, and its capability to give its estimations of speech quality in a real-time context. This allows putting our measuring modules in future Internet applications or services based on voice transmission, for instance for control purposes.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114557713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qazi Emad-ul-Haq, Hatim Aboalsamh, Wadood Abdul, M. Hussain, S. Ghouzali
{"title":"Multimedia Communication in Wireless Sensor Networks — A Review Paper","authors":"Qazi Emad-ul-Haq, Hatim Aboalsamh, Wadood Abdul, M. Hussain, S. Ghouzali","doi":"10.18178/JACN.2015.3.4.192","DOIUrl":"https://doi.org/10.18178/JACN.2015.3.4.192","url":null,"abstract":"In recent years, the advances in wireless communications have given rise to the concept of wireless sensor networks (WSN) and wireless multimedia sensor networks (WMSN), which contain smaller, cheaper and multifunctional sensor nodes. These tiny sensor nodes; equipped with cameras, microphones, and other sensors which produce multimedia content, communicate in short distances and fulfill the specific aims of WMSNs. Therefore, acknowledgment of the extensive class of imagined WMSN applications needs proficient correspondence conventions, which can meet the interesting difficulties confronted by WMSN applications. Since a number of these applications gather data as media, for example, sound and feature streams, pictures, and so forth. Remarkable difficulties because of the unique necessities of media correspondence over WSN, e.g., dependability and time imperatives, high-transmission capacity requests, must be dealt with too. Therefore, a lot of research literature in the recent years has been pointed towards finding the solutions of conventional data communication in WMSNs. In this paper, we presented the challenges and the latest research being done in the research community for meeting the challenges in WMSNs. This research paper emphasizes on routing approaches for WMSNs and gives a review of the most critical difficulties and inclinations as to steering conventions for WMSNs, media and system execution. Because of the vitality of the steering plans and sight and sound mindfulness conveyance in streamlining operations, a specific consideration will be given around there. Various distinctive methodologies to media directing will be talked about to clarify the way of these difficulties.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114482546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Networked Control System with Discrete-Time State Predictor over WSN","authors":"Hyun-Chul Yi, Hyoung-Woo Kim, Joon‐Young Choi","doi":"10.7763/JACN.2014.V2.91","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.91","url":null,"abstract":" Abstract—We design a networked control system (NCS) with discrete-time state predictor where the communication between the controller output and the plant input takes place over a wireless sensor network (WSN). In order to measure time delays between the controller output and the plant input in real time, we design an algorithm to measure round trip time (RTT) between WSN nodes, and implement it into TinyOS of WSN. By using the measured time delays, we construct the discrete-time state predictor to compensate the time delays between the controller output and the plant input in real-time. For the real time experiment, we simulate the dynamic plant model, the controller, and WSN interface using Real-Time Windows Target provided in MATLAB. The WSN interface in the Simulink model consists of serial ports, which connect the controller output and the plant input with WSN nodes. The experiment results show that the time delays between the controller output and the plant input are precisely measured in real time; the discrete-time state predictor appropriately compensates the time delays; and the stability is achieved in the closed-loop of the NCS. In this paper, we design an NCS with discrete-time state predictor where the communication between the controller output and the plant input takes place over WSNs. In order to measure time delays between the controller output and the plant input in real time, we design an algorithm to measure round trip time (RTT) between WSN nodes, and implement it into TinyOS of WSN. By using the measured time delays as a parameter, we construct the discrete-time state predictor (6), (7) to compensate the time delays between the controller output and the plant input in real time. The discrete-time state predictor suitably compensates measured time delays in the feedback loop. The experiment results show that the time delays between the controller output and the plant input are precisely measured in real time; the discrete-time state predictor appropriately compensates the time delays; and the closed-loop of the NCS is made to be stable.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114680890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Host-based Fast Mobility Scheme (HFMS) in 802.16j Mobile RS Mode","authors":"Jun-Li Kuo, Chen-Hua Shih, Yaw-Chung Chen","doi":"10.7763/JACN.2013.V1.35","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.35","url":null,"abstract":"As technologies for the high quality multimedia application and 4G WiMAX network prevail, one can easily be under services everywhere through WiMAX wireless network. However, the service disruption time (SDT) caused by handover procedure leads to an unacceptable quality of service (QoS) for mobile users, especially in IEEE 802.16j mobile relay station (MRS) mode. Therefore, we proposed a host-based fast mobility scheme (HFMS) in IEEE 802.16j MRS mode to reduce the SDT and solve the packet loss problem during handover via the cooperation between the MRS's link-layer and mobile station's (MS's) IP layer. In the proposed scheme, the MRS's link-layer will notify the MS's IP layer to perform IP layer handover procedure when the MRS performs link-layer handover. The parallel handover reduces the SDT efficiently. On the other hand, the proposed buffering mechanism can avoid packet loss. As a result, the seamless mobility and satisfactory QoE can be achieved for mobile users in IEEE 802.16j MRS mode.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128421399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and VLSI Implementation of Low Latency IEEE 802.11i Cryptography Processing Unit","authors":"Jun-Dian Li","doi":"10.18178/JACN.2020.8.1.274","DOIUrl":"https://doi.org/10.18178/JACN.2020.8.1.274","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129385936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Web-Based Sensor Data Management System for Distributed Environmental Observation","authors":"T. Torii, Yusuke Yokota, Eiji Okubo","doi":"10.7763/JACN.2013.V1.22","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.22","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133675223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Network Client Profiler","authors":"Diogo Teixeira, A. Arsénio","doi":"10.7763/JACN.2013.V1.26","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.26","url":null,"abstract":"Abstract — Peer2Peer traffic already accounts for a large share of the overall internet traffic. Future solutions will need to manage all the available resources in order to charge users using fair rules according to their communication profile. Obtaining information about the behavior of Internet traffic is therefore fundamental to the management, monitoring and operation activities, such as the identification of applications and protocols that customers use. However, the main obstacle to this identification is the lack of scalability for monitoring network devices. In particular, they can analyze all the network packets for this purpose. This task is extremely demanding and almost impossible to accomplish rapidly in large networks (because usually there is a number in the hundreds or thousands of customers). Furthermore, we expect such networks to become even larger, as on the internet of things all devices (sensors, appliances, etc) will be publicly connected to the internet. As such, traffic sampling strategies have been proposed to overcome this major problem of scale. This paper presents different works in the area of monitoring traffic for user profiling and security purposes. It proposes as well a solution that uses selective filtering techniques combined with an engine traffic DPI to identify applications and protocols that customers use most frequently. Thus it becomes possible to get ISPs to optimize their network in a scalable and intelligent manner, imposing security measures in order to enforce network usage according to client profiles.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132591833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Flaws of a Password Authentication Scheme for Hierarchical WSNs","authors":"Chun-Ta Li, C. Weng, Cheng-Chi Lee, Chin-Wen Lee, Ping-Nan Chiu, Cheng-Yi Wu","doi":"10.7763/JACN.2013.V1.25","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.25","url":null,"abstract":"With the growing popularity of sensor-based monitoring devices, sensor networks are becoming an essential part of wireless heterogeneous networks and numerous researches have been widely studied in recent years. Recently, Das et al. proposed a dynamic password-based user authentication scheme with dynamic node addition for hierarchical wireless sensor networks (WSNs). They claimed that their scheme achieves better security as compared to those for other existing password-based user authentication approaches. However, we observe that Das et al.'s scheme is vulnerable to smart card breach attack, privileged-insider attack, and many logged-in users' attack and is not easily reparable.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}