International Journal of Computing & Network Technology最新文献

筛选
英文 中文
Bat-Inspired Hidden Node Detection Algorithm and Collision Minimization (BIHD-CM) Scheme for IEEE802.11AH IEEE802.11AH中蝙蝠启发的隐藏节点检测算法和碰撞最小化(BIHD-CM)方案
International Journal of Computing & Network Technology Pub Date : 2018-09-01 DOI: 10.12785/ijcnt/060305
Fapohunda K.O, Paulson Eberechukwu Numan, Zubair S, Dyaji Charles Bala, M. Fauzi, Kamaludin M. Yusof
{"title":"Bat-Inspired Hidden Node Detection Algorithm and Collision Minimization (BIHD-CM) Scheme for IEEE802.11AH","authors":"Fapohunda K.O, Paulson Eberechukwu Numan, Zubair S, Dyaji Charles Bala, M. Fauzi, Kamaludin M. Yusof","doi":"10.12785/ijcnt/060305","DOIUrl":"https://doi.org/10.12785/ijcnt/060305","url":null,"abstract":"Hidden node problem sometimes referred to as frequent packets collision that mostly leads to loss of packets is no longer new in wireless networks because it affects the previous IEEE802.11 standards. The new IEEE802.11ah standard which is also a substandard of IEEE 802.11 is no exemption. As a matter of fact, IEEE802.11ah suffers from hidden node problem more than networks (IEEE 802.11a/b/n/ac) due to their wider coverage which is up to 1km, high number of devices they can support (over 8000 nodes to one AP) and frequent simultaneous sleeping and sending of the nodes (power saving mode). A few researchers have worked on this hidden node problem in IEEE802.11ah but could not get a lasting solution to it. Therefore, this paper proposes an algorithm which detects hidden nodes and also proposes a theoretical solution based on previous works which was also experimentally verified through the BIHD-CM.","PeriodicalId":352753,"journal":{"name":"International Journal of Computing & Network Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121426830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Current Trends and Issues Legacy Application of the Serverless Architecture 无服务器架构遗留应用的当前趋势和问题
International Journal of Computing & Network Technology Pub Date : 2018-09-01 DOI: 10.12785/IJCNT/060304
S. Saeed, Noor Zaman Jhanjhi, A. Abdullah, M. Naqvi
{"title":"Current Trends and Issues Legacy Application of the Serverless Architecture","authors":"S. Saeed, Noor Zaman Jhanjhi, A. Abdullah, M. Naqvi","doi":"10.12785/IJCNT/060304","DOIUrl":"https://doi.org/10.12785/IJCNT/060304","url":null,"abstract":"Serverless computing has emerged as a new compelling paradigm for the deployment of applications and services. It represents an evolution of cloud programming models, abstractions, and platforms, and is a testament to the maturity and wide adoption of cloud technologies. In this research, we discuss the new concept in cloud computing that allows the services computation that triggers the code execution as a response for certain events. Cloud computing as provisioning more servers on demand are one of the primary issues and traffic of servers or load is not consistent. The Services are moved to the cloud and a great change is observed in all fields. People are more comfortable having their services on the Internet. As E-commerce services have reached exponential growth. The problem associated with this research is that the organization often spends huge chunks of dollars only for server provisioning, and another chunk for its security and management. As compared to serverless, the vendor serves all security and management aspects. Mostly the Online service providers are often stuck with unexpected traffic. Having more provisioned servers creates a hike in prices. There are needed to be a solution where vendors can only have to pay for the services on demand and describes serverless infrastructure, which assists to do all without taking care of these as a simple model and a simple structure. In this research, the serverless architecture service is providing the use of functions, which are on clusters and compels users “Pay as you go”, is more refined in serverless, and now is known by “Pay what is used”. It represents an evolution of cloud programming models has gained increasing attention by researchers. It concludes the impact, legacy application migration and using this new approach as standard to build the application. Serverless architecture is far greater than having a legacy approach. Its word to mouth to say serverless will prevail all others but still having the approach might take time. This is not only a cost-effective factor; rather a huge portion of service is somehow is outsource to a vendor. An extension of the restricted time limit by cloud vendors will allow running the complete workflow using the serverless architecture with avoiding the scheduling problem.","PeriodicalId":352753,"journal":{"name":"International Journal of Computing & Network Technology","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116904865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic Switching of Scheduling Algorithm for Uplink LTE System LTE上行系统的动态交换调度算法
International Journal of Computing & Network Technology Pub Date : 2018-09-01 DOI: 10.12785/ijcnt/060301
Ali Othman, S. Ameen, H. Al‐Rizzo
{"title":"Dynamic Switching of Scheduling Algorithm for Uplink LTE System","authors":"Ali Othman, S. Ameen, H. Al‐Rizzo","doi":"10.12785/ijcnt/060301","DOIUrl":"https://doi.org/10.12785/ijcnt/060301","url":null,"abstract":"Packet Scheduling (PS) is essential in Long Term Evolution (LTE) cellular system to handle huge traffic via allocating common resources among users. The main target of PS, in LTE systems, is the Radio Resource Management (RRM) by including strategies, algorithms, and schemes to control important parameters and factors such as transmit power, data rates, modulation scheme, and error coding scheme. The paper presents a performance comparison of two scheduling schemes for LTE uplink, Best Channel Quality Indicator BCQI, and Round Robin RR schedulers. Next, a new packet scheduler for uplink LTE networks, that adapts dynamically between the two mentioned packet scheduling algorithms is proposed, evaluated and compared with the performance of the two schedulers, BCQ and RR. The results of the performance, throughput, and fairness indicate that the proposed scheme gives compromise fairness between BCQI and RR in resource distributions in the LTE and maintains the system’s capacity as high as possible. The same improvement has also been observed with delay-sensitive services traffic.","PeriodicalId":352753,"journal":{"name":"International Journal of Computing & Network Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Development of Lane keeping Controller Using Image processing 基于图像处理的车道保持控制器的研制
International Journal of Computing & Network Technology Pub Date : 2018-09-01 DOI: 10.12785/ijcnt/060303
Moveh Samuel, M. Mohamad, M. Hussein, S. M. Saad
{"title":"Development of Lane keeping Controller Using Image processing","authors":"Moveh Samuel, M. Mohamad, M. Hussein, S. M. Saad","doi":"10.12785/ijcnt/060303","DOIUrl":"https://doi.org/10.12785/ijcnt/060303","url":null,"abstract":": Motivated by the need to overcome dynamic traffic congestion problems and driving safety issues, lane keeping control of vehicles has become a very active research area and is a driver-assistance vehicle feature that automatically controls a vehicle’s lateral direction at a certain look-ahead distance. This study presents the development of autonomous lane keeping controller using image processing in simulation environment and experimental setup. In the simulation study, a single tracked bicycle model was adopted as vehicle model. All simulation study of controller was based on the developed model in MATLAB environment while for experimental study; a scale vehicle was developed and used as a platform to test the lane keeping algorithm in a closed environmental setting. The lane keeping algorithm development comprises of two major parts. They are lane detection using image processing and lane keeping control. The lane detection provide important data like the lane boundaries and position of the vehicle with respect to the road and feed these data to the lane keeping controller for steering control. Proportional derivative controller (PD controller) control was developed to steer the vehicle and keep it on its lane at varying longitudinal speeds. Results in terms of stability of vehicle and maneuverability indicated that the range of values of both proportional and derivative gain altered the performance as can be seen in the simulation result and also suggested the inclusion of an Integral term I in an uncontrolled environment. The lane keeping algorithm was then implemented on the scaled vehicle and tested in a controlled environment and results indicated that the mobile robot was able to follow the desired reference trajectory by correcting the cross track error to the barest minimum. Experimental results also showed a similarity with simulations results of the mobile robot steering control","PeriodicalId":352753,"journal":{"name":"International Journal of Computing & Network Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130536694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Detection and Prevention (DAP) Framework for Abuse of cloud service threat 一种新的云服务威胁滥用检测与预防(DAP)框架
International Journal of Computing & Network Technology Pub Date : 2018-09-01 DOI: 10.12785/IJCNT/060302
I. Ahmad, H. Bakht
{"title":"A Novel Detection and Prevention (DAP) Framework for Abuse of cloud service threat","authors":"I. Ahmad, H. Bakht","doi":"10.12785/IJCNT/060302","DOIUrl":"https://doi.org/10.12785/IJCNT/060302","url":null,"abstract":"Cloud security mitigation techniques has not reached the level of transparency and hence, the journey of understanding and accepting cloud computing services still remains uncharted for many organizations or individuals. While mitigation techniques for different security issues are actively being researched, however, there is still insignificancy in research on Abuse of Cloud Services threat, in particular. The threat has been identified as one of the top amongst nine by Cloud Security Alliance (CSA). The study proposes a Detection and Prevention (DAP) framework with fourteen major security measures for significant areas of concern in cloud business, operational and organizational. The key benefits of the framework are: it has improved the process of registration, resource allocation and asset inventory system. It has modeled an improvised human resource system for managing information processing facilities more efficiently, along with employee inventory system and malicious insider activity index. A universal cloud APIs process has been proposed to act as an integrator and decode service providers APIs to run business seamlessly. Furthermore, strategic plan for business continuity, disaster recovery and risk assessment processes have been proposed to define policies and procedures for running business during adverse circumstances. The security measures will be validated and evaluated with existing security infrastructure in cloud. The DAP framework is fully capable of providing better security preservation to the identified threat, which could be utilized for further development in cloud security infrastructure.","PeriodicalId":352753,"journal":{"name":"International Journal of Computing & Network Technology","volume":"46 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129777887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信