Journal of Communications Software and Systems最新文献

筛选
英文 中文
Monopoly-Market-based Cooperation in Cognitive Radio Networks 认知无线电网络中基于垄断市场的合作
IF 0.7
Journal of Communications Software and Systems Pub Date : 2020-11-03 DOI: 10.24138/jcomss.v16i4.994
Said Lakhal, Z. Guennoun
{"title":"Monopoly-Market-based Cooperation in Cognitive Radio Networks","authors":"Said Lakhal, Z. Guennoun","doi":"10.24138/jcomss.v16i4.994","DOIUrl":"https://doi.org/10.24138/jcomss.v16i4.994","url":null,"abstract":"In a cognitive radio network (CRN), the primary users (PUs) do not operate their spectra, full time. Thus, they can sell them to the secondary users (SUs), for a second use, during the free time slots. In this article, we assume that the market is perfect, monopolized by a single PU, and all players are rational. After formulating the PU’s profit, we established a necessary and sufficient condition that guarantees the introduction of the PU into the market. In addition, the expressions of the SUs’ profits, showed us that in non-cooperative form, some ones got zero profit, even after maximizing their profits. Therefore, we have considered to study the effect of cooperation on the profits of this category of SUs. By following this step, we established a cooperation strategy, to avoid zero profits for all SUs. In order to analyze the impact of this cooperation on the PU, we have expressed the profits of the PU in the cooperative and non-cooperative forms; as result, we found that the cooperation between SUs brought better than the non-cooperative form.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41986819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Crowdsourcing Based Framework for Sentiment Analysis 基于众包的情感分析框架
IF 0.7
Journal of Communications Software and Systems Pub Date : 2020-10-23 DOI: 10.24138/jcomss.v16i4.935
F. Z. Ennaji, A. E. Fazziki, H. E. A. E. Abdallaoui, H. E. Kabtane
{"title":"A Crowdsourcing Based Framework for Sentiment Analysis","authors":"F. Z. Ennaji, A. E. Fazziki, H. E. A. E. Abdallaoui, H. E. Kabtane","doi":"10.24138/jcomss.v16i4.935","DOIUrl":"https://doi.org/10.24138/jcomss.v16i4.935","url":null,"abstract":"As social networking has spread, people started sharing their personal opinions and thoughts widely via these online platforms. The resulting vast valuable data represent a rich source for companies to deduct their products’ reputation from both social media and crowds’ judgments. To exploit this wealth of data, a framework was proposed to collect opinions and rating scores respectively from social media and crowdsourcing platform to perform sentiment analysis, provide insights about a product and give consumers’ tendencies. During the analysis process, a consumer category (strict) is excluded from the process of reaching a majority consensus. To overcome this, a fuzzy clustering is used to compute consumers’ credibility. The key novelty of our approach is the new layer of validity check using a crowdsourcing component that ensures that the results obtained from social media are supported by opinions extracted directly from real-life consumers. Finally, experiments are carried out to validate this model (Twitter and Facebook were used as data sources). The obtained results show that this approach is more efficient and accurate than existing solutions thanks to our two-layer validity check design.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"16 1","pages":"285-295"},"PeriodicalIF":0.7,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46174222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Doppler Frequency Estimation for a Maneuvering Target Being Tracked by Passive Radar Using Particle Filter 被动雷达跟踪机动目标的粒子滤波多普勒频率估计
IF 0.7
Journal of Communications Software and Systems Pub Date : 2020-10-08 DOI: 10.24138/jcomss.v16i4.1097
Anas Mahmoud Almanofi, A. Malki, Ali Kazem
{"title":"Doppler Frequency Estimation for a Maneuvering Target Being Tracked by Passive Radar Using Particle Filter","authors":"Anas Mahmoud Almanofi, A. Malki, Ali Kazem","doi":"10.24138/jcomss.v16i4.1097","DOIUrl":"https://doi.org/10.24138/jcomss.v16i4.1097","url":null,"abstract":"In this paper, we estimate Doppler frequency of a maneuvering target being tracked by passive radar using two types of particle filter, the first is “Maximum Likelihood Particle Filter” (MLPF) and the second is “Minimum Variance Particle filter” (MVPF). By simulating the passive radar system that has the bistatic geometry “Digital Video Broadcasting-Terrestrial (DVB-T) transmitter / receiver” with these two types, we can estimate the Doppler frequency of the maneuvering target and compare the simulation results for deciding which type gives better performance.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"16 1","pages":"279-284"},"PeriodicalIF":0.7,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48395548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Viability of Numerical Full-Wave Techniques in Telecommunication Channel Modelling 数字全波技术在电信信道建模中的可行性
IF 0.7
Journal of Communications Software and Systems Pub Date : 2020-10-08 DOI: 10.24138/jcomss.v16i4.1041
Roman Novak
{"title":"Viability of Numerical Full-Wave Techniques in Telecommunication Channel Modelling","authors":"Roman Novak","doi":"10.24138/jcomss.v16i4.1041","DOIUrl":"https://doi.org/10.24138/jcomss.v16i4.1041","url":null,"abstract":"In telecommunication channel modelling the wavelength is small compared to the physical features of interest, therefore deterministic ray tracing techniques provide solutions that are more efficient, faster and still within time constraints than current numerical full-wave techniques. Solving fundamental Maxwell's equations is at the core of computational electrodynamics and best suited for modelling electrical field interactions with physical objects where characteristic dimensions of a computing domain is on the order of a few wavelengths in size. However, extreme communication speeds, wireless access points closer to the user and smaller pico and femto cells will require increased accuracy in predicting and planning wireless signals, testing the accuracy limits of the ray tracing methods. The increased computing capabilities and the demand for better characterization of communication channels that span smaller geographical areas make numerical full-wave techniques attractive alternative even for larger problems. The paper surveys ways of overcoming excessive time requirements of numerical full-wave techniques while providing acceptable channel modelling accuracy for the smallest radio cells and possibly wider. We identify several research paths that could lead to improved channel modelling, including numerical algorithm adaptations for large-scale problems, alternative finite-difference approaches, such as meshless methods, and dedicated parallel hardware, possibly as a realization of a dataflow machine.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"16 1","pages":"269-278"},"PeriodicalIF":0.7,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42455579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Human Retina Based Identification System Using Gabor Filters and GDA Technique 基于Gabor滤波器和GDA技术的人视网膜识别系统
IF 0.7
Journal of Communications Software and Systems Pub Date : 2020-09-08 DOI: 10.24138/jcomss.v16i3.1031
Shahad A. Sultan, M. F. Ghanim
{"title":"Human Retina Based Identification System Using Gabor Filters and GDA Technique","authors":"Shahad A. Sultan, M. F. Ghanim","doi":"10.24138/jcomss.v16i3.1031","DOIUrl":"https://doi.org/10.24138/jcomss.v16i3.1031","url":null,"abstract":"A biometric authentication system provides an\u0000automatic person authentication based on some characteristic\u0000features possessed by the individual. Among all other biometrics,\u0000human retina is a secure and reliable source of person\u0000recognition as it is unique, universal, lies at the back of the eyeball and hence it is unforgeable. The process of authentication\u0000mainly includes pre-processing, feature extraction and then\u0000features matching and classification. Also authentication systems\u0000are mainly appointed in verification and identification mode\u0000according to the specific application. In this paper, preprocessing and image enhancement stages involve several steps to\u0000highlight interesting features in retinal images. The feature\u0000extraction stage is accomplished using a bank of Gabor filter with\u0000number of orientations and scales. Generalized Discriminant\u0000Analysis (GDA) technique has been used to reduce the size of\u0000feature vectors and enhance the performance of proposed\u0000algorithm. Finally, classification is accomplished using k-nearest\u0000neighbor (KNN) classifier to determine the identity of the genuine\u0000user or reject the forged one as the proposed method operates in\u0000identification mode. The main contribution in this paper is using\u0000Generalized Discriminant Analysis (GDA) technique to address\u0000‘curse of dimensionality’ problem. GDA is a novel method used\u0000in the area of retina recognition.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2020-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48350226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Wearable Fall Detection System based on LoRa LPWAN Technology 基于LoRa LPWAN技术的可穿戴跌倒检测系统
IF 0.7
Journal of Communications Software and Systems Pub Date : 2020-07-28 DOI: 10.24138/jcomss.v16i3.1039
E. Zanaj, Deivis Disha, S. Spinsante, E. Gambi
{"title":"A Wearable Fall Detection System based on LoRa LPWAN Technology","authors":"E. Zanaj, Deivis Disha, S. Spinsante, E. Gambi","doi":"10.24138/jcomss.v16i3.1039","DOIUrl":"https://doi.org/10.24138/jcomss.v16i3.1039","url":null,"abstract":"The fall problem affects approximately one third of people aged over 65 years. Falls and fall-related injuries are one of the major causes of morbidity and mortality in the elderly population. Since many years, research activities have been targeted towards the development of technological solutions for the automatic detection and notification of falls. Among them, wearable based systems offer the advantage of being available ideally everywhere and cost-effective in terms of economy and computational burden. However, their use poses different challenges, from acceptability to battery usage. The choice of the communication technology, in particular, plays a fundamental role in the realization of a suitable solution, able to meet the target users’ needs. In this paper, we present a fall detection system, based on a pair of instrumented shoes. They communicate the alarming events to a supervising system through the LoRa LPWAN technology, without the need of a portable gateway. Experimental results demonstrate the effectiveness of the chosen communication technology and fall detection reliability.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"16 1","pages":"232-242"},"PeriodicalIF":0.7,"publicationDate":"2020-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42877777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of ZigBee Topology Effect on Throughput and End to End Delay Due to Different Transmission Bands for IoT Applications 物联网应用中不同传输频带对ZigBee拓扑结构吞吐量和端到端延迟影响的评估
IF 0.7
Journal of Communications Software and Systems Pub Date : 2020-07-22 DOI: 10.24138/jcomss.v16i3.975
Y. R. Hamdy, A. I. Alghannam
{"title":"Evaluation of ZigBee Topology Effect on Throughput and End to End Delay Due to Different Transmission Bands for IoT Applications","authors":"Y. R. Hamdy, A. I. Alghannam","doi":"10.24138/jcomss.v16i3.975","DOIUrl":"https://doi.org/10.24138/jcomss.v16i3.975","url":null,"abstract":"ZigBee is widely used in wireless network in\u0000Internet of Things (IoT) applications to remotely sensing and\u0000automation due to its unique characteristics compared to other\u0000wireless networks. According to ZigBee classification of IEEE\u0000802.15.4 standard, the network consists of four layers. The\u0000ZigBee topology is represented in second layer. Furthermore, the\u0000ZigBee topology consists of three topologies, star, tree and mesh.\u0000Also there are many transmission bands allowed in physical\u0000layer, such as 2.4 GHz, 915 MHz, 868 MHz. The aim of this paper\u0000is to evaluate the effect of ZigBee topologies on End to End delay\u0000and throughput for different transmission bands. Riverbed\u0000Modeler is used to simulate multiple ZigBee proposed scenarios\u0000and collect the results. The results of the study recommend which\u0000topology should be used at each transmission band to provide\u0000lowest End to End delay or obtain maximum throughput, which\u0000is case sensitive in some IoT applications that required for\u0000example minimum delay time or sending high amount of data.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47127014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Enhancement in Cloud Environment using Secure Secret Key Sharing 使用安全密钥共享增强云环境中的安全性
IF 0.7
Journal of Communications Software and Systems Pub Date : 2020-07-20 DOI: 10.24138/jcomss.v16i3.964
S. Chhabra, Ashutosh Kumar Singh
{"title":"Security Enhancement in Cloud Environment using Secure Secret Key Sharing","authors":"S. Chhabra, Ashutosh Kumar Singh","doi":"10.24138/jcomss.v16i3.964","DOIUrl":"https://doi.org/10.24138/jcomss.v16i3.964","url":null,"abstract":"Securing the data in distributed cloud system is considered one of the major concern for the cloud customers who faces security risks. The data leakage or data tampering are widely used by attackers to extract the private information of other users who shares the confidential data through virtualization. This paper presents Secure Secret Sharing (SSS) technique which is being recognized as one of the leading method to secure the sensitive data. It shares encrypted data over cloud and generated secret key is split into different parts distributed to qualified participants (Qn) only which is analyzed by malicious checkers. It verifies the clients based on their previous performances, whether these users proved to be authorized participant or not. The key computation is evaluated by the Key handler (KH) called trusted party which manages authorized control list, encryption/decryption and reconstruction of key shares. The Lagrange’s interpolation method is used to reconstruct the secret from shares. The experimental results shows that the proposed secure data sharing algorithm not only provides excellent security and performance, but also achieves better key management and data confidentiality than previous countermeasures. It improves the security by using secure VM placement and evaluated based on time consumption and probability computation to prove the efficacy of our algorithm. Experiments are performed on cloudsim based on following parameters i.e. time computation of key generation; response time and encryption/decryption. The experimental results demonstrate that this method can effectively reduce the risks and improves the security and time consumption upto 27.81% and 43.61% over existing algorithms.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48085004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Chicken Swarm Optimization for PTS based PAPR Reduction in OFDM Systems 基于PTS降低OFDM系统PAPR的鸡群优化算法
IF 0.7
Journal of Communications Software and Systems Pub Date : 2020-07-17 DOI: 10.24138/jcomss.v16i3.999
Saruti Gupta, A. Goel
{"title":"Chicken Swarm Optimization for PTS based PAPR Reduction in OFDM Systems","authors":"Saruti Gupta, A. Goel","doi":"10.24138/jcomss.v16i3.999","DOIUrl":"https://doi.org/10.24138/jcomss.v16i3.999","url":null,"abstract":"Partial transmit sequence (PTS) is a well-known PAPR reduction scheme for the OFDM system. One of the major challenge of this scheme is to find an optimal phase vector using exhaustive search over all the allowed phase factor combinations. This leads to increased search complexity which grows exponentially as the number of sub-blocks is increased. In this paper, chicken swarm optimization (CSO) based PTS system is designed that aims to find an optimal solution in less number of average iterations and therefore results in reduced computational complexity of the system. We have proposed two categories of the algorithm: (i) CSO-PTS system without threshold limit on PAPR (ii) CSO-PTS system with threshold limit on PAPR. Both the schemes offer effective trade-offs between the computational complexity and the PAPR reduction capability of the system. Simulation results confirm that our proposed schemes perform well in terms of low computational complexity, lesser number of average iterations and improved PAPR reduction capability of the OFDM signal without any loss in BER performance of the system.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"16 1","pages":"224-231"},"PeriodicalIF":0.7,"publicationDate":"2020-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42044933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Frequency Plan Optimization Based on Genetic Algorithms for Cellular Networks 基于遗传算法的蜂窝网络频率规划优化
IF 0.7
Journal of Communications Software and Systems Pub Date : 2020-07-09 DOI: 10.24138/jcomss.v16i3.1012
H. Megnafi
{"title":"Frequency Plan Optimization Based on Genetic Algorithms for Cellular Networks","authors":"H. Megnafi","doi":"10.24138/jcomss.v16i3.1012","DOIUrl":"https://doi.org/10.24138/jcomss.v16i3.1012","url":null,"abstract":"Cellular networks are constantly evolving to ensure a better Quality of Service (QoS) and quality of coverage ever more important. The radio cellular systems are based on frequency allocation. In this context, frequency allocation principle consists in choosing an optimal frequency plan to meet traffic demand constraints and communication quality while minimizing the radio interferences. This paper proposes an optimal frequency allocation approach based on genetic algorithms to minimize co-channel and adjacent channel interference. The validation of this new approach is confirmed by the results of the work we have done in the GSM network. In fact, we used the file obtained by the OMC-R, which defines the adjacent cells of each cell and the frequencies allocated to the considered area. The results obtained clearly show the effectiveness and robustness of the approach used.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2020-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44884381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信