Journal of Communications Software and Systems最新文献

筛选
英文 中文
A Co-evolutionary Algorithm-based Enhanced Grey Wolf Optimizer for the Routing of Wireless Sensor Networks 一种基于协同进化算法的增强灰狼优化无线传感器网络路由
Journal of Communications Software and Systems Pub Date : 2023-01-01 DOI: 10.24138/jcomss-2023-0080
Salima Nebti, Mohammed Redjimi
{"title":"A Co-evolutionary Algorithm-based Enhanced Grey Wolf Optimizer for the Routing of Wireless Sensor Networks","authors":"Salima Nebti, Mohammed Redjimi","doi":"10.24138/jcomss-2023-0080","DOIUrl":"https://doi.org/10.24138/jcomss-2023-0080","url":null,"abstract":"Wireless networks are frequently installed in arduous environments, heightening the importance of their consistent operation. To achieve this, effective strategies must be implemented to extend the lifespan of nodes. Energy-conserving routing protocols have emerged as the most prevalent methodology, as they strive to elongate the network's lifetime while guaranteeing reliable data routing with minimal latency. In this paper, a plethora of studies have been done with the purpose of improving network routing, such as the integration of clustering techniques, heterogeneity, and swarm intelligence-inspired approaches. A comparative investigation was conducted on a variety of swarm-based protocols, including a new coevolutionary binary grey wolf optimizer (Co-BGWO), a BGWO, a binary whale optimization, and a binary Salp swarm algorithm. The objective was to optimize cluster heads (CHs) positions and their number during the initial stage of both two-level and three-level heterogeneous networks. The study concluded that these newly developed protocols are more reliable, stable, and energy-efficient than the standard SEP and EDEEC heterogeneous protocols. Specifically, in 150 m2 area of interest, the Co-BGWO and BGWO protocols of two levels were found the most efficient, with over than 33% increase in remaining energy percentage compared to SEP, and over 24% more than EDEEC in three-level networks.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136305716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LocateMyBus: IoT-Driven Smart Bus Transit LocateMyBus:物联网驱动的智能公交
IF 0.7
Journal of Communications Software and Systems Pub Date : 2023-01-01 DOI: 10.24138/jcomss-2022-0143
Karthik Desingu, Daniel Mark Isaac, M. P., Bharathi B., Cherry Mathew Philipose
{"title":"LocateMyBus: IoT-Driven Smart Bus Transit","authors":"Karthik Desingu, Daniel Mark Isaac, M. P., Bharathi B., Cherry Mathew Philipose","doi":"10.24138/jcomss-2022-0143","DOIUrl":"https://doi.org/10.24138/jcomss-2022-0143","url":null,"abstract":"","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69100256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Regular Pattern of Timestamps Between Machines with Built-in System Time 具有内置系统时间的机器之间时间戳的规则模式
IF 0.7
Journal of Communications Software and Systems Pub Date : 2023-01-01 DOI: 10.24138/jcomss-2022-0130
Ni Made Ary Esta Dewi Wirastuti, Komang Oka Saputra, W. Teng
{"title":"A Regular Pattern of Timestamps Between Machines with Built-in System Time","authors":"Ni Made Ary Esta Dewi Wirastuti, Komang Oka Saputra, W. Teng","doi":"10.24138/jcomss-2022-0130","DOIUrl":"https://doi.org/10.24138/jcomss-2022-0130","url":null,"abstract":"","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69099959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cross-layer Approach for MPTCP Path Management in Heterogeneous Vehicular Networks 异构车辆网络中MPTCP路径管理的跨层方法
IF 0.7
Journal of Communications Software and Systems Pub Date : 2023-01-01 DOI: 10.24138/jcomss-2022-0177
Vadym S. Hapanchak, António D. Costa
{"title":"A Cross-layer Approach for MPTCP Path Management in Heterogeneous Vehicular Networks","authors":"Vadym S. Hapanchak, António D. Costa","doi":"10.24138/jcomss-2022-0177","DOIUrl":"https://doi.org/10.24138/jcomss-2022-0177","url":null,"abstract":"—Multipath communication has recently arisen as a promising tool to address reliable communication in vehicular networks. The architecture of Multipath TCP (MPTCP) is designed to facilitate concurrent utilization of multiple network interfaces, thereby enabling the system to optimize network throughput. In the context of vehicular environments, MPTCP offers a promising solution for seamless roaming, as it enables the system to maintain a stable connection by switching be-tween available network interfaces. This paper investigates the suitability of MPTCP to support resilient and efficient Vehicle-to-Infrastructure (V2I) communication over heterogeneous networks. First, we identify and discuss several challenges that arise in heterogeneous vehicular networks, including issues such as Head-of-Line (HoL) blocking and service interruptions during handover events. Then, we propose a cross-layer path management scheme for MPTCP, that leverages real-time network information to improve the reliability and efficiency of multipath vehicular communication. Our emulation results demonstrate that the proposed scheme not only achieves seamless mobility across heterogeneous networks but also significantly reduces handover latency, packet loss, and out-of-order packet delivery. These improvements have a direct impact on the quality of experience for vehicular users, as they lead to lower application layer delay and higher throughput.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69100761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investment of Cyclic Prefix to Reduce the Peak-to-Average Power Ratio and Recover Original Phases Blindly 循环前缀的投资,以降低峰均功率比和盲目恢复原始相位
IF 0.7
Journal of Communications Software and Systems Pub Date : 2022-01-01 DOI: 10.24138/jcomss-2022-0115
M. Al-Rayif
{"title":"Investment of Cyclic Prefix to Reduce the Peak-to-Average Power Ratio and Recover Original Phases Blindly","authors":"M. Al-Rayif","doi":"10.24138/jcomss-2022-0115","DOIUrl":"https://doi.org/10.24138/jcomss-2022-0115","url":null,"abstract":"—When dealing with the phenomenon of unexpected high peak-to-average power ratio (PAPR) caused by multicarrer techniques, it is rarely to find a proposed solution that addresses the most important challenges together, that are; reducing the PAPR, achieving performance identical, mostly, to the theoretical curve and a reasonable level of computational complexity. This paper presents a new proposal that is able to achieve these three criteria together as the following. First, reducing the PAPR curves through easy development in the selective mapping (SLM) struc- ture. Second, identifying the original transmitted phase block by taking advantage of the cyclic prefix structure and its mechanism, without any explicit side information, while maintaining the system performance. Lastly, these achievements were obtained at low computational complexity comparing to the traditional methods of SLM PAPR reduction schemes. This proposed method is referred to as; Injected and Extracted Short-SLM to and from the Cyclic Prefix (IES-SLM-CP). The appropriate short phase sub-block is injected to a specific locations of CP, and at the receiver side, this sub-block can be extracted from the CP to reconstruct the whole original phase block.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69100347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Causal Structures from Cyberstalking: Behaviors Severity and Association 从网络跟踪中识别因果结构:行为严重性和关联
IF 0.7
Journal of Communications Software and Systems Pub Date : 2022-01-01 DOI: 10.24138/jcomss-2021-0139
Shkurte Luma-Osmani, F. Ismaili, Pankaj Pathak, Xhemal Zenuni
{"title":"Identifying Causal Structures from Cyberstalking: Behaviors Severity and Association","authors":"Shkurte Luma-Osmani, F. Ismaili, Pankaj Pathak, Xhemal Zenuni","doi":"10.24138/jcomss-2021-0139","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0139","url":null,"abstract":"—This paper presents an etiological cyberstalking study, meaning the use of various technologies and internet in general to harass or to stalk someone. The novelty of the paper is the multivariate empirical approach of cyberstalking victimization that has received less attention from the research community. Also, there is a lack of such studies from the causal perspective. It happens, since in most of the studies, a priority is given on a single causation identification, whereas the data examination used for mining causal relationships in this paper presents a novel and great potential to detect combined or multiple cause factors. The paper focuses in the impact that variables such as age, gender and the fact whether the participant has ever harassed someone, is related to the fact of being victim of cyberstalking. The research aims to find the causes of cyberstalking in high school’s teenagers. Furthermore, an exploratory data analysis has been performed. A weak and moderate correlation between the factors on the dataset is emphasized. The odds ratio among the variables has been calculated, which implies that girls are twice as likely as boys to be cyberstalked. Similarly, concerning outcomes related to cyberstalking frequency recidivism are noticed.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Remote Pumping in Point to Multi-point Networks 点到多点网络的远程泵送
IF 0.7
Journal of Communications Software and Systems Pub Date : 2022-01-01 DOI: 10.24138/jcomss-2021-0188
P. Munster, T. Horváth, Petr Dejdar, E. Skaljo
{"title":"Remote Pumping in Point to Multi-point Networks","authors":"P. Munster, T. Horváth, Petr Dejdar, E. Skaljo","doi":"10.24138/jcomss-2021-0188","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0188","url":null,"abstract":"A remotely pumped Erbium-doped system for the amplification of an optical signal for long-reach (LR) next-generation passive optical networks (NG-PONs) is presented in this paper. The next-generation networks will be deployed with/over the current point to multi-point technology with/without backward compatibility. Remote pumping allows extending the reach of the optical distribution networks and the magnification of the splitting ratio as well, which is most important for increasing the number of end users in the PON network. In our laboratory, we have successfully verified the functionality of the unidirectional and bidirectional remote pumping system based on an Erbium-doped fiber inserted into the route and remote pumping from a central office. Our measurement results prove that it is possible to extend the total reaching point to the multi-point system without the difficult incidence in the optical distribution network. Based on the results, the proposed amplifying passive optical network approach is capable of being used in passive optical networks in C band for extending the total reach of system or increasing the split ratio.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69099005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
N-gram Based Croatian Language Network: Application in a Smart Environment 基于N-gram的克罗地亚语网络:在智能环境中的应用
IF 0.7
Journal of Communications Software and Systems Pub Date : 2022-01-01 DOI: 10.24138/jcomss-2021-0178
Renato Soic, Marin Vukovic
{"title":"N-gram Based Croatian Language Network: Application in a Smart Environment","authors":"Renato Soic, Marin Vukovic","doi":"10.24138/jcomss-2021-0178","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0178","url":null,"abstract":"In the field of natural language processing, language networks represent a method for observing linguistic units and their interactions in different linguistic contexts. This paper uses the previously presented Croatian language network for building a solution capable of generating spoken notifications in Croatian language. The novelty of this paper is that it proposes an approach for generating spoken notifications in smart environments by combining specialized services that enable interaction with the environment and human users. The process employed for generating spoken notifications is described in detail. Also, a novel contribution of this paper is the case-study evaluation of the proposed approach in a smart home","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Strategy for Improving the Counter Propagation Artificial Neural Networks in Classification Tasks 一种改进分类任务中反传播人工神经网络的新策略
IF 0.7
Journal of Communications Software and Systems Pub Date : 2022-01-01 DOI: 10.24138/jcomss-2021-0121
S. Belattar, O. Abdoun, E. Haimoudi
{"title":"A Novel Strategy for Improving the Counter Propagation Artificial Neural Networks in Classification Tasks","authors":"S. Belattar, O. Abdoun, E. Haimoudi","doi":"10.24138/jcomss-2021-0121","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0121","url":null,"abstract":"—Counter-Propagation-Artificial-Neural-Networks (C P-ANNs) have been applied in several domains due to their learning and classification abilities. Regardless of their strength, the CP-ANNs still have some limitations in pattern recognition tasks when they encounter ambiguities during the learning process, which leads to the inaccurate classification of the Kohonen-Self-Organizing-Map (K-SOM). This problem has an impact on the performance of the CP-ANNs. Therefore, this paper proposes a novel strategy to improve the CP-ANNs by the Gram-Schmidt algorithm (GSHM) as a pre-processing step of the original data without changing their architecture. Three datasets examples from various domains, such as correlation, crop, and fertilizer, were employed for experimental validation. To obtain the results, we relied on two simulations. The first simulation uses CP-ANNs, and the datasets are inputted into the network without any prior pre-processing. The second simulation uses MCP-ANNs, and the datasets are pre-processed through the GSHM block. Experiment results show that the proposed MCP-ANNs recognize all patterns with a classification accuracy of 100% versus 62.5% for CP-ANNs in the Correlation Dataset. Furthermore, the proposed MCP-ANNs reduce the execution time and training parameter values in all datasets versus CP-ANNs. Thus, the proposed approach based on the GSHM algorithm significantly improves the performance of the CP-ANNs.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intelligent Pricing Model for Task Offloading in Unmanned Aerial Vehicle Mounted Mobile Edge Computing for Vehicular Network 基于车联网移动边缘计算的无人机任务卸载智能定价模型
IF 0.7
Journal of Communications Software and Systems Pub Date : 2022-01-01 DOI: 10.24138/jcomss-2021-0154
A. Baktayan, I. Al-Baltah, Abdul Azim Abd Ghani
{"title":"Intelligent Pricing Model for Task Offloading in Unmanned Aerial Vehicle Mounted Mobile Edge Computing for Vehicular Network","authors":"A. Baktayan, I. Al-Baltah, Abdul Azim Abd Ghani","doi":"10.24138/jcomss-2021-0154","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0154","url":null,"abstract":"— In the fifth-generation (5G) cellular network, the Mobile Network Operator (MNO), and the Mobile Edge Computing (MEC) platform will play an important role in providing services to an increasing number of vehicles. Due to vehicle mobility and the rise of computation-intensive and delay-sensitive vehicular applications, it is challenging to achieve the rigorous latency and reliability requirements of vehicular communication. The MNO, with the MEC server mounted on an unmanned aerial vehicle (UAV), should make a profit by providing its computing services and capabilities to moving vehicles. This paper proposes the use of dynamic pricing for computation offloading in UAV-MEC for vehicles. The novelty of this paper is in how the price influences offloading demand and decides how to reduce network costs (delay and energy) while maximizing UAV operator revenue, but not the offloading benefits with the mobility of vehicles and UAV. The optimization problem is formulated as a Markov Decision Process (MDP). The MDP can be solved by the Deep Reinforcement Learning (DRL) algorithm, especially the Deep Deterministic Policy Gradient (DDPG). Extensive simulation results demonstrate that the proposed pricing model outperforms greedy by 26% and random by 51% in terms of delay. In terms of system utility, the proposed pricing model outperforms greedy only by 17%. In terms of server congestion, the proposed pricing model outperforms random by 19% and is almost the same as greedy.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"20 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信