Wageda Alsobky, Abdelkader Ismail, A. Mohra, Ayman M. Hassan, Ayman Abdelaziem
{"title":"Design and Implementation of Advanced Encryption Standard by New Substitution Box in Galois Field (𝟐𝟖)","authors":"Wageda Alsobky, Abdelkader Ismail, A. Mohra, Ayman M. Hassan, Ayman Abdelaziem","doi":"10.21608/ijt.2022.266474","DOIUrl":"https://doi.org/10.21608/ijt.2022.266474","url":null,"abstract":": An inverse multiplexing method for irreducible polynomials is presented in this paper based on the theory of substitution boxes. The method is based on the theory of substitution boxes. Following a series of successful experiments, the new approach was put into practice. For reasons of increased complexity and security, the affine conversion period in the Galois field (2^8) has been increased to the maximum value of the period between input and output of 102, the Strict Avalanche Criterion (SAC) has been reduced to nearly half of its original value, and the results are bijective as a result. It was decided to use the number 112 after the Bit Independent Criterion effect had been reduced to produce good results. These breakthroughs are being used to protect information security and to strengthen the advanced encryption standard that is currently in use, according to the researchers. In addition to the addition of a new s-box, their encryption will be more secure and private, making our services even more valuable. Field, Bijective, Balance, SAC.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"117 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73749852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and Analysis Ads Through the Mini-Programs","authors":"Biao Liu, Lin jie Liu, Jianyi Zhang","doi":"10.4018/ijitn.309700","DOIUrl":"https://doi.org/10.4018/ijitn.309700","url":null,"abstract":"Due to the widespread application and rapid delivery of advertisements for mini-programs, mini-program users are increasingly being harassed by advertisements. However, due to the existence of mini-programs dependent on the corresponding platforms, traditional advertising detection methods cannot detect the advertisements of the mini-programs. In the process of collecting and studying advertising problems, the authors have developed a framework that can run continuously almost without human intervention. They have analyzed 4853 mini-programs in total and got a general understanding of the problems of mini-programs' advertisements. There are several interesting findings, such as frequent pop-up advertisements, redirection, pornographic advertisements, etc. The authors have further detected pornographic advertisements and analyzed the links obtained in mini-programs to identify the malicious nature of the links. Broadly speaking, the framework collects the advertising problems of mini-programs and detects and analyzes some advertisements and malicious links to strengthen the supervision of the platform.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48188843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joanne C. Peca, Galen A. Grimes, M. Nasereddin, Edward J. Glantz
{"title":"A Review of COVID-19 Mobile Contact Tracing Applications and Their Impact on Privacy","authors":"Joanne C. Peca, Galen A. Grimes, M. Nasereddin, Edward J. Glantz","doi":"10.4018/ijitn.309696","DOIUrl":"https://doi.org/10.4018/ijitn.309696","url":null,"abstract":"Contact tracing is a well-established process that has been utilized for years to assist in the effort to control the spread of contagious diseases. The rapid onset and spread of COVID-19 brought about the need for digital solutions which would help to speed up the collection and analysis of relevant health information. With the proliferation of mobile devices, the development of mobile device-based digital contact tracing applications appeared to be the solution. As countries around the globe created digital contact tracing applications for use by their respective populations, a variety of factors allowed for success for some and resulted in failure for others. This review highlights example countries with respect to their unique COVID-19 digital contact tracing solutions, the success or failure of the applications employed on mobile platforms, and the factors which have contributed to the success or failure of these solutions. Additionally, a review of research around data privacy and security in digital contact tracing apps is included.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41421788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"5G Mid-Range Electromagnetic Spectrum Implementation for Critical Infrastructure Development","authors":"U. O. Matthew, J. S. Kazaure, Prisca I. Okochi","doi":"10.4018/ijitn.307103","DOIUrl":"https://doi.org/10.4018/ijitn.307103","url":null,"abstract":"The current research analysed the existing literature on the electromagnetic spectrum influences and made significant contributions in the perspective of the ongoing insinuations of electromagnetic frequency radiation emitted from the novel 5G network technology installations. In this case, the contemporary 5G network technology was tested along ANALOGY1, ANALOGY 2 and ANALOGY3 to find out if 5G network does emit electromagnetic non-ionizing radiation capable of destroying human body cells as already alleged. The paper observed that deploying the standalone 5G network on unmodulated ultra-high frequency beyond 20Gigahertz will produce non-ionizable, non-visible radiation (electrons and protons interacting as fields) capable of adverse health effect including heating up the human skin through polarisation and dipolar moment urtication , thereby destabilising the equilibrium of the human DNA charged particles through the formation of free radicals that are highly reactive due to the presence of unpaired electrons that occurred when water molecules are broken within the human cell.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49086803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Coronavirus Pandemic (COVID-19) and Cooperative-Intelligent Transport Systems","authors":"Bettina Arnegger","doi":"10.4018/ijitn.311827","DOIUrl":"https://doi.org/10.4018/ijitn.311827","url":null,"abstract":"Cooperative-intelligent transport systems (C-ITS) are a solution for the manifold challenges of traffic as well as a major competitive stepping stone for the European automotive and tele-communication industry. However, against the backdrop of far-reaching COVID-19 impacts, the management of such complex C-ITS megaprojects needs to be adapted. Insights from most recent research contributions on megaproject management and the unexpected have shown that fostering a common sense of action, intense and efficient communication, and a strong organizational culture can help C-ITS projects to cope with the unprecedented situation. The institutional role model has proven to be an effective implementation framework for employing such project management methods in the C-ITS context. By combining different strands of research in an analysis of the intersection between recent C-ITS findings and theory on megaproject management and the unexpected, this article contributes to a holistic understanding of the impact of COVID-19 on C-ITS.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44902514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency Domain Transformations and CNNs to Predict Unlabeled Shark Behavior With GPS Data","authors":"Geoffrey Daniel Farthing, Hen-Guel Yeh","doi":"10.4018/ijitn.309698","DOIUrl":"https://doi.org/10.4018/ijitn.309698","url":null,"abstract":"This paper provides a comprehensive analysis of frequency domain transformations applied to convolutional neural networks (CNN) to model and predict unlabeled shark behavior in the open ocean with GPS position data. The frequency domain-based CNN networks are compared against the time domain CNN to contrast the two CNN architectures. The shark behavior data were obtained through two datasets where tri-axis accelerometer data were collected from live sharks. The first dataset was from the CSULB Shark Lab and consisted of labeled shark behavior into four shark behavioral categories. The second dataset used in this study was unlabeled and recorded from sharks in the open ocean and had GPS positioning data and depth data points. Findings show that the CNN architecture based on the frequency domain slightly outperforms time-based CNNs for classifying California horn shark behavior. Through spectral density analysis, prominent features are extracted and allow for distinguishing the shark behaviors.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44761106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Derek M. Mata, Raffael Pillai, Ryan Sandoval, Shaker Ahmed, Do gyu Lee, Martin O'Connell, Joshua J. Kidwell, S. Dobbs, Zhen Yu
{"title":"Autonomous Flight of High-Endurance UAVs to Monitor Powerlines","authors":"Derek M. Mata, Raffael Pillai, Ryan Sandoval, Shaker Ahmed, Do gyu Lee, Martin O'Connell, Joshua J. Kidwell, S. Dobbs, Zhen Yu","doi":"10.4018/ijitn.309699","DOIUrl":"https://doi.org/10.4018/ijitn.309699","url":null,"abstract":"In this project, the authors will develop a highly efficient UAV (unmanned aerial vehicle) architecture for long endurance flights. The authors propose an IoT (internet of things) model that will connect a network of drones using a 4G LTE (long-term evolution) connection. The researchers also propose the use of MEC (mobile edge computing) stations, smart GCSs (ground control stations) for battery replacement, and wireless charging via powerline magnetic field harvesting. The authors will be applying these ideas to a powerline monitoring mission profile, creating a large sensor network with computer vision capabilities to detect powerline faults and report them to the proper authorities.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45570971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tamer R. Omar, Van-Tao Chau, Marco Antonio Gallardo, Daniel R. Lopez, Alex Xavier Pazmino
{"title":"Autonomous Rover for Groundwork Lawn Mowing","authors":"Tamer R. Omar, Van-Tao Chau, Marco Antonio Gallardo, Daniel R. Lopez, Alex Xavier Pazmino","doi":"10.4018/ijitn.309704","DOIUrl":"https://doi.org/10.4018/ijitn.309704","url":null,"abstract":"The objective of this paper is to design and implement a lawnmower robot that can be used to mow grass from lawns and playgrounds remotely, online, or autonomously. The robot follows a rectangle zigzag trajectory through the lawn without any human interference. A set of concurrently running behaviors are defined to perform mowing operation. Sonar ranging is used to detect and avoid obstacles continuously throughout the route. The micro-controller connects to an ethernet board and uploads the robot's functions to a web server. Through the web server, users can monitor a 3D model of the moving rover and data from the lawnmower sensors. In addition, the robot's behaviors and connections are uploaded to IoT analytics platform to aid the performance evaluation and feature development.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48974263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Network Anomaly Detection for Optimized Decision Development","authors":"Harshit Srivastava, E. Sheybani, R. Sankar","doi":"10.4018/ijitn.309697","DOIUrl":"https://doi.org/10.4018/ijitn.309697","url":null,"abstract":"The paper presents the development of systems for improved source selection in a process that creates real-time categorization of events using only posts collected through various sensing applications that use social networks (such as Twitter or other mass dissemination networks) for reporting. The system recognizes critical instances in applications and simply views essential information from users (either by explicit user action or by default, as on Twitter) within the event and provides a textual description. As a result, social networks open up unprecedented possibilities for creating sensing applications by representing a set of tweets generated in a limited timeframe as a weighted network for influence concerning users. Obtaining data from a network of social site users substantiates the quality and dependability of data. It collects many users' dynamic behavior to construct and disseminate related information across the channel. The goal is to find a link between various data sources for event abnormalities.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48080012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Nuha, Endro Ariyanto, Priyagung Yogitama, Ryan Wicaksono
{"title":"Modified Multipath Transmission Control Protocol Using Logarithmic Increase Under Long-Term Evolution and Wi-Fi Networks","authors":"H. Nuha, Endro Ariyanto, Priyagung Yogitama, Ryan Wicaksono","doi":"10.4018/ijitn.311828","DOIUrl":"https://doi.org/10.4018/ijitn.311828","url":null,"abstract":"Multipath transmission control protocol (MPTCP) has been proposed for devices with multiple network interfaces. This idea seems to be impossible for user implementation at the beginning of its proposal. However, the emergence of smartphones with multiple network access allows this idea to be implemented. This paper provides both theoretical and empirical throughput analysis of MPTCP under long term evolution (LTE) and Wi-Fi networks. First, a new modified congestion control is presented as an enhancement of standard TCP Reno using logarithmic function. Second, the existing MPTCP approaches like linked increase algorithm (LIA) and balanced LIA (BALIA) are discussed briefly. Finally, the experimental results under long term evolution (LTE) and Wi-Fi under software defined wireless networking (SDWN) are given along with the analysis. The experimental result shows that the proposed congestion control achieves higher average congestion window size. The BALIA MPTCP is shown to have higher throughput than that of the LIA MPTCP.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41550530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}