Youssef Fayad, M. Mostafa, Hossam Reda, K. Saad, M. Mohamed
{"title":"Improving Performance of the Fitness Exercises Repetitions Counter via Computational Complexity Reduction","authors":"Youssef Fayad, M. Mostafa, Hossam Reda, K. Saad, M. Mohamed","doi":"10.21608/ijt.2021.266219","DOIUrl":"https://doi.org/10.21608/ijt.2021.266219","url":null,"abstract":": The COVID-19 precautions had forced us to look for different techniques that enable the continuity of our ordinary life activities, especially the sports ones. In addition, the need for accurate and fast auto judgment techniques to measure physical fitness performance is constantly emerging. The artificial intelligence (AI) with multi-resolution counter had introduced method relays on Artificial Intelligence to realize this purpose, but this method has a high processing time. Modifying the algorithm structure and the inputs features leads to low computational cost. This paper presents a modified algorithm that reduces the computational costs for the optical flow equation This reduction is executed via two techniques; the first one is to execute Gunner Franeback algorithm for number of pixels less than had been used in the previous model via selecting the more weighted pixels that closer to the central pixel, the second one is to employ Model Quantization technique by using Tensor flow Lite as a proposed model. Experimental results indicate that the proposed method has low computational cost, reliable and robust, and can be applied as practical applications. The performance of the experiments was verified by comparing its time complexity with the AI with multi-resolution counter depending on ground truth data. complexity.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"17 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86302295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Application of Power Communication Technology in Smart Grid","authors":"Qian Zhou","doi":"10.18282/JNT.V2I4.1437","DOIUrl":"https://doi.org/10.18282/JNT.V2I4.1437","url":null,"abstract":"The continuous development of modern society, science and technology has promoted the rapid development of various industries in China and greatly supported social development and people’s lives. Among them, the power system is an important part. Perfecting the power system and building a high-quality power grid system need to be focused on at present. This article mainly analyzes the necessity of applying power communication technology in smart grid and the demand of smart grid for power communication technology. Some specific application suggestions are put forward for reference.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"97 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2021-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85750714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Computer Applications Based on Management of Network Information Security Technology","authors":"Xiaofeng Ma, Norriza Hussin","doi":"10.18282/jnt.v2i3.1113","DOIUrl":"https://doi.org/10.18282/jnt.v2i3.1113","url":null,"abstract":"With the rapid development of computer network, the fully opened network has greatly changed people’s production and daily life and the traditional industries are no longer closed. However, there are also many network security problems. To deal with it, this article explores the computer applications based on management of network information security technology. It analyzes the main factors threatening network information security from the security problems caused by computer applications. Combining with the application practice, specific measures are put forward for reference.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"9 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90570270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating on Topology Survivability Based on Largest Number of Node-Disjoint Paths","authors":"Qiurong Chen","doi":"10.18282/jnt.v2i3.1107","DOIUrl":"https://doi.org/10.18282/jnt.v2i3.1107","url":null,"abstract":"On the point of view of Largest Number of Node-Disjoint Path (LNNDP for short) between a node pair in a network, this article states the importance of LNNDP to global survivability of topology at first, then proposes an algorithm to compute maximal number of node-disjoint paths between node pairs. A new topology survivability metric based on LNNDP is put forward to evaluate the global survivability of network topology. It can be used to evaluate the survivability of topology provided. This metric can express accurately global topology survivability.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"38 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73160680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mingsheng Yin, Santiago Figueroa, J. Añorga, S. Arrizabalaga, Y. Sun
{"title":"IACAP: Internet-Exposed Assets Cybersecurity Analysis Platform","authors":"Mingsheng Yin, Santiago Figueroa, J. Añorga, S. Arrizabalaga, Y. Sun","doi":"10.4018/ijitn.2020100109","DOIUrl":"https://doi.org/10.4018/ijitn.2020100109","url":null,"abstract":"With the expansion and development of the internet protocol, the number of cybersecurity vulnerabilities has also increased. However, it is difficult to find a reliable way to detect the vulnerability in the internet-exposed asset. This paper proposes a new design of analysis platform that integrates the cybersecurity data and an internet-exposed asset search engine. Based on this design, it provides a convenient and up-to-date solution for the users to detect the devices' vulnerability crossing internet. Meanwhile, this platform offers suggestions in terms of resolving the cybersecurity problem.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"12 1","pages":"118-131"},"PeriodicalIF":0.8,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Computer Network Security and Preventive Measures in the Data Age","authors":"Zhi Li","doi":"10.18282/jnt.v2i1.796","DOIUrl":"https://doi.org/10.18282/jnt.v2i1.796","url":null,"abstract":"With the development of science and technology, the network in human society continues to be improved and enriched, as well as the ability of database technology, which is of super cloud computing ability and extensive data sharing and brings great convenience to the whole country. But at the same time, the data that is used improperly in the network environment not only poses a certain threat to the network system, but also gradually erodes people's lives. For the computer network security problems in the era of big data, this paper first analyzes the location of the problems, and then puts forward the means to solve and prevent the security problems.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78654521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kinjal Gala, Paul David Bryden, Christopher Paolini, Matthew Wang, Dimitrova Mihovska Albena, Mahasweta Sarkar
{"title":"Real-Time Indoor Geolocation Tracking for Assisted Healthcare Facilities.","authors":"Kinjal Gala, Paul David Bryden, Christopher Paolini, Matthew Wang, Dimitrova Mihovska Albena, Mahasweta Sarkar","doi":"10.4018/ijitn.2020040101","DOIUrl":"https://doi.org/10.4018/ijitn.2020040101","url":null,"abstract":"<p><p>A leading cause of physical injury sustained by elderly persons is the event of unintentionally falling. A delay between the time of fall and the time of medical attention can exacerbate injury if the fall resulted in a concussion, traumatic brain injury, or bone fracture. The authors present a solution capable of finding and tracking, in real-time, the location of an elderly person within an indoor facility, using only existing Wi-Fi infrastructure. This paper discusses the development of an open source software framework capable of finding the location of an individual within 3m accuracy using 802.11 Wi-Fi in good coverage areas. This framework is comprised of an embedded software layer, a Web Services layer, and a mobile application for monitoring the location of individuals, calculated using trilateration, with Kalman filtering employed to reduce the effect of multipath interference. The solution provides a real-time, low cost, extendible solution to the problem of indoor geolocation to mitigate potential harm to elderly persons who have fallen and require immediate medical help.</p>","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"12 2","pages":""},"PeriodicalIF":0.8,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4018/ijitn.2020040101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9876101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining Block DCV and Support Vector Machine for Ear Recognition","authors":"Hailong Zhao, Junyan Yi","doi":"10.4018/IJITN.2016040104","DOIUrl":"https://doi.org/10.4018/IJITN.2016040104","url":null,"abstract":"In recent years, automatic ear recognition has become a popular research. Effective feature extraction is one of the most important steps in Content-based ear image retrieval applications. In this paper, the authors proposed a new vectors construction method for ear retrieval based on Block Discriminative Common Vector. According to this method, the ear image is divided into 16 blocks firstly and the features are extracted by applying DCV to the sub-images. Furthermore, Support Vector Machine is used as classifier to make decision. The experimental results show that the proposed method performs better than classical PCA+LDA, so it is an effective human ear recognition method.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"8 1","pages":"36-44"},"PeriodicalIF":0.8,"publicationDate":"2016-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Secret Key Generation Method in OFDM System for Physical Layer Security","authors":"Wang Dong, H. Aiqun, Peng Linning","doi":"10.4018/IJITN.2016010103","DOIUrl":"https://doi.org/10.4018/IJITN.2016010103","url":null,"abstract":"In this paper, a novel physical layer key generation method for extracting secret key from mutual channel information in orthogonal frequency division multiplexing OFDM systems has been proposed. Firstly, a well-designed data extraction process has been introduced to reduce the redundancy and inconsistency of channel state information CSI. After that, a new quantization method using gray code is proposed. Furthermore, an associated method is designed to reduce key error rate KER. With these improvements, higher key generation rate KGR can be obtained compared to existing methods. Finally, available secret keys have been generated after information reconciliation and privacy amplification. The proposed method has been analyzed and verified in long term evolution advanced LTE-A systems and the generated secret keys have passed randomness test.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"8 1","pages":"21-34"},"PeriodicalIF":0.8,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4018/IJITN.2016010103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ding Fei, T. En, Zhiwen Pan, Xiaohu You, Song Aigu
{"title":"An Optimal Switching-off eNB Selection Algorithm in LTE Hyper-dense Networks","authors":"Ding Fei, T. En, Zhiwen Pan, Xiaohu You, Song Aigu","doi":"10.4018/IJITN.2015100105","DOIUrl":"https://doi.org/10.4018/IJITN.2015100105","url":null,"abstract":"Although the application of the exhaustive search ES algorithm in the energy conservation strategy can realize the simultaneous switching off of multiple eNBs in the existing eNB-based Evolved Node B networks, it fails to satisfy the practical requirement of network deployment with the heavy computation burden. On account of this, this paper proposes an optimal switching-off eNB selection OSS algorithm in homogeneous networks. By selecting a certain cell within the coverage of multiple eNBs, the OSS algorithm can make an evaluation of the increment of network load caused by the switching off of various eNBs in the coverage area. Then it can sort one by one all of the eNBs that are to be switched off under the condition that the QoS Quality of service requirement of all of the users has been met. Afterwards, the OSS algorithm will switch the users according to the principle of least network load increment and eventually find an eNB that shows the optimal energy saving effect in sleep mode. The simulation results reveal that the OSS algorithm can satisfy the requirement of efficient energy conservation in wireless networks. Additionally, with low computational complexity, it also will facilitate network deployment.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"125 4 1","pages":"57-68"},"PeriodicalIF":0.8,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}