International Journal of Interdisciplinary Telecommunications and Networking最新文献

筛选
英文 中文
Improving Performance of the Fitness Exercises Repetitions Counter via Computational Complexity Reduction 通过降低计算复杂度来提高健身练习重复计数器的性能
IF 0.8
International Journal of Interdisciplinary Telecommunications and Networking Pub Date : 2021-12-18 DOI: 10.21608/ijt.2021.266219
Youssef Fayad, M. Mostafa, Hossam Reda, K. Saad, M. Mohamed
{"title":"Improving Performance of the Fitness Exercises Repetitions Counter via Computational Complexity Reduction","authors":"Youssef Fayad, M. Mostafa, Hossam Reda, K. Saad, M. Mohamed","doi":"10.21608/ijt.2021.266219","DOIUrl":"https://doi.org/10.21608/ijt.2021.266219","url":null,"abstract":": The COVID-19 precautions had forced us to look for different techniques that enable the continuity of our ordinary life activities, especially the sports ones. In addition, the need for accurate and fast auto judgment techniques to measure physical fitness performance is constantly emerging. The artificial intelligence (AI) with multi-resolution counter had introduced method relays on Artificial Intelligence to realize this purpose, but this method has a high processing time. Modifying the algorithm structure and the inputs features leads to low computational cost. This paper presents a modified algorithm that reduces the computational costs for the optical flow equation This reduction is executed via two techniques; the first one is to execute Gunner Franeback algorithm for number of pixels less than had been used in the previous model via selecting the more weighted pixels that closer to the central pixel, the second one is to employ Model Quantization technique by using Tensor flow Lite as a proposed model. Experimental results indicate that the proposed method has low computational cost, reliable and robust, and can be applied as practical applications. The performance of the experiments was verified by comparing its time complexity with the AI with multi-resolution counter depending on ground truth data. complexity.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"17 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86302295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Application of Power Communication Technology in Smart Grid 电力通信技术在智能电网中的应用研究
IF 0.8
International Journal of Interdisciplinary Telecommunications and Networking Pub Date : 2021-01-31 DOI: 10.18282/JNT.V2I4.1437
Qian Zhou
{"title":"Research on the Application of Power Communication Technology in Smart Grid","authors":"Qian Zhou","doi":"10.18282/JNT.V2I4.1437","DOIUrl":"https://doi.org/10.18282/JNT.V2I4.1437","url":null,"abstract":"The continuous development of modern society, science and technology has promoted the rapid development of various industries in China and greatly supported social development and people’s lives. Among them, the power system is an important part. Perfecting the power system and building a high-quality power grid system need to be focused on at present. This article mainly analyzes the necessity of applying power communication technology in smart grid and the demand of smart grid for power communication technology. Some specific application suggestions are put forward for reference.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"97 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2021-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85750714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Computer Applications Based on Management of Network Information Security Technology 基于网络信息安全技术管理的计算机应用研究
IF 0.8
International Journal of Interdisciplinary Telecommunications and Networking Pub Date : 2020-10-15 DOI: 10.18282/jnt.v2i3.1113
Xiaofeng Ma, Norriza Hussin
{"title":"Research on Computer Applications Based on Management of Network Information Security Technology","authors":"Xiaofeng Ma, Norriza Hussin","doi":"10.18282/jnt.v2i3.1113","DOIUrl":"https://doi.org/10.18282/jnt.v2i3.1113","url":null,"abstract":"With the rapid development of computer network, the fully opened network has greatly changed people’s production and daily life and the traditional industries are no longer closed. However, there are also many network security problems. To deal with it, this article explores the computer applications based on management of network information security technology. It analyzes the main factors threatening network information security from the security problems caused by computer applications. Combining with the application practice, specific measures are put forward for reference.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"9 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90570270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating on Topology Survivability Based on Largest Number of Node-Disjoint Paths 基于最大节点不相交路径数的拓扑生存性评价
IF 0.8
International Journal of Interdisciplinary Telecommunications and Networking Pub Date : 2020-10-15 DOI: 10.18282/jnt.v2i3.1107
Qiurong Chen
{"title":"Evaluating on Topology Survivability Based on Largest Number of Node-Disjoint Paths","authors":"Qiurong Chen","doi":"10.18282/jnt.v2i3.1107","DOIUrl":"https://doi.org/10.18282/jnt.v2i3.1107","url":null,"abstract":"On the point of view of Largest Number of Node-Disjoint Path (LNNDP for short) between a node pair in a network, this article states the importance of LNNDP to global survivability of topology at first, then proposes an algorithm to compute maximal number of node-disjoint paths between node pairs. A new topology survivability metric based on LNNDP is put forward to evaluate the global survivability of network topology. It can be used to evaluate the survivability of topology provided. This metric can express accurately global topology survivability.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"38 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73160680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IACAP: Internet-Exposed Assets Cybersecurity Analysis Platform 互联网资产网络安全分析平台
IF 0.8
International Journal of Interdisciplinary Telecommunications and Networking Pub Date : 2020-10-01 DOI: 10.4018/ijitn.2020100109
Mingsheng Yin, Santiago Figueroa, J. Añorga, S. Arrizabalaga, Y. Sun
{"title":"IACAP: Internet-Exposed Assets Cybersecurity Analysis Platform","authors":"Mingsheng Yin, Santiago Figueroa, J. Añorga, S. Arrizabalaga, Y. Sun","doi":"10.4018/ijitn.2020100109","DOIUrl":"https://doi.org/10.4018/ijitn.2020100109","url":null,"abstract":"With the expansion and development of the internet protocol, the number of cybersecurity vulnerabilities has also increased. However, it is difficult to find a reliable way to detect the vulnerability in the internet-exposed asset. This paper proposes a new design of analysis platform that integrates the cybersecurity data and an internet-exposed asset search engine. Based on this design, it provides a convenient and up-to-date solution for the users to detect the devices' vulnerability crossing internet. Meanwhile, this platform offers suggestions in terms of resolving the cybersecurity problem.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"12 1","pages":"118-131"},"PeriodicalIF":0.8,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Computer Network Security and Preventive Measures in the Data Age 数据时代计算机网络安全与防范措施分析
IF 0.8
International Journal of Interdisciplinary Telecommunications and Networking Pub Date : 2020-04-30 DOI: 10.18282/jnt.v2i1.796
Zhi Li
{"title":"Analysis of Computer Network Security and Preventive Measures in the Data Age","authors":"Zhi Li","doi":"10.18282/jnt.v2i1.796","DOIUrl":"https://doi.org/10.18282/jnt.v2i1.796","url":null,"abstract":"With the development of science and technology, the network in human society continues to be improved and enriched, as well as the ability of database technology, which is of super cloud computing ability and extensive data sharing and brings great convenience to the whole country. But at the same time, the data that is used improperly in the network environment not only poses a certain threat to the network system, but also gradually erodes people's lives. For the computer network security problems in the era of big data, this paper first analyzes the location of the problems, and then puts forward the means to solve and prevent the security problems.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78654521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Indoor Geolocation Tracking for Assisted Healthcare Facilities. 辅助医疗设施的实时室内地理位置跟踪。
IF 0.8
International Journal of Interdisciplinary Telecommunications and Networking Pub Date : 2020-01-01 DOI: 10.4018/ijitn.2020040101
Kinjal Gala, Paul David Bryden, Christopher Paolini, Matthew Wang, Dimitrova Mihovska Albena, Mahasweta Sarkar
{"title":"Real-Time Indoor Geolocation Tracking for Assisted Healthcare Facilities.","authors":"Kinjal Gala,&nbsp;Paul David Bryden,&nbsp;Christopher Paolini,&nbsp;Matthew Wang,&nbsp;Dimitrova Mihovska Albena,&nbsp;Mahasweta Sarkar","doi":"10.4018/ijitn.2020040101","DOIUrl":"https://doi.org/10.4018/ijitn.2020040101","url":null,"abstract":"<p><p>A leading cause of physical injury sustained by elderly persons is the event of unintentionally falling. A delay between the time of fall and the time of medical attention can exacerbate injury if the fall resulted in a concussion, traumatic brain injury, or bone fracture. The authors present a solution capable of finding and tracking, in real-time, the location of an elderly person within an indoor facility, using only existing Wi-Fi infrastructure. This paper discusses the development of an open source software framework capable of finding the location of an individual within 3m accuracy using 802.11 Wi-Fi in good coverage areas. This framework is comprised of an embedded software layer, a Web Services layer, and a mobile application for monitoring the location of individuals, calculated using trilateration, with Kalman filtering employed to reduce the effect of multipath interference. The solution provides a real-time, low cost, extendible solution to the problem of indoor geolocation to mitigate potential harm to elderly persons who have fallen and require immediate medical help.</p>","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"12 2","pages":""},"PeriodicalIF":0.8,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4018/ijitn.2020040101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9876101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Combining Block DCV and Support Vector Machine for Ear Recognition 基于分块DCV和支持向量机的人耳识别
IF 0.8
International Journal of Interdisciplinary Telecommunications and Networking Pub Date : 2016-04-01 DOI: 10.4018/IJITN.2016040104
Hailong Zhao, Junyan Yi
{"title":"Combining Block DCV and Support Vector Machine for Ear Recognition","authors":"Hailong Zhao, Junyan Yi","doi":"10.4018/IJITN.2016040104","DOIUrl":"https://doi.org/10.4018/IJITN.2016040104","url":null,"abstract":"In recent years, automatic ear recognition has become a popular research. Effective feature extraction is one of the most important steps in Content-based ear image retrieval applications. In this paper, the authors proposed a new vectors construction method for ear retrieval based on Block Discriminative Common Vector. According to this method, the ear image is divided into 16 blocks firstly and the features are extracted by applying DCV to the sub-images. Furthermore, Support Vector Machine is used as classifier to make decision. The experimental results show that the proposed method performs better than classical PCA+LDA, so it is an effective human ear recognition method.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"8 1","pages":"36-44"},"PeriodicalIF":0.8,"publicationDate":"2016-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Secret Key Generation Method in OFDM System for Physical Layer Security 一种新的OFDM系统物理层安全密钥生成方法
IF 0.8
International Journal of Interdisciplinary Telecommunications and Networking Pub Date : 2016-01-01 DOI: 10.4018/IJITN.2016010103
Wang Dong, H. Aiqun, Peng Linning
{"title":"A Novel Secret Key Generation Method in OFDM System for Physical Layer Security","authors":"Wang Dong, H. Aiqun, Peng Linning","doi":"10.4018/IJITN.2016010103","DOIUrl":"https://doi.org/10.4018/IJITN.2016010103","url":null,"abstract":"In this paper, a novel physical layer key generation method for extracting secret key from mutual channel information in orthogonal frequency division multiplexing OFDM systems has been proposed. Firstly, a well-designed data extraction process has been introduced to reduce the redundancy and inconsistency of channel state information CSI. After that, a new quantization method using gray code is proposed. Furthermore, an associated method is designed to reduce key error rate KER. With these improvements, higher key generation rate KGR can be obtained compared to existing methods. Finally, available secret keys have been generated after information reconciliation and privacy amplification. The proposed method has been analyzed and verified in long term evolution advanced LTE-A systems and the generated secret keys have passed randomness test.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"8 1","pages":"21-34"},"PeriodicalIF":0.8,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4018/IJITN.2016010103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Optimal Switching-off eNB Selection Algorithm in LTE Hyper-dense Networks LTE超密集网络中最优关闭eNB选择算法
IF 0.8
International Journal of Interdisciplinary Telecommunications and Networking Pub Date : 2015-10-01 DOI: 10.4018/IJITN.2015100105
Ding Fei, T. En, Zhiwen Pan, Xiaohu You, Song Aigu
{"title":"An Optimal Switching-off eNB Selection Algorithm in LTE Hyper-dense Networks","authors":"Ding Fei, T. En, Zhiwen Pan, Xiaohu You, Song Aigu","doi":"10.4018/IJITN.2015100105","DOIUrl":"https://doi.org/10.4018/IJITN.2015100105","url":null,"abstract":"Although the application of the exhaustive search ES algorithm in the energy conservation strategy can realize the simultaneous switching off of multiple eNBs in the existing eNB-based Evolved Node B networks, it fails to satisfy the practical requirement of network deployment with the heavy computation burden. On account of this, this paper proposes an optimal switching-off eNB selection OSS algorithm in homogeneous networks. By selecting a certain cell within the coverage of multiple eNBs, the OSS algorithm can make an evaluation of the increment of network load caused by the switching off of various eNBs in the coverage area. Then it can sort one by one all of the eNBs that are to be switched off under the condition that the QoS Quality of service requirement of all of the users has been met. Afterwards, the OSS algorithm will switch the users according to the principle of least network load increment and eventually find an eNB that shows the optimal energy saving effect in sleep mode. The simulation results reveal that the OSS algorithm can satisfy the requirement of efficient energy conservation in wireless networks. Additionally, with low computational complexity, it also will facilitate network deployment.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":"125 4 1","pages":"57-68"},"PeriodicalIF":0.8,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信