{"title":"Holomorphy in Pseudo-Euclidean Spaces and the Classic Electromagnetic Theory","authors":"Vlad L. Negulescu","doi":"10.14738/tnc.74.6936","DOIUrl":"https://doi.org/10.14738/tnc.74.6936","url":null,"abstract":"A new concept of holomorphy in pseudo-Euclidean spaces is briefly presented. The set of extended Cauchy-Riemannn differential equations, which are verified by the holomorphic functions, is obtained. A form of the general pseudo-rotation matrix was developed. The generalized d’Alembert- operator and extended Poisson’s equations are defined. Applying these results to the relativistic space-time, the charge conservation and general Maxwell equations are derived.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128777809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role of Usability on using Biometrics for Cybersecurity","authors":"Yasser M. Hausawi","doi":"10.14738/tnc.74.7244","DOIUrl":"https://doi.org/10.14738/tnc.74.7244","url":null,"abstract":"ABSTRACT \u0000Biometrics are traits that allow individuals to be identified. Popular biometrics include fingerprints, faces, and irides. A common use of biometric systems is for authentication of users desiring access to a system or resource. However, the use of biometrics presents challenges and opportunities unique to other authentication methods, such as passwords and tokens. Biometric systems are also vulnerable to poor usability. Such systems must be engineered with wide user accessibility and acceptability in mind, but must still provide robust security as well. As lack of usability causes systems' failures, and enhancing systems' usability reduces such failures. This article first presents an overview of biometric systems employed today, including their usage and security merits. We then consider the specific role usability plays on both the development and long-term utility of biometric systems used for Cybersecurity.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130687307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable Multicast Using MPLS in Software Defined Network","authors":"Lie Qian","doi":"10.14738/TNC.73.6561","DOIUrl":"https://doi.org/10.14738/TNC.73.6561","url":null,"abstract":"Multicast helps to deliver data to multiple receivers efficiently. One scalability challenge faced by multicast is the per-channel forwarding states being maintained in the network layer, which increases linearly with the number of established multicast channels. MPLS helps to alleviate this problem by removing forwarding states from non-branch routers on the multicast tree and label switch packets in non-branch routers. To reduce the number of forwarding states in branch routers, many solutions were proposed to merge multicast trees/subtrees from different channels. Software Defined Network (SDN) decouples the control plane from the data plane, which enables low cost commodity design in routers and flexible network feature deployments through software implementation in centralized controllers. Equipped with SDN’s flexible policy and packet processing action installation, multicast tree/subtree merging becomes more convenient in SDN. This paper proposes a new scalable multicast solution in SDN to further reduce the number of forwarding states in routers. In the new solution, first a 2 level MPLS label switching scheme is used to reduce the extra point to point LSPs needed when multicast trees are merged. Secondly, a new multicast tree construction algorithm is designed to pursue more aggressive subtree matching between channels by taking advantage of per channel packet dropping actions in SDN. Simulation results show that the new solution can achieve 10-20 percent reduction in the number of forwarding entries needed for multicast traffic’s forwarding.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133184320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision Matrix Equation and Block Diagram of Multilayer Electromagnetoelastic Actuator Micro and Nanodisplacement for Communications Systems","authors":"S. Afonin","doi":"10.14738/TNC.73.6564","DOIUrl":"https://doi.org/10.14738/TNC.73.6564","url":null,"abstract":"For the communications systems the parametric block diagram of the multilayer electromagnetoelastic actuator micro and nanodisplacement or the multilayer piezoactuator is determined in contrast to Cady and Mason’s electrical equivalent circuits for the calculation of the piezoelectric transmitter and receiver, the vibration piezomotor. The decision matrix equation of the multilayer electromagnetoelastic actuator is used. The parametric block diagram of multilayer electromagnetoelastic actuator is obtained with the mechanical parameters the displacement and the force. The transfer functions of the multilayer electroelastic actuator are determined. The the generalized parametric block diagram, the generalized matrix equation for the multilayer electromagnetoelastic actuator micro and nanodisplacement are obtained. The deformations of the multilayer electroelastic actuator for the nanotechnology are described by the matrix equation. Block diagram and structural-parametric model of multilayer electromagnetoelastic actuator micro and nanodisplacement of the communications systems are obtained, its transfer functions are bult. Effects of geometric and physical parameters of multilayer electromagnetoelastic actuators and external load on its dynamic characteristics are determined. For calculations the communications systems with the multilayer piezoactuator for micro and nanodisplacement the parametric block diagram and the transfer functions of the multilayer piezoactuator are obtained.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115442000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Free running VCO based on an unstable transistor circuit system stability optimization under delayed electromagnetic interferences and parasitic effects and engineering applications","authors":"O. Aluf","doi":"10.14738/TNC.73.6400","DOIUrl":"https://doi.org/10.14738/TNC.73.6400","url":null,"abstract":"In this article, Very Crucial subject discussed in free running VCO based on an unstable transistor circuit system stability optimization under delayed electromagnetic interferences and parasitic effects. Additionally we discuss Free running VCO integrated circuit applications (PLLs, DLL, clock generation, etc.). There are many techniques to generate a Wideband Frequency Modulation (WBFM) signal: analog based, digitally based and hybrid based techniques. The VCO is a very low cost method of generating WBFM signals, such as chirp signals. The VCO has some important properties that are common to all frequency sources. These properties are frequency range, settling time, post-tuning drift, sensitivity and Maximum Sensitivity Ratio (MSR), frequency total accuracy, frequency modulation span, and modulation frequency bandwidth. The VCO frequency of oscillation depends on the resonance frequency set by its equivalent capacitance and inductance. By applying variable bias voltage to a Varactor diode, the capacitance is changed and the oscillation frequency is changed accordingly. The first delay line in our circuit ( τ 1 ) represents the electromagnetic interference in the Varactor diode (D 1 ). We neglect the voltage on the first delay line (V τ 1 →ε) and the delay is on the current which flows through Varactor diode. The second and third delay lines ( τ 2 and τ 3 ) represent the circuit microstrip line's parasitic effects before and after the matching circuit. We neglect the voltages on the second and third delay lines (V τ k →ε ; k=2, 3) and the delays are only on the current which flow through the microstrip lines. The free running VCO circuit can represent as delayed differential equations which, depending on variable parameters and delays. There is a practical guideline which combines graphical information with analytical work to effectively study the local stability of models involving delay dependent parameters. The stability of a given steady state is determined by the graphs of s ome function of τ 1 , τ 2 , τ 3 . frequency, compared this to a reference signal, and then tweaked the free running VCO voltage to weak its output frequency. The PLL and VCO have been two separate chips – a discrete solution. The free running VCO creates the actual output signal; the PLL monitors the output signals and tunes the free running VCO to lock it relative to a known reference signal. There are a number of strengths to the discrete solution: Each discrete chip can be designed to give its best performance, the typical distance between the PLL and the free running VCO reduces cross-coupling effects and minimizes unwanted spurious signals on the output. In case that one chip in the loop is damaged, fewer components need to be replaced.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124807393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction of Travel Time Using Fuzzy Logic Paradigm","authors":"Abiodun Afis Ajasa","doi":"10.14738/TNC.73.6449","DOIUrl":"https://doi.org/10.14738/TNC.73.6449","url":null,"abstract":"","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127994974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault-Tolerant Adaptive Routing Algorithm for 2D Torus Network","authors":"Y. Miura, Tsukasa-Pierre Nakao, Naohisa Fukase","doi":"10.14738/TNC.71.6032","DOIUrl":"https://doi.org/10.14738/TNC.71.6032","url":null,"abstract":"A 2D torus network is one of the most popular networks for parallel processing. We have researched the North-South First (NSF) routing which is applicable to a 2D torus and combines the north-first (NF) and south-first (SF) methods. We focused on the proposal of a routing algorithm aimed at avoiding congestion of the crowded network. It was superior in congestion tolerance but not in fault tolerance. We have therefore been researching algorithms considering fault tolerance of the NSF method. In this paper we propose an NSF-FT method which is a new routing algorithm with improved fault tolerance. We evaluated the congestion resistance and fault tolerance of the proposed method by dynamic communication performance evaluation by simulation. The software simulation showed that the proposed algorithm has higher performance.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131196044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taiwo R. Oyedare, Agbotiname Lucky Imoize, Chibuike Gerald Ezekafor, S. Shetty
{"title":"Deployment of an Energy Efficient Routing Protocol for Wireless Sensor Networks Operating in a Resource Constrained Environment","authors":"Taiwo R. Oyedare, Agbotiname Lucky Imoize, Chibuike Gerald Ezekafor, S. Shetty","doi":"10.14738/TNC.71.5975","DOIUrl":"https://doi.org/10.14738/TNC.71.5975","url":null,"abstract":"Wireless Sensor Networks often exist in a resource constrained environment and the most critical limitation is energy or battery life. In most cases, the batteries cannot be recharged during operation and cannot be replaced during transmission without interfering with the quality of service. An efficient routing protocol that can prolong the life span of the energy source for mobile wireless sensor network (WSN) is proposed in this paper. Hierarchical routing protocol improved the life span by more than six times compared to direct techniques. Sets of varied parameters were used to obtain simulation results. A sample typical of a hospital layout was used in this paper. Wards were assigned varied sensor range which depicts number of patients that fall into these banded regions of clusters. Service centers were created to ensure that random mobilization of sensors/patient per round is achieved for one of the simulation option. Simulation rounds were carried out for non-hierarchical (direct) and lowenergy adaptive clustering hierarchy (LEACH) based routing protocols. Model validation was done by setting up a real life test using Wi-Fi sensor node module ESP8266 properly distributed, and this was done without mobility. Effect of base station location was also investigated and results tabulated. With improved battery and network life span from both simulation and live validation for hierarchical routing, quality of service is greatly improved in health-care deliveries; cost of replacing energy sources is reduced. Results were also compared with other similar works to support our conclusion. Though results were not exact when compared, parameters used could cause tolerable difference. Furthermore, same result could not be achieved for different locations, varied number of wards, varied number of sensor nodes per wards as well as variations in other modeling parameters.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133821246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Merging Securely M2M Protocols, Internet of Things and Cloud Computing","authors":"Dina Darwish","doi":"10.14738/TNC.71.5939","DOIUrl":"https://doi.org/10.14738/TNC.71.5939","url":null,"abstract":"The Internet of Things provides new ways for communication through the Web world using object-enabled networks. At the same time, M2M devices intercommunication and their communication through the web if they were connected to the Internet, presents new challenges, especially in security, that traditional communication models have not yet fully solved. Because of their inborn un-watched, minimal effort and mass-sent nature, M2M devices, and remote communication architectures and solutions for these devices, would encapsulate new dangers in security. These threats are not fully faced by use of security technologies and methods implemented in existing wireless devices, cellular networks or WLANs. The use of cloud computing gives a convenient, on demand and scalable network access to a shared pool of configurable computing resources and devices. This paper concentrates on a secure method to integrate the M2M protocols with the Internet of Things (IoT) and Cloud Computing under the name of Secure Machine-to-Internet Clouding (SM2IC) architecture. The secure design for integrating M2M protocols, along with IoT and cloud computing is proposed. To apply this design, an IoT enabled smart home scenario was examined to analyze secure communication between M2M devices and IoT applications. Also, the cloud computing is used to include different cloud applications, such as, IaaS, PaaS, and SaaS for monitoring the quality of service of M2M devices through IoT applications. Then, simulations were performed to test the proposed security technique, followed by conclusions and future work.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126386076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Slope-based Empirical Path Loss Prediction Models for rural networks at 2.4 GHz","authors":"J. L. Fendji, Nelson Maguelva Mafai, J. Nlong","doi":"10.14738/TNC.71.6162","DOIUrl":"https://doi.org/10.14738/TNC.71.6162","url":null,"abstract":"Despite the plethora of works on empirical path loss prediction in wireless networks, just a little is addressing rural environments. In this work, we consider slope-based empirical path loss models in wireless networks at 2.4 GHz using off-the-shelf 802.11n (one transmitter and two receivers at 150Mbp and 300Mbps). We define three scenarios usually observed in rural environment. Subsequently, we do a measurement campaign and compare results to selected prediction models. We later propose a new model based on Liechty model. The new model is compared to Liechty model in Non-Line of Sight (NLOS) and combined (LOS and NLOS) scenarios. The Liechty model provided a better prediction in NLOS scenario while the new model outperforms in combined scenario. In addition, we observe that the data rate also influences the prediction. Especially in free space scenarios, the receiver with the greater data rate provides a smaller mean error and standard deviation.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}