Frequency: Quarterly E- ISSN: 2277-2235 P- ISSN: 2349-3488 Abstracted/ Indexed in: Ulrich's International Periodical Directory, Google Scholar, SCIRUS, Genamics JournalSeek, EBSCO Information Services
Quarterly published in print and online "Inventi Impact: Computer Networks & Communications" publishes high quality unpublished as well as high impact pre-published research and reviews catering to the needs of researchers and professional engineers. The journal deals with multiple aspects of computer networks & communications such as: Network Protocols & Wireless Networks, Network Architectures, Next Generation Internet, Ubiquitous Networks, Heterogeneous Wireless Networks, Self-Organizing Networks and Networked Systems, and Optical Networking etc.
With the development of SDN, end-to-end network reservation becomes a reality. Resource reservation can\nbecome an online service for network users, and the network faces new challenges on how to allocate users�\nresource dynamically. To solve the problem, this paper proposed a bat-based algorithm for SDN network\nscheduling along with a network request model. The network resource request model is for characterizing users�\nsimultaneous network resource request in SDN. Based on the model, this paper transforms the resource reservation\nproblem into a multiple-knapsack problem and proposes a bat algorithm to optimize the solution. Experiments\nshow that the proposed algorithm is better than greedy and dynamic programming algorithm. The major\ncontribution of this paper is to model the SDN users� resource requests and apply bat algorithm for the solution....
Although relaying can be very beneficial for wireless systems, understanding which relaying schemes can achieve specific\r\nperformance objectives under realistic fading is crucial. In this paper we present a general framework for modeling and evaluating\r\nthe performance of dual-hop decode-and-forward (DF) relaying schemes over independent and not necessarily identically\r\ndistributed (INID) Nakagami-m fading channels.We obtain closed-form expressions for the statistics of the instantaneous output\r\nsignal-to-noise ratio of repetitive transmission with selection diversity. Furthermore, we present a unified statistical overview of\r\nother three significant relaying schemes with DF, one based on repetitive transmission with maximal-ratio diversity and the other\r\ntwo based on relay selection (RS). To compare the considered schemes, we present closed-form and analytical expressions for\r\nthe outage probability and the average symbol error probability under various modulation methods, respectively. Importantly,\r\nit is shown that when the channel state information for RS is perfect, RS-based schemes always outperform repetitive ones.\r\nFurthermore, when the direct link between the source and the destination nodes is sufficiently strong, relaying may not result\r\nin any gains, and it should be switched off....
This investigation has presented an approach to Extractive Automatic Text Summarization (EATS). A framework focused on the summary of a single document has been developed, using the Tf-ldf method (Frequency Term, Inverse Document Frequency) as a reference, dividing the document into a subset of documents and generating value of each of the words contained in each document, those documents that show Tf-Idf equal or higher than the threshold are those that represent greater importance, therefore; can be weighted and generate a text summary according to the user’s request. This document represents a derived model of text mining application in today’s world. We demonstrate the way of performing the summarization. Random values were used to check its performance. The experimented results show a satisfactory and understandable summary and summaries were found to be able to run efficiently and quickly, showing which are the most important text sentences according to the threshold selected by the user....
In recent times, the advent of innovative technological paradigms like the Internet of Things has paved the way for numerous applications that enhance the quality of human life. A remarkable application of IoT that has emerged is the Internet of Vehicles (IoV), motivated by an unparalleled surge of connected vehicles on the roads. IoV has become an area of significant interest due to its potential in enhancing traffic safety as well as providing accurate routing information. The primary objective of IoV is to maintain strict latency standards while ensuring confidentiality and security. Given the high mobility and limited bandwidth, vehicles need to have rapid and frequent authentication. Securing Vehicle-to-Roadside unit (V2R) and Vehicle-to-Vehicle (V2V) communications in IoV is essential for preventing critical information leakage to an adversary or unauthenticated users. To address these challenges, this paper proposes a novel mutual authentication protocol which incorporates hardware-based security primitives, namely physically unclonable functions (PUFs) with Multi-Input Multi-Output (MIMO) physical layer communications. The protocol allows a V2V and V2R to mutually authenticate each other without the involvement of a trusted third-party (server). The protocol design effectively mitigates modeling attacks and impersonation attempts, where the accuracy of predicting the value of each PUF response bit does not exceed 54%, which is equivalent to a random guess....
Tag collision is one of the critical problems in radiofrequency identification (RFID) technology which can be widely used to identify objects using tag attachment automatically. Through the transmission and reflection of wireless radiofrequency signals, noncontact identification is realized. However, when multiple tags respond to the reader simultaneously, a collision occurs, significantly degrading the identification performance of RFID systems. To tackle the tag collisions, we propose a fast hybrid strategy-based RFID anticollision (FHS-RAC) protocol. Based on the conventional query tree algorithm, the proposed FHS-RAC makes full use of collision bits and the total response bits to achieve the faster tag identification. Extensive simulations and experiments verify the feasibility and effectiveness of our proposed scheme....
Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection. To protect data from unauthorized disclosure and modification, a secure algorithm should be used. Many techniques have been proposed to encrypt text to an image. Most past studies used RGB layers to encrypt text to an image. In this paper, a Text-to-Image Encryption-Decryption (TTIED) algorithm based on Cyan, Magenta, Yellow, Key/Black (CMYK) mode is proposed to improve security, capacity, and processing time. The results show that the capacity increased from one to four times compared to RGB mode. Security was also improved due to a decrease in the probability of an adversary discovering keys. The processing time ranged between 0.001 ms (668 characters) and 31 s (25 million characters), depending on the length of the text. The compression rate for the encrypted file was decreased compared to WinRAR. In this study, Arabic and English texts were encrypted and decrypted....
Power line communications (PLCs) refer to a technology based on the existing electrical wiring to transmit data among the devices\nconnected to the network. The PLC technology is an excellent solution widely studied and analysed by researchers, even in those\nareas characterized by strict requirements, such as industries. In this paper, a technique based on fuzzy logic, for the dynamic\nmanagement of the amplitude of the signal emitted by the devices of a power line network, is proposed.Themain aim is to manage\nthe amplitude of the transmission signal in order to reduce the noise introduced into the network, and, as a consequence, the\npower consumption, increasing data transmission quality of network in terms of Quality of Service (QoS). This solution has been\nimplemented into embedded systems based on the ADD1010, a power line System on Chip (SoC), and tested through a real scenario\nrealized in laboratory....
In order to catch the express train of the digital age and seize the opportunities brought by the development of blockchain technology, many government departments have begun to build blockchain-based data sharing protocols. Most existing data sharing protocols are built on different blockchains with different specific features. The interaction between them is not trivial, leading to the phenomenon of “data islands.” Therefore, we consider building a data sharing protocol compatible with various blockchains. In this work, we propose a generalized blockchain-based data sharing protocol, which takes fairness, privacy, auditability, and generality into account simultaneously. With adaptor signature and zero-knowledge techniques, the proposed protocol ensures a secure and fair data sharing process and is compatible with various blockchains since it only requires the underlying blockchain to perform signature verification. Finally, we implement our construction on an Ethereum test network and conduct a series of experiments. The results demonstrate the practicality of our construction while remaining good functionalities....
Images get degraded because of unbalanced enlightenment including text-smearing, ink-bleeding, degradation of ink over time, manuscript characters from background coming out and blended with the characters of the main side etc. So, degraded-document enhancement is a challenging issue. In recent years, several binarization approaches are proposed to enhance these images. These techniques have focused on finding a suitable global threshold value or a local threshold value for every region to eliminate the degradations. A hybrid approach can be a good solution to deal with all these matters together. This paper proposes a hybrid approach of binarization for degraded documents to produce better quality result. Then, the performance of the proposed technique is evaluated using DIBCO 2010 to DIBCO 2018 databases and compared with the existing methods which confirmed that the proposed method is robust, efficient. Finally, a direction towards future works and challenges is stated....
We introduce an improved image transmission scheme over wireless channels with flat Rayleigh fading. The proposed scheme\r\njointly optimizes bit power and modulation level to maximize the peak signal-to-noise ratio (PSNR) of the reconstructed image\r\nand hence improves the perceptual quality of the received image. In this optimization process, the significance of bits with regard to\r\nthe overall quality of the image is exploited. The optimality of the proposed algorithm is demonstrated using the Lagrange method\r\nand verified through an iterative offline exhaustive search algorithm. For practical implementation, a look-up table is used at the\r\ntransmitter for assigning the bit power and modulation level to each bit stream according to the received signal-to-noise ratio\r\n(SNR) observed at the receiver. The proposed scheme has low complexity since the look-up table is computed offline, only once,\r\nand used for any image which makes it suitable for devices with limited processing capability. Analytical and simulation results\r\nshow that the proposed scheme with jointly optimized bit power and variable modulation level provides an improvement in PSNR\r\nof about 10 to 20 dB over fixed power fixed modulation (16-QAM). A further reduction in complexity is achieved by using the\r\naverage signal-to-noise ratio rather than the instantaneous SNR in selecting the system parameters....
Loading....