Статьи журнала - International Journal of Wireless and Microwave Technologies

Все статьи: 532

Study on Thickness Calculation Method for Undigraph

Study on Thickness Calculation Method for Undigraph

Yan Cui, Chao-Dong Cui

Статья научная

How to solve the thickness of general graph is an unsolved problem and one of many difficult problems in graph theory. This paper studies the method for calculating the thickness of undigraph and proposes formula and concrete method for calculating the thickness of undigraph G. Meanwhile, method is proposed for testing whether division of side-derived subgraphs is correct. Some instances presented in this paper aims at illustrating the actual application and correctness of calculation of this method for reference.

Бесплатно

Study on the Distribution of Networked Devices’ Clock Skew

Study on the Distribution of Networked Devices’ Clock Skew

Jiao Chengbo, Zheng Hui

Статья научная

Clock skews of devices on the Internet are viewed as one way delay noise, but their distribution is unknown. We explore the distribution of clock skews to see the conflict probability. In this paper, we introduce an accurate clock skew estimation algorithm to filter inaccurate clock skew estimation by comparing the results between linear programming method and least square fitting. Delay jitter and other noises affect the estimation result. When the difference of two methods is large, the estimation result is unstable and inaccurate, so the estimation result should be dropped. Based on this algorithm, we use traces of real Internet measurements to collect 1825 accurate clock skews of different devices to establish a fingerprint database. Furthermore, we show the distribution of clock skews and comparing conflict probability with different number of devices. The distribution shows that clock skews are diverse, and most of clock skews are in the region of [-100, 100] PPM. The results indicate that when the number of devices is small (<5), clock skews won’t be conflict with each other, so clock skews are good tools to detect faked devices or NAT; When the number of devices increases, the conflict probability increases linearly, so clock skews of different devices can not distinguish each devices effectively.

Бесплатно

Supporting Audio Privacy-aware Services in Emerging IoT Environment

Supporting Audio Privacy-aware Services in Emerging IoT Environment

Naushin Nower

Статья научная

The increasing exploration of smart space voice assistants and audio monitoring IoT devices leads to significant trust and privacy concerns. Among them, some of the data are sensitive and a user may not aware of when and where audio recordings are sent for processing. This provides burning questions- how do users gain knowledge of, and control the amount of data captured in the physical world. Moreover, the sending and processing of these sensitive data to the far cloud do not provide an efficient solution for sensitive data which causes serious privacy and security concerns. In this paper, a new architecture for providing audio transparency and privacy in the IoT-rich environment is proposed. The proposed privacy enforcement module is used to operate within a nearby fog node, which situated close to the data sources and enforces privacy according to the data owner's desire. To show the effectiveness of the proposed architecture, a well-known privacy threat framework is investigated.

Бесплатно

Surface Fitting Based Modelling of a Circular Microstrip Patch Antenna Operating at 3 GHz Frequency

Surface Fitting Based Modelling of a Circular Microstrip Patch Antenna Operating at 3 GHz Frequency

Asanka Maiti, Sudip Mandal

Статья научная

Designing a microstrip patch antenna at 3GHz frequency is very interesting task to the researchers due to wide applicability for IoT, body wearable antenna, WLAN, ISM communication etc. In this paper, a circular microstrip patch antenna with resonance at a frequency of 3GHz has been designed using FR4 substrate and inset feeding using CST studio. Initially, the antenna is manually tuned at the 3GHz operating frequency and obtain S11 is -38dB which is best compare to the existing works at this frequency. Next, the parametric influences have been observed by varying several antenna design parameters (i.e. patch radius and substrate height) and observing the respective variation in output like S11, bandwidth. In the next phase of this work, surface fitting technique has been used to model the 3GHz circular patch antenna that helps to predict the output S11, resonance frequency and bandwidth with satisfactory prediction accuracy. Surface-fitting model will help to reduce the effort and time required for redesigning and simulation of this type of circular patch antenna in future.

Бесплатно

Survey on 5G and Future 6G Access Networks for IoT Applications

Survey on 5G and Future 6G Access Networks for IoT Applications

Kok Yeow You

Статья научная

This paper comprehensively reviews the recent 5G and future 6G Internet of Things (IoT) protocols/standards, applications, and access networks used. First, most of the IoT protocols/standards and application scenarios are summarized in the form of tables, pictures, and diagrams to facilitate readers to understand and compare current and future Internet of Things technologies more easily and quickly. Second, the terrestrial and aerial radio access networks are analyzed and discussed in detail. The evolution of 5G terrestrial access networks is briefly described and its performance limitations are quantitatively analyzed and discussed. When the operating frequency reaches the sub-millimeter wave band, the terrestrial radio access network will deal with high path loss caused by weather factors, such as oxygen and water vapor absorption in the atmosphere, rainfall, and cloud/fog attenuation. The development of aerial radio access networks is preparing for 6G IoT to solve the coverage and path loss issues. In this survey, the aerial radio access architectures and infrastructure are also surveyed. This survey aims to guide readers to better understand the technical status of 5G IoT and the milestones as well as key performance indicators that need to be reached for 6G IoT in the future.

Бесплатно

TCP/IP Jumbo Frames Network Performance Evaluation on A Test-bed Infrastructure

TCP/IP Jumbo Frames Network Performance Evaluation on A Test-bed Infrastructure

Shaneel Narayan, Paula Raymond Lutui

Статья научная

Enhancing network performance has been studied by a number of researchers. The need to provide greater throughput on network infrastructure has been the key driver for these studies. The use of jumbo frames is considered one of the methodologies that can be employed to increase data throughput on networks. In this research undertaking, the authors implement jumbo frames on a test-bed implemented with Windows Server 2003/2008 networks and performance related metrics are measured for both IPv4 and IPv6 implementations. The results obtained in this empirical study shows that performance metrics values are different in various scenarios.

Бесплатно

The Application of Federated Kalman Filtering in SINS/GPS/CNS Intergrated Navigation System

The Application of Federated Kalman Filtering in SINS/GPS/CNS Intergrated Navigation System

DENG Hong, LIU Guang-bin, CHEN Hao-ming, DENG Chun-lin

Статья научная

Federated filter was an important method to estimate high-precision navigation parameters based on “SINS/GPS/CNS”. A no-feedback federated filter with UD_UKF algorithm was designed in the paper, a three-time amendment scheme to correct navigation parameters was designed at the same time and the mathematical model of SINS/GPS/CNS was established in launch inertial coordinate system too. The paper discussed the simulation conditions and a lot of simulations were carried out to compare 2 aspects: (1)the performance between four navigation mode, which respectively is SINS, SINS/GPS, SINS/CNS, SINS/GPS/CNS;(2)the estimate precision of federated filter and that of centralized Kalman filter. The results of simulation showed that the designed federated filter and amendment scheme based on SINS/GPS/CNS had high estimate precision and led to gain high hitting precision of ballistic missile, that is to say position errors were less than 20 meter and velocity errors were less than 0.1m/s in simulation.

Бесплатно

The Channels and Demands Analysis for Chinese Farmers’ Agricultural Information Acquisition

The Channels and Demands Analysis for Chinese Farmers’ Agricultural Information Acquisition

Tingting Zhang, Zhensheng Tao

Статья научная

This paper studies the characteristics of information sources and farmers’ demand for agricultural information in the process of agricultural informationization in China. We point out that it is not common for farmers to adopt modern information technology communication tools in rural areas nowadays, and the reason for this phenomenon is that farmers still rely mainly on traditional channels for information dissemination. To change the status quo, our government should respect farmers as dominant statuses in the process of agricultural informationization and encourage households with large-scale agricultural operation to use modern IT products in order to spread agricultural information in rural areas.

Бесплатно

The Comparison of Machine Learning Algorithms on Online Classification of Network Flows

The Comparison of Machine Learning Algorithms on Online Classification of Network Flows

Keji Wei, Shaolong Cao, Jian Yu

Статья научная

Online classification of network flows is a process that captures packets generated by network applications and identifies types of network applications (or flows) in real time. There are three key issues about online classification: observation window size, feature selection, and classification algorithms. In this paper, by collecting five types of typical network flow data as the experiment sample data, the authors found observation window size 7 is the best for the sample data and most classifiers. The authors proposed a full feature set based on the standard feature set which reflects statistical features of network flows. Using five commonly used feature selection methods, the authors identified the most effective features could be reduced from 56 original features to 11 effective features. Lastly, according to special need for online classification, the authors studied 11 different classifiers on their classification accuracy, model construction time, and classification speed. The results show that C4.5 and JRip are the two best algorithms for online classification.

Бесплатно

The Economic Evaluation of Lighting Energy-saving Modification Program

The Economic Evaluation of Lighting Energy-saving Modification Program

YANG Yuan, LI Wei-hua, ZHANG Xing-zheng, YANG Chu-qi

Статья научная

Many lighting energy-saving modification programs have the embarrassment of uneconomical. This paper takes into account economic evaluation to solve the problem. According to illuminative equipments price, life span and power consumption, the optimal program will be found under the limited investment. Firstly, the benefit ratio will be used to evaluate on the equipments modification necessity, and get the modification sequence. If the biggest benefit ratio is in different equipment simultaneously, the better one will be selected in terms of relative investment recovery period. The relative remaining time is innovatively introduced into economic evaluation for determining the equipments modification locations. Then the system operation flowchart is to prove that the scheme is workable.

Бесплатно

The Empirical Study on the Relationship between Knowledge Integration and IT Project Performance

The Empirical Study on the Relationship between Knowledge Integration and IT Project Performance

Ying Cui

Статья научная

This article examines the relationship between timely project completion and the management’s integrative capability. Measures of the integrative capability are used to predict on-time project completion, where completion is a function of the duration of IT-related project delays. In a longitudinal study of 74 enterprise application integration projects in the medical sector, integrative capability was measured from the point of view of the CIO and a facility IT manager. Accounting for several project controls, our Cox regression results indicate both integrative dimensions significantly mitigate the duration of IT-related project delays, thus promoting timely project completion. The analysis also reveals the importance of taking management structure into consideration when studying IT phenomena in networked organizations.

Бесплатно

The Existence of Homoclinic Solutions for Second Order Hamiltonian System

The Existence of Homoclinic Solutions for Second Order Hamiltonian System

Jie Gao

Статья научная

The research of homoclinic orbits for Hamiltonian system is a classical problem, it has valuable applications in celestial mechanics, plasma physis, and biological engineering. For example, homoclinic orbits rupture can yield chaos lead to more complex dynamics behaviour. This paper studies the existence of homoclinic solutions for a class of second order Hamiltonian system, we will prove this system exists at least one nontrivial homoclinic solution.

Бесплатно

The Impact of Sensor Area on Worm Propagation Using SEIR and SEIR-V Models: A Preliminary Investigation

The Impact of Sensor Area on Worm Propagation Using SEIR and SEIR-V Models: A Preliminary Investigation

ChukwuNonso H. Nwokoye, Njideka N. Mbeledogu, Ihekeremma A. Ejimofor

Статья научная

Cyber security is of topical concern in the computing industry and in organizations that require ICT infrastructure for business-related activities. Theft or disrupting the flow of data and information can cause devastating damage to an institution’s reputation and this may lead to huge financial losses. More mayhem can be perpetrated by malicious codes such as worms to organizations that use wireless sensor networks for collecting and transmitting data and information. To tackle this issue of cyber security, researchers have used epidemiological models (such as SEIR and SEIR-V) to gain insight into malicious code propagation. However, topological concerns and its impact in worm propagation haven’t been thoroughly studied. Here, we modify older models by applying a different expression for sensor deployment area; we intend to highlight the spatial parameters that may allow for the extinction of worms in wireless sensor networks amidst countermeasures deployed by network managers.

Бесплатно

The Research and Application of Webpage Temper-proofing System

The Research and Application of Webpage Temper-proofing System

Wu Beihua, Wang Yongquan

Статья научная

With the sharp increase of hacking attacks over the last couple of years, web application security has become a key concern. The attack to websites, especially the explosion of webpage interpolating incidents has become one of the most serious problems of it. In this paper, the system adopts Web server core embedded technology to imbed tamper detection module and application protection module into the Web server, define corresponding strategies for temper-proofing, and realize the real-time monitoring and protection of web pages and the dynamic content in databases.

Бесплатно

The Research of On-line Monitoring System of Power Cable Joint Temperature

The Research of On-line Monitoring System of Power Cable Joint Temperature

Jianwen Wang, Zhengfeng Wang, Peng Li

Статья научная

Power cable joint is the weak link of power system’s safe operation, it is important significance to real-time master the operating temperature of power cable joint for the safety of the power system. This paper adopts wireless technology to design the temperature monitoring system of power cable joint. Monitoring terminal collection temperature data located in each power cable joint collects the measured data in the cable branch box through the near distance micro-consumption electronic wireless technology to data concentrators located at the bottom of the cable branch box, then transmits to the monitoring center through CAN bus network. The system realizes the low cost and on-line reliable monitoring of power cable point temperature of the urban cable branch box.

Бесплатно

The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures

The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures

Wazir Zada Khan, Yang Xiang, Mohammed Y Aalsalem, Quratulain Arshad

Статья научная

Sensor networks are becoming closer towards wide-spread deployment so security issues become a vital concern. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. The variety of defense approaches against selective forwarding attack is overwhelming. In this paper we have described all the existing defensive schemes according to our best knowledge against this attack along with their drawbacks, thus providing researchers a better understanding of the attack and current solution space. This paper also classifies proposed schemes according to their nature and defense. Nature of scheme classifies into Distributed and Centralized. Defense of scheme classifies into detection and prevention.

Бесплатно

The Study of Access Control for Service-Oriented Computing in Internet of Things

The Study of Access Control for Service-Oriented Computing in Internet of Things

Guoping Zhang, Jing Liu

Статья научная

In Internet of Things, computing and processing of information is the core supporting. In this paper, we introduce “Service-Oriented Computing” to solve the computing and processing of information in IoT. However, a key challenge in service-oriented environment is the design of effective access control schemas.We put forward a model of Workflow -oriented Attributed Based Access Control (WABAC), and an access control framework based on WABAC model. WABAC model grants and adapts permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

Бесплатно

The Study on Formal Verification of OS Kernel

The Study on Formal Verification of OS Kernel

Zhang Yu, Dong Yunwei, Zhang Zhongqiu, Huo Hong, Zhang Fan

Статья научная

There is increasing pressure on providing a high degree of assurance of operation system’s security and functionality. Formal verification is the only known way to guarantee that a system is free of programming errors. We study on formal verification of operation system kernel in system implementation level and take theorem proving and model checking as the main technical methods to resolve the key techniques of verifying operation system kernel in C implementation level. We present a case study to the verification of real-world C systems code derived from an implementation of μC/OS – II in the end.

Бесплатно

The moderating effect of mandatoriness on the acceptance of mobile phone technology: SMEs perspective

The moderating effect of mandatoriness on the acceptance of mobile phone technology: SMEs perspective

Renatus Mushi

Статья научная

The mobility and pervasiveness have created many opportunities of using mobile phones in performing activities of SMEs. This is due to the low ICT readiness especially in SMEs operating in less developed countries compared to large firms. Some of the challenges facing Tanzanian SMEs include but are not limited to poor ICT infrastructures, lack of ICT skills, lack of management support, poor financial capabilities and lack of reliable electrical power supply. While there is a number of studies which explains the factors influencing adoption and usage of mobile phones in SMEs, it is still unclear whether the mandatoriness has an impact on such acceptance. Understanding the voluntary aspects provides informed decision-making for SME managers and potential stakeholders on identifying the issues which need their attention. This study involved a survey of 459 respondents from Tanzanian SMEs using SEM and AMOS. The results show that the mandated use of mobile phones in the SMEs has a moderating effect on the overall acceptance of mobile phones in performing daily activities. Recommendations and suggestions for future works are also highlighted in this article.

Бесплатно

Towards Digital Forensics 4.0: A Multilevel Digital Forensics Framework for Internet of Things (IoT) Devices

Towards Digital Forensics 4.0: A Multilevel Digital Forensics Framework for Internet of Things (IoT) Devices

Yaman Salem, Majdi Owda, Amani Yousef Owda

Статья научная

The Internet of Things (IoT) driven Industrial Revolution 4.0 (IR4.0) and this is impacting every sector of the global economy. With IoT devices, everything is computerized. Today's digital forensics is no longer limited to computers, mobiles, or networks. The current digital forensics landscape demands a significantly different approach. The traditional digital forensics frameworks no longer meet the current requirements. Therefore, in this paper, we propose a novel framework called “Multi-level Artifact of Interest Digital Forensics Framework for IoT” (MAoIDFF-IoT). The keynote "Multi-level" aims to cover all levels of the IoT architecture. Our novel IoT digital forensics framework focuses on the Artifact of Interest (AoI). Additionally, it proposes the action/detection matrix. It encompasses the advantages of the previous frameworks while introducing new features specifically designed to make the framework suitable for current and future IoT investigation scenarios. The MAoIDFF-IoT framework is designed to face the challenges of IoT forensic analysis and address the diverse architecture of IoT environments. Our proposed framework was evaluated through real scenario experiments. The evaluation of the experimental results reveals the superiority of our framework over existing frameworks in terms of usability, inclusivity, focus on the (AoI), and acceleration of the investigation process.

Бесплатно

Журнал