for Journals by Title or ISSN
for Articles by Keywords
  Subjects -> COMPUTER SCIENCE (Total: 1988 journals)
    - ANIMATION AND SIMULATION (29 journals)
    - AUTOMATION AND ROBOTICS (100 journals)
    - COMPUTER ARCHITECTURE (9 journals)
    - COMPUTER ENGINEERING (9 journals)
    - COMPUTER GAMES (16 journals)
    - COMPUTER PROGRAMMING (23 journals)
    - COMPUTER SCIENCE (1153 journals)
    - COMPUTER SECURITY (45 journals)
    - DATA BASE MANAGEMENT (13 journals)
    - DATA MINING (32 journals)
    - E-BUSINESS (22 journals)
    - E-LEARNING (27 journals)
    - IMAGE AND VIDEO PROCESSING (40 journals)
    - INFORMATION SYSTEMS (104 journals)
    - INTERNET (92 journals)
    - SOCIAL WEB (50 journals)
    - SOFTWARE (33 journals)
    - THEORY OF COMPUTING (8 journals)

COMPUTER SCIENCE (1153 journals)                  1 2 3 4 5 6 | Last

Showing 1 - 200 of 872 Journals sorted alphabetically
3D Printing and Additive Manufacturing     Full-text available via subscription   (Followers: 14)
Abakós     Open Access   (Followers: 3)
Academy of Information and Management Sciences Journal     Full-text available via subscription   (Followers: 68)
ACM Computing Surveys     Hybrid Journal   (Followers: 22)
ACM Journal on Computing and Cultural Heritage     Hybrid Journal   (Followers: 9)
ACM Journal on Emerging Technologies in Computing Systems     Hybrid Journal   (Followers: 13)
ACM Transactions on Accessible Computing (TACCESS)     Hybrid Journal   (Followers: 3)
ACM Transactions on Algorithms (TALG)     Hybrid Journal   (Followers: 16)
ACM Transactions on Applied Perception (TAP)     Hybrid Journal   (Followers: 6)
ACM Transactions on Architecture and Code Optimization (TACO)     Hybrid Journal   (Followers: 9)
ACM Transactions on Autonomous and Adaptive Systems (TAAS)     Hybrid Journal   (Followers: 7)
ACM Transactions on Computation Theory (TOCT)     Hybrid Journal   (Followers: 11)
ACM Transactions on Computational Logic (TOCL)     Hybrid Journal   (Followers: 4)
ACM Transactions on Computer Systems (TOCS)     Hybrid Journal   (Followers: 18)
ACM Transactions on Computer-Human Interaction     Hybrid Journal   (Followers: 12)
ACM Transactions on Computing Education (TOCE)     Hybrid Journal   (Followers: 3)
ACM Transactions on Design Automation of Electronic Systems (TODAES)     Hybrid Journal   (Followers: 1)
ACM Transactions on Economics and Computation     Hybrid Journal  
ACM Transactions on Embedded Computing Systems (TECS)     Hybrid Journal   (Followers: 4)
ACM Transactions on Information Systems (TOIS)     Hybrid Journal   (Followers: 20)
ACM Transactions on Intelligent Systems and Technology (TIST)     Hybrid Journal   (Followers: 9)
ACM Transactions on Interactive Intelligent Systems (TiiS)     Hybrid Journal   (Followers: 4)
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)     Hybrid Journal   (Followers: 10)
ACM Transactions on Reconfigurable Technology and Systems (TRETS)     Hybrid Journal   (Followers: 7)
ACM Transactions on Sensor Networks (TOSN)     Hybrid Journal   (Followers: 8)
ACM Transactions on Speech and Language Processing (TSLP)     Hybrid Journal   (Followers: 11)
ACM Transactions on Storage     Hybrid Journal  
ACS Applied Materials & Interfaces     Full-text available via subscription   (Followers: 21)
Acta Automatica Sinica     Full-text available via subscription   (Followers: 3)
Acta Universitatis Cibiniensis. Technical Series     Open Access  
Ad Hoc Networks     Hybrid Journal   (Followers: 11)
Adaptive Behavior     Hybrid Journal   (Followers: 11)
Advanced Engineering Materials     Hybrid Journal   (Followers: 26)
Advanced Science Letters     Full-text available via subscription   (Followers: 7)
Advances in Adaptive Data Analysis     Hybrid Journal   (Followers: 8)
Advances in Artificial Intelligence     Open Access   (Followers: 16)
Advances in Calculus of Variations     Hybrid Journal   (Followers: 2)
Advances in Catalysis     Full-text available via subscription   (Followers: 5)
Advances in Computational Mathematics     Hybrid Journal   (Followers: 15)
Advances in Computer Science : an International Journal     Open Access   (Followers: 13)
Advances in Computing     Open Access   (Followers: 2)
Advances in Data Analysis and Classification     Hybrid Journal   (Followers: 54)
Advances in Engineering Software     Hybrid Journal   (Followers: 25)
Advances in Geosciences (ADGEO)     Open Access   (Followers: 10)
Advances in Human Factors/Ergonomics     Full-text available via subscription   (Followers: 25)
Advances in Human-Computer Interaction     Open Access   (Followers: 20)
Advances in Materials Sciences     Open Access   (Followers: 16)
Advances in Operations Research     Open Access   (Followers: 11)
Advances in Parallel Computing     Full-text available via subscription   (Followers: 7)
Advances in Porous Media     Full-text available via subscription   (Followers: 4)
Advances in Remote Sensing     Open Access   (Followers: 37)
Advances in Science and Research (ASR)     Open Access   (Followers: 6)
Advances in Technology Innovation     Open Access   (Followers: 1)
AEU - International Journal of Electronics and Communications     Hybrid Journal   (Followers: 8)
African Journal of Information and Communication     Open Access   (Followers: 6)
African Journal of Mathematics and Computer Science Research     Open Access   (Followers: 4)
Air, Soil & Water Research     Open Access   (Followers: 7)
AIS Transactions on Human-Computer Interaction     Open Access   (Followers: 6)
Algebras and Representation Theory     Hybrid Journal   (Followers: 1)
Algorithms     Open Access   (Followers: 11)
American Journal of Computational and Applied Mathematics     Open Access   (Followers: 4)
American Journal of Computational Mathematics     Open Access   (Followers: 4)
American Journal of Information Systems     Open Access   (Followers: 7)
American Journal of Sensor Technology     Open Access   (Followers: 2)
Anais da Academia Brasileira de Ciências     Open Access   (Followers: 2)
Analog Integrated Circuits and Signal Processing     Hybrid Journal   (Followers: 5)
Analysis in Theory and Applications     Hybrid Journal   (Followers: 1)
Animation Practice, Process & Production     Hybrid Journal   (Followers: 5)
Annals of Combinatorics     Hybrid Journal   (Followers: 3)
Annals of Data Science     Hybrid Journal   (Followers: 9)
Annals of Mathematics and Artificial Intelligence     Hybrid Journal   (Followers: 6)
Annals of Pure and Applied Logic     Open Access   (Followers: 2)
Annals of Software Engineering     Hybrid Journal   (Followers: 12)
Annual Reviews in Control     Hybrid Journal   (Followers: 6)
Anuario Americanista Europeo     Open Access  
Applicable Algebra in Engineering, Communication and Computing     Hybrid Journal   (Followers: 2)
Applied and Computational Harmonic Analysis     Full-text available via subscription   (Followers: 2)
Applied Artificial Intelligence: An International Journal     Hybrid Journal   (Followers: 14)
Applied Categorical Structures     Hybrid Journal   (Followers: 2)
Applied Clinical Informatics     Hybrid Journal   (Followers: 2)
Applied Computational Intelligence and Soft Computing     Open Access   (Followers: 12)
Applied Computer Systems     Open Access   (Followers: 1)
Applied Informatics     Open Access  
Applied Mathematics and Computation     Hybrid Journal   (Followers: 32)
Applied Medical Informatics     Open Access   (Followers: 10)
Applied Numerical Mathematics     Hybrid Journal   (Followers: 5)
Applied Soft Computing     Hybrid Journal   (Followers: 16)
Applied Spatial Analysis and Policy     Hybrid Journal   (Followers: 4)
Architectural Theory Review     Hybrid Journal   (Followers: 3)
Archive of Applied Mechanics     Hybrid Journal   (Followers: 4)
Archive of Numerical Software     Open Access  
Archives and Museum Informatics     Hybrid Journal   (Followers: 121)
Archives of Computational Methods in Engineering     Hybrid Journal   (Followers: 4)
Artifact     Hybrid Journal   (Followers: 2)
Artificial Life     Hybrid Journal   (Followers: 6)
Asia Pacific Journal on Computational Engineering     Open Access  
Asia-Pacific Journal of Information Technology and Multimedia     Open Access   (Followers: 1)
Asian Journal of Computer Science and Information Technology     Open Access  
Asian Journal of Control     Hybrid Journal  
Assembly Automation     Hybrid Journal   (Followers: 2)
at - Automatisierungstechnik     Hybrid Journal   (Followers: 1)
Australian Educational Computing     Open Access  
Automatic Control and Computer Sciences     Hybrid Journal   (Followers: 3)
Automatic Documentation and Mathematical Linguistics     Hybrid Journal   (Followers: 5)
Automatica     Hybrid Journal   (Followers: 9)
Automation in Construction     Hybrid Journal   (Followers: 6)
Autonomous Mental Development, IEEE Transactions on     Hybrid Journal   (Followers: 8)
Basin Research     Hybrid Journal   (Followers: 5)
Behaviour & Information Technology     Hybrid Journal   (Followers: 52)
Bioinformatics     Hybrid Journal   (Followers: 246)
Biomedical Engineering     Hybrid Journal   (Followers: 16)
Biomedical Engineering and Computational Biology     Open Access   (Followers: 13)
Biomedical Engineering, IEEE Reviews in     Full-text available via subscription   (Followers: 17)
Biomedical Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 32)
Briefings in Bioinformatics     Hybrid Journal   (Followers: 45)
British Journal of Educational Technology     Hybrid Journal   (Followers: 126)
Broadcasting, IEEE Transactions on     Hybrid Journal   (Followers: 10)
c't Magazin fuer Computertechnik     Full-text available via subscription   (Followers: 2)
CALCOLO     Hybrid Journal  
Calphad     Hybrid Journal  
Canadian Journal of Electrical and Computer Engineering     Full-text available via subscription   (Followers: 14)
Catalysis in Industry     Hybrid Journal   (Followers: 1)
CEAS Space Journal     Hybrid Journal  
Cell Communication and Signaling     Open Access   (Followers: 1)
Central European Journal of Computer Science     Hybrid Journal   (Followers: 5)
CERN IdeaSquare Journal of Experimental Innovation     Open Access  
Chaos, Solitons & Fractals     Hybrid Journal   (Followers: 3)
Chemometrics and Intelligent Laboratory Systems     Hybrid Journal   (Followers: 15)
ChemSusChem     Hybrid Journal   (Followers: 7)
China Communications     Full-text available via subscription   (Followers: 7)
Chinese Journal of Catalysis     Full-text available via subscription   (Followers: 2)
CIN Computers Informatics Nursing     Full-text available via subscription   (Followers: 12)
Circuits and Systems     Open Access   (Followers: 16)
Clean Air Journal     Full-text available via subscription   (Followers: 2)
CLEI Electronic Journal     Open Access  
Clin-Alert     Hybrid Journal   (Followers: 1)
Cluster Computing     Hybrid Journal   (Followers: 1)
Cognitive Computation     Hybrid Journal   (Followers: 4)
COMBINATORICA     Hybrid Journal  
Combustion Theory and Modelling     Hybrid Journal   (Followers: 13)
Communication Methods and Measures     Hybrid Journal   (Followers: 11)
Communication Theory     Hybrid Journal   (Followers: 19)
Communications Engineer     Hybrid Journal   (Followers: 1)
Communications in Algebra     Hybrid Journal   (Followers: 3)
Communications in Partial Differential Equations     Hybrid Journal   (Followers: 3)
Communications of the ACM     Full-text available via subscription   (Followers: 53)
Communications of the Association for Information Systems     Open Access   (Followers: 18)
COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering     Hybrid Journal   (Followers: 3)
Complex & Intelligent Systems     Open Access  
Complex Adaptive Systems Modeling     Open Access  
Complex Analysis and Operator Theory     Hybrid Journal   (Followers: 2)
Complexity     Hybrid Journal   (Followers: 6)
Complexus     Full-text available via subscription  
Composite Materials Series     Full-text available via subscription   (Followers: 9)
Computación y Sistemas     Open Access  
Computation     Open Access  
Computational and Applied Mathematics     Hybrid Journal   (Followers: 2)
Computational and Mathematical Methods in Medicine     Open Access   (Followers: 2)
Computational and Mathematical Organization Theory     Hybrid Journal   (Followers: 2)
Computational and Structural Biotechnology Journal     Open Access   (Followers: 2)
Computational and Theoretical Chemistry     Hybrid Journal   (Followers: 9)
Computational Astrophysics and Cosmology     Open Access   (Followers: 1)
Computational Biology and Chemistry     Hybrid Journal   (Followers: 12)
Computational Chemistry     Open Access   (Followers: 2)
Computational Cognitive Science     Open Access   (Followers: 2)
Computational Complexity     Hybrid Journal   (Followers: 4)
Computational Condensed Matter     Open Access  
Computational Ecology and Software     Open Access   (Followers: 8)
Computational Economics     Hybrid Journal   (Followers: 9)
Computational Geosciences     Hybrid Journal   (Followers: 14)
Computational Linguistics     Open Access   (Followers: 23)
Computational Management Science     Hybrid Journal  
Computational Mathematics and Modeling     Hybrid Journal   (Followers: 8)
Computational Mechanics     Hybrid Journal   (Followers: 4)
Computational Methods and Function Theory     Hybrid Journal  
Computational Molecular Bioscience     Open Access   (Followers: 2)
Computational Optimization and Applications     Hybrid Journal   (Followers: 7)
Computational Particle Mechanics     Hybrid Journal   (Followers: 1)
Computational Research     Open Access   (Followers: 1)
Computational Science and Discovery     Full-text available via subscription   (Followers: 2)
Computational Science and Techniques     Open Access  
Computational Statistics     Hybrid Journal   (Followers: 13)
Computational Statistics & Data Analysis     Hybrid Journal   (Followers: 29)
Computer     Full-text available via subscription   (Followers: 84)
Computer Aided Surgery     Hybrid Journal   (Followers: 3)
Computer Applications in Engineering Education     Hybrid Journal   (Followers: 6)
Computer Communications     Hybrid Journal   (Followers: 10)
Computer Engineering and Applications Journal     Open Access   (Followers: 5)
Computer Journal     Hybrid Journal   (Followers: 7)
Computer Methods in Applied Mechanics and Engineering     Hybrid Journal   (Followers: 22)
Computer Methods in Biomechanics and Biomedical Engineering     Hybrid Journal   (Followers: 10)
Computer Methods in the Geosciences     Full-text available via subscription   (Followers: 1)
Computer Music Journal     Hybrid Journal   (Followers: 14)
Computer Physics Communications     Hybrid Journal   (Followers: 6)
Computer Science - Research and Development     Hybrid Journal   (Followers: 7)
Computer Science and Engineering     Open Access   (Followers: 17)
Computer Science and Information Technology     Open Access   (Followers: 11)
Computer Science Education     Hybrid Journal   (Followers: 12)
Computer Science Journal     Open Access   (Followers: 20)
Computer Science Master Research     Open Access   (Followers: 10)

        1 2 3 4 5 6 | Last

Journal Cover China Communications
  [SJR: 0.231]   [H-I: 9]   [7 followers]  Follow
   Full-text available via subscription Subscription journal
   ISSN (Online) 1673-5447
   Published by IEEE Homepage  [191 journals]
  • Cover pages
    • Abstract: Presents the front cover for this issue of the publication.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • Energy-efficient multi-mode clusters maintenance (M2CM) for hierarchical
           wireless sensor networks
    • Authors: Xiangdong Hu; Zhulin Liu;
      Pages: 1 - 12
      Abstract: How to energy-efficiently maintain the topology of wireless sensor networks (WSNs) is still a difficult problem because of their numerous nodes, highly dynamic nature, varied application scenarios and limited resources. An energy-efficient multi-mode clusters maintenance (M2CM) method is proposed based on localized and event-driven mechanism in this work, which is different from the conventional clusters maintenance model with always periodically re-clustered among the whole network style based on time-trigger for hierarchical WSNs. M2CM can meet such demands of clusters maintenance as adaptive local maintenance for the damaged clusters according to its changes in time and space field., the triggers of M2CM include such events as nodes' residual energy being under the threshold, the load imbalance of cluster head, joining in or exiting from any cluster for new node or disable one, etc. Based on neighboring relationship of the damaged clusters, one can start a single cluster (inner-cluster) maintenance or clusters (inter-cluster) maintenance program to meet diverse demands in the topology management of hierarchical WSNs. The experiment results based on NS2 simulation show that the proposed method can significantly save energy used in maintaining a damaged network, effectively narrow down the influenced area of clusters maintenance, and increase transmitted data and prolong lifetime of network compared to the traditional schemes.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • Simplified Echo-State-Network Based Services Awareness for High-Speed
           Passive Optical Network
    • Authors: Huifeng Bai;Dongshan Wang; Yanbin Song;
      Pages: 13 - 21
      Abstract: With the challenge from services diversity grows greatly, the service-oriented supporting ability is required to current high-speed passive optical network (PON). Aimed to enhance the quality of service (QoS) brought by diversified-services, this paper proposes an Simplified Echo State Network (SESN) Based Services Awareness scheme in High-Speed PON (Passive Optical Network). In this proposed scheme, the ring topology is adopted in the reservoir of SESN to reduce the complexity of original Echo State Network, and system dynamics equation is introduced to keep the accuracy of SESN. According to the network architecture of 10G-EPON, a SESN Master is running in the OLT and a number of SESN Agents work in ONUs. The SESN Master plays the main function of service-awareness from the total view of various kinds services in 10G-EPON system, by fully SESN training. Then, the reservoir information of well-trained SESN in OLT will be broadcasted to all ONUs and those SESN Agents working in ONUs are allowed to conducts independent service-awareness function. Thus, resources allocation and transport policy are both determined just only in ONUs. Simulation results show that the proposed mechanism is able to better supporting ability for multiple services.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • Power allocation for energy harvesting in Wireless Body Area Networks
    • Authors: Xiaolan Liu;Fengye Hu; Meiqi Shao; Dan Sui;Gengxin He;
      Pages: 22 - 31
      Abstract: Wireless Body Area Networks (WBANs) are expected to achieve high reliable communications among a large number of sensors. The outage probability can be used to measure the reliability of the WBAN. In this paper, we optimize the outage probability with the harvested energy as constraints. Firstly, the optimal transmit power of the sensor is obtained while considering a single link between an access point (AP) located on the waist and a sensor attached on the wrist over the Rayleigh fading channel. Secondly, an optimization problem is formed to minimize the outage probability. Finally, we convert the non-convex optimization problem into convex solved by the Lagrange multiplier method. Simulations show that the optimization problem is solvable. The outage probability is optimized by performing power allocation at the sensor. And our proposed algorithm achieves minimizing the outage probability when the sensor uses energy harvesting. We also demonstrate that the average outage probability is reduced with the increase of the harvested energy.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • Energy-efficient mobile data collection adopting node cooperation in an
           underwater acoustic sensor network
    • Authors: Yougan Chen; Xiaoting Jin; Xiaomei Xu;
      Pages: 32 - 42
      Abstract: This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes, where the mobile destination requests retransmission from each underwater node individually employing traditional automatic-repeat-request (ARQ) protocol. We propose a practical node cooperation (NC) protocol to enhance the collection efficiency, utilizing the fact that underwater nodes can overhear the transmission of others. To reduce the source level of underwater nodes, the underwater data collection area is divided into several sub-zones, and in each sub-zone, the mobile surface node adopting the NC protocol could switch adaptively between selective relay cooperation (SRC) and dynamic network coded cooperation (DNC). The difference of SRC and DNC lies in whether or not the selected relay node combines the local data and the data overheard from undecoded node(s) to form network coded packets in the retransmission phase. The NC protocol could also be applied across the sub-zones due to the wiretap property. In addition, we investigate the effects of different mobile collection paths, collection area division and cooperative zone design for energy saving. The numerical results show that the proposed NC protocol can effectively save energy compared with the traditional ARQ scheme.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • Random access and resource allocation for the coexistence of NOMA-based
           and OMA-based M2M communications
    • Authors: Yali Wu;Guixia Kang;Ningbo Zhang;
      Pages: 43 - 53
      Abstract: In the future fifth generation (5G) systems, non-orthogonal multiple access (NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access (OMA). In this paper, we propose a novel random access (RA) and resource allocation scheme for the coexistence of NOMA-based and OMA-based machine-to-machine (M2M) communications, which aims at improving the number of successful data packet transmissions and guaranteeing the quality of service (QoS) (e.g., the minimum data rate requirement) for M2M communications. The algorithm of joint user equipment (UE) paring and power allocation is proposed for the coexisting RA (i.e., the coexistence of NOMA-based RA and OMA-based RA). The resource allocation for the coexisting RA is investigated, thus improving the number of successful data packet transmissions by more efficiently using the radio resources. Simulation results demonstrate that the proposed RA and resource allocation scheme outperforms the conventional RA in terms of the number of successful data packet transmissions, thus is a promising technology in future M2M communications.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • Energy efficient power allocation for relay-aided D2D communications in 5G
    • Authors: Ru Wang; Jia Liu;Guopeng Zhang; Shuanghong Huang; Ming Yuan;
      Pages: 54 - 64
      Abstract: As one of the key technologies for the fifth generation (5G) wireless networks, device-to-device (D2D) communications allow user equipment (UE) in close proximity to communicate with each other directly. Forwarded by a relay, the relay-aided D2D (RA-D2D) communications can not only be applied to communications in much longer distance but also achieve a high quality of service (QoS). In this paper, we first propose a two-layer system model allowing RA-D2D links to underlay traditional cellular uplinks. Then we maximize the energy efficiency of the RA-D2D link while satisfying the minimum data-rate of the cellular link. The optimal transmit power at both D2D transmitter and D2D relay sides is obtained by transforming the nonlinear fractional programming into a nonlinear parameter programming. Simulation results show that our proposed power allocation method is more energy efficient than the existing works, and the proposed RA-D2D scheme outperformed direct D2D scheme when the distance between two D2D users is longer.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • A review of wideband circularly polarized dielectric resonator antennas
    • Authors: Ubaid Ullah;Mohd Fadzil Ain;Zainal Arifin Ahmad;
      Pages: 65 - 79
      Abstract: This article presents a technical review of circularly polarized (CP) dielectric resonator antennas (DRA) for wideband applications. The primary objective of this review is, to highlight the techniques used by different researchers for generating circular polarization in DRA. First, a general idea of circular polarization and it advantages over linear polarization is presented, and then all the major developments made in the CP DRA are highlighted. The emphasis of the paper is on the wideband circularly polarized dielectric resonator antenna. The current state of the art and all the realizable features of the CP DRA are addressed comprehensively. Finally, some recommendations for future CP DRAs are given and the paper ends with concluding remarks.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • Capacity research in cluster-based underwater wireless sensor networks
           based on stochastic geometry
    • Authors: Xia Li; Dongxue Zhao;
      Pages: 80 - 87
      Abstract: Underwater wireless sensor networks (UWSNs) have attracted wide attention in recent years. The capacity research on it is still in the initial stage, lacking adequate performance evaluation for network construction. This paper will focus on this subject by theoretical analysis and simulation, aiming to provide some insights for the actual UWSNs construction. According to the structure features of cluster-based UWSNs and the propagation characteristics of underwater acoustic signal, with the combination of signal to interference plus noise ratio, we define some capacity performance metrics, such as outage probability and transmission capacity. Based on the theory of stochastic geometry, a network capacity analytical model used in the cluster-based UWSNs is presented. The simulation results verify the validity of the theoretical analysis, and the cause of error between theoretical and simulation results has also been clearly explained.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • A study of configuration evolution of an operational IP backbone network
    • Authors: Fuliang Li; Jiahai Yang;Huijing Zhang; Xingwei Wang; Suogang Li; Jianping Wu;
      Pages: 88 - 97
      Abstract: Configuration errors are proved to be the main reasons for network interruption and anomalies. Many researchers have paid their attention to configuration analysis and provisioning, but few works focus on understanding the configuration evolution. In this paper, we uncover the configuration evolution of an operational IP backbone based on the weekly reports gathered from January 2006 to January 2013. We find that rate limiting and launching routes for new customers are configured most frequently. In addition, we conduct an analysis of network failures and find that link failures are the main causes for network failures. We suggest that we should configure redundant links for the links which are easy to break down. At last, according to the analysis results, we illustrate how to provide semi-automated configuration for rate limiting and adding customers.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • Low-rate DoS attack flows filtering based on frequency spectral analysis
    • Authors: Zhijun Wu; Minxiao Wang; Changcan Yan; Meng Yue;
      Pages: 98 - 112
      Abstract: In frequency domain, the power spectrum of Low-rate denial of service (LDoS) attacks is totally spread into the spectrum of normal traffic. It is a challenging task to detect and filter LDoS attack flows from the normal traffic. Based on the analysis of LDoS attack flows and legitimate TCP traffic in time and frequency domains, the periodicity of the TCP traffic and LDoS attack flows is explored to facilitate the research of network traffic processing. Hence, an approach of LDoS attack flow filtering based on frequency spectrum analysis is proposed. In this approach, the TCP traffic and LDoS attack flows are transformed from the time domain into the frequency domain. Then the round-trip time (RTT) is estimated by using frequency domain search method. Analysis of amplitude spectrum shows that TCP traffic energy is mainly concentrated on the points of n/RTT. Therefore, a comb filter using infinite impulse response (IIR) filter is designed to filter out the LDoS attack flows in frequency domain, while most legitimate TCP traffic energy at the points of n/RTT are pass through. Experimental results show that the maximum pass rate for legitimate TCP traffic reaches 92.55%, while the maximum filtration rate of LDoS attack flows reaches 81.36%. The proposed approach can effectively filter the LDoS attack flows while less impact on the legitimate TCP traffic.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • SGuard: A lightweight SDN safe-guard architecture for DoS attacks
    • Authors: Tao Wang; Hongchang Chen;
      Pages: 113 - 125
      Abstract: Software Defined Networking (SDN) is a revolutionary networking paradigm towards the future network, experiencing rapid development nowadays. However, its main characteristic, the separation of control plane and data plane, also brings about new security challenges, i.e., Denial-of-Service (DoS) attacks specific to OpenFlow SDN networks to exhaust the control plane bandwidth and overload the buffer memory of OpenFlow switch. To mitigate the DoS attacks in the OpenFlow networks, we design and implement SGuard, a security application on top of the NOX controller that mainly contains two modules: Access control module and Classification module. We employ novel six-tuple as feature vector to classify traffic flows, meanwhile optimizing classification by feature ranking and selecting algorithms. All the modules will cooperate with each other to complete a series of tasks such as authorization, classification and so on. At the end of this paper, we experimentally use Mininet to evaluate SGuard in a software environment. The results show that SGuard works efficiently and accurately without adding more overhead to the SDN networks.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • Remote three-factor authentication protocol with strong robustness for
           multi-server environment
    • Authors: Min Zhang; Jiashu Zhang; Wenrong Tan;
      Pages: 126 - 136
      Abstract: If a user wants to acquire different network services from various application servers in a traditional single server environment, the user must register these servers separately and remember different usernames and passwords for different servers. To solve these problems, a lot of authentication schemes for multi-server environment have been proposed. Recently, Odelu and Das et al. proposed a secure multi-server authentication protocol based on smart card, biometric and elliptic curve cryptography (ECC). We firstly analyze Odelu et al.'s scheme and find some flaws as follows: 1) the scheme may suffer Denial of Service (Dos) attack and insider attack; 2) The scheme doesn't have strong robustness because improper work of the register center (RC) may lead to the collapse of the whole system; 3) There are some design flaws in this scheme. For example, the user cannot choose his/her identity randomly and the register center needs to maintain a data table. In order to solve these problems, this paper proposes a new secure three-factor authentication protocol for multi-server environment based on Chebyshev chaotic map and secure sketch algorithm. To verify the security of the proposed scheme, we simulate our scheme using BAN logic and ProVerif tool. Through a thorough analysis, we can see that the proposed scheme not only has stronger security but also has less computation cost than Odelu et al.'s protocol.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • Accessing alignments of ontologies via IoT based on SKOS data model
    • Authors: Xiulei Liu; Xia Hou; Junyang Yu;Ying Gao; Yue Zhang; Yingying Zhang;
      Pages: 137 - 155
      Abstract: Many ontologies are provided to representing semantic sensors data. However, heterogeneity exists in different sensors which makes some service operators of Internet of Thing (IoT) difficult (such as such as semantic inferring, non-linear inverted index establishing, service composing). There is a great deal of research about sensor ontology alignment dealing with the heterogeneity between the different sensor ontologies, but fewer solutions focus on exploiting syntaxes in a sensor ontology and the pattern of accessing alignments. Our solution infers alignments by extending structural subsumption algorithms to analyze syntaxes in a sensor ontology, and then combines the alignments with the SKOS model to construct the integration sensor ontology, which can be accessed via the IoT. The experiments show that the integration senor ontology in the SKOS model can be utilized via the IoT service, and the accuracy of our prototype, in average, is higher than others over the four real ontologies.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • Digital rights management: Model, technology and application
    • Authors: Zhaofeng Ma;
      Pages: 156 - 167
      Abstract: with rapid achievement of current information technology and computing ability and applications, much more digital content such as films, cartoons, design drawings, office documents and software source codes are produced in daily work, however to protect the content being copying, shared or deliberately stolen by inside or outside, digital rights management (DRM) became more and more important for digital content protection. In this paper, we studied various DRM model, technology and application, and first proposed DRM Security Infrastructure (DSI), in which we defined encryption, hash, signature algorithm, watermarking algorithms, authentication, usage control, trusted counter, conditional trace, secure payment, and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs, in which we proposed 6 typical classes of copyrights and content protection DRMs architecture: (1) Software-oriented DRM,(2) eBook-oriented DRM, (3) Video-oriented DRM, (4)Image-Oriented DRM (5) Unstructured data oriented DRM, (6) Text-oriented DRM. Based on the above DSI, we then proposed a dynamic DRM model selection method for various DRM application, which can be adapted dynamically for different technology of different applications, which can provide a whole solution for variant DRM development in a rapid and customized mode. The proposed DRM method, technology and application in this paper provided a common, flexible and extendable solution for variant DRM scenes, and can support rapid and customized development. Moreover, we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law, liberty and morality.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • Robust blind separation for MIMO systems against channel mismatch using
           second-order cone programming
    • Authors: Zhongqiang Luo; Chengjie Li; Lidong Zhu;
      Pages: 168 - 178
      Abstract: To improve the deteriorated capacity gain and source recovery performance due to channel mismatch problem, this paper reports a research about blind separation method against channel mismatch in multiple-input multiple-output (MIMO) systems. The channel mismatch problem can be described as a channel with bounded fluctuant errors due to channel distortion or channel estimation errors. The problem of blind signal separation/extraction with channel mismatch is formulated as a cost function of blind source separation (BSS) subject to the second-order cone constraint, which can be called as second-order cone programing optimization problem. Then the resulting cost function is solved by approximate negentropy maximization using quasi-Newton iterative methods for blind separation/extraction source signals. Theoretical analysis demonstrates that the proposed algorithm has low computational complexity and improved performance advantages. Simulation results verify that the capacity gain and bit error rate (BER) performance of the proposed blind separation method is superior to those of the existing methods in MIMO systems with channel mismatch problem.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • Joint subcarrier and power allocation for df-based multiuser two-way relay
    • Authors: Xiang Chen; Fei He; Limin Xiao; Shidong Zhou;
      Pages: 179 - 188
      Abstract: Two-way decode-and-forward (DF) relay technique is an efficient method to improve system performance in 5G networks. However, traditional orthogonal frequency division multiplexing (OFDM) based two-way relay systems only consider a per-subcarrier relay strategy, which treats each subcarrier as a separate channel, which results in significant sum rate loss, especially in fading environments. In this paper, a joint coding scheme over multiple subcarriers is involved for multi-pair users in two-way relay systems to obtain multiuser diversity. A generalized subcarrier pairing strategy is proposed to permit each user-pair to occupy different subcarriers during the two transmission phases, i.e., the multiple access and broadcast phases. Moreover, a low complexity joint resource allocation scheme is proposed to improve the spectrum efficiency with an additional multi-user diversity gain. Some numerical simulations are finally provided to verify the efficacy of our proposal.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • GPP based open cellular network towards 5G
    • Authors: Jiang Wang; Jing Xu; Yang Yang; Haidong Xu;
      Pages: 189 - 198
      Abstract: Due to 5G's stringent and uncertainty traffic requirements, open ecosystem would be one inevitable way to develop 5G. On the other hand, GPP based mobile communication becomes appealing recently attributed to its striking advantage in flexibility and re-configurability. In this paper, both the advantages and challenges of GPP platform are detailed analyzed. Furthermore, both GPP based software and hardware architectures for open 5G are presented and the performances of real-time signal processing and power consumption are also evaluated. The evaluation results indicate that turbo and power consumption may be another challengeable problem should be further solved to meet the requirements of realistic deployments.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
  • A 5G virtualized RAN based on NO Stack
    • Authors: Jie Zeng;Xin Su;Jinjin Gong;Liping Rong;Jing Wang;
      Pages: 199 - 208
      Abstract: The virtualized radio access network (vRAN) could implement virtualized baseband functions on general-purpose platforms and expand the processing capacity of the radio access network (RAN) significantly. In this paper, a Not Only Stack (NO Stack) based vRAN is proposed to be employed in the fifth generation (5G) mobile communication system. It adopts advanced virtualization technologies to maintain flexible and sustainable. The baseband processing and storage resources should be sliced and orchestrated agilely to support multi radio access technology (multi-RAT). Also it is analyzed and demonstrated by different use cases to validate the benefits. The proposed vRAN reduces signaling overheads and service response time in the bearer establishment procedure. Concluded from the analyses and demonstrations, the NO Stack based vRAN could support multi-RAT convergence and flexible networking effectively.
      PubDate: 2017
      Issue No: Vol. 14, No. 6 (2017)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016