Subjects -> COMMUNICATIONS (Total: 518 journals)
    - COMMUNICATIONS (446 journals)
    - DIGITAL AND WIRELESS COMMUNICATION (31 journals)
    - HUMAN COMMUNICATION (19 journals)
    - MEETINGS AND CONGRESSES (7 journals)
    - RADIO, TELEVISION AND CABLE (15 journals)

COMMUNICATIONS (446 journals)            First | 1 2 3     

Showing 401 - 480 of 480 Journals sorted alphabetically
Studia Socialia Cracoviensia     Open Access  
Studies in Asian Social Science     Open Access  
Studies in Media and Communication     Open Access   (Followers: 15)
Synthesis Lectures on Professionalism and Career Advancement for Scientists and Engineers     Full-text available via subscription   (Followers: 2)
Techné : Research in Philosophy and Technology     Full-text available via subscription   (Followers: 1)
Technical Communication     Full-text available via subscription   (Followers: 7)
Telecommunication Systems     Hybrid Journal   (Followers: 3)
TELKOMNIKA (Telecommunication, Computing, Electronics and Control)     Open Access   (Followers: 2)
Terminology     Hybrid Journal   (Followers: 4)
Textos y Contextos     Open Access  
The Communication Review     Hybrid Journal   (Followers: 5)
The Post     Open Access  
The Poster     Hybrid Journal   (Followers: 1)
Tic & société     Open Access  
Tidsskrift for Medier, Erkendelse og Formidling     Open Access  
Tijdschrift voor Communicatiewetenschappen     Full-text available via subscription   (Followers: 3)
Transactions on Emerging Telecommunications Technologies     Hybrid Journal   (Followers: 4)
tripleC : Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society     Open Access   (Followers: 6)
Trípodos     Open Access  
Turkish Review of Communication Studies     Open Access  
Ubiquity     Hybrid Journal  
Ukrainian Information Space     Open Access  
University of Sindh Journal of Information and Communication Technology     Open Access  
Verso e Reverso     Open Access  
Virtualidad, Educación y Ciencia     Open Access  
Vivat Academia     Open Access  
Wacana : Jurnal Sosial dan Humaniora     Open Access  
Wardah : Jurnal Dakwah dan Kemasyarakatan     Open Access  
Women's Studies in Communication     Hybrid Journal   (Followers: 4)
ZER : Revista de Estudios de Comunicación = Komunikazio Ikasketen Aldizkaria     Open Access  

  First | 1 2 3     

Similar Journals
Journal Cover
Telecommunication Systems
Journal Prestige (SJR): 0.239
Citation Impact (citeScore): 1
Number of Followers: 3  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 1572-9451 - ISSN (Online) 1018-4864
Published by Springer-Verlag Homepage  [2469 journals]
  • A review: spreading factor allocation schemes for LoRaWAN

    • Free pre-print version: Loading...

      Abstract: Abstract LoRaWAN is one of the most suitable communication protocols for the IoT applications that require low power over long-range communication. However, the LoRa network suffers from scalability, low data rate, and other performance issues that significantly affect the network performance. The study of the optimal spreading factor allocation can overcome these issues and help to improve the network performance. Hence, this article puts forward the state-of-the-art literature review on the Spreading Factors Allocation schemes for the LoRaWAN. Industry and academia have done an extensive research to address the issues related to optimal resource allocation, like spreading factor allocation to the spatially distributed end-devices of the network. Most of the problems concerning spreading factor allocation are being explored and resolved. Therefore, this paper reviews and compares various spreading factor allocation schemes proposed by the researchers. Furthermore, we provide a summary of the different review studies of the LoRaWAN. The literature presented in this paper motivates researchers to examine other aspects of spreading factor allocation schemes to improve the LoRa network performance.
      PubDate: 2022-05-05
       
  • 5G enhanced mobile broadband multi-criteria scheduler for dense urban
           scenario

    • Free pre-print version: Loading...

      Abstract: Abstract Mobile communication networks have entered a new age by introducing fifth-generation technologies (5G). The International Union of Telecommunications (IUT) proposes new core innovations and capabilities for 5G networks to meet the growing need for mobile broadband services. The requirements set by 5G for the enhanced Mobile BroadBand (eMBB) use case seem contradictory. It intends to increase the data rate, afford efficient spectrum usage, provide an excellent fairness level to all users, and reduce buffer size. Accordingly, these needs should be met to perform the expected quality of service. Besides, the scheduling algorithms existing in the field respond separately to the criteria mentioned earlier. For all these reasons, we opted for a multi-objective problem formulation to take all these constraints into account. This paper presents a multi-criteria scheduler for 5G eMBB communications transmitting in a dense urban environment. Our proposed solution combines the weighted sum multi-objective optimization and the perceptron's weights management deployed in neural networks. Moreover, a comparison study was carried out to assess the performance of the suggested algorithm. The comparative analysis proves that the algorithm developed in this paper provides the best performances for the enhanced mobile broadband use case and the scenario adopted.
      PubDate: 2022-05-01
       
  • Transient analysis of power management in wireless sensor network with
           start-up times and threshold policy

    • Free pre-print version: Loading...

      Abstract: Abstract Queueing models play a significant role in analysing the performance of power management systems in various electronic devices and communication systems. This paper adopts a multiple vacation queueing model with a threshold policy to analyse the power-saving mechanisms of the wireless sensor network (WSN) using the dynamic power management technique. The proposed system consists of a busy state (transmit state), wake-up state, shutdown state and inactive state. In this model, the server switches to a shutdown state for a random duration of time after serving all the events (data packets) in the busy state. Events that arrive during the shutdown period cannot be served until the system size reaches the predetermined threshold value of k and further it requires start-up time and a change of state to resume service. At the end of the shutdown period, if the system size is less than k, then the server begins the inactive period; otherwise, the server switches to the wake-up state. For this system, an explicit expression for the transient and steady-state solution is computed in a closed form. Furthermore, performance indices such as mean, variance, probability that the server is in various stages of power management modes and mean power consumption are computed. Finally, graphical illustrations are made to understand the effect of the parameters on the performance of the system.
      PubDate: 2022-05-01
       
  • An improved McEliece cryptosystem based on QC-MDPC code with compact key
           size

    • Free pre-print version: Loading...

      Abstract: Abstract The McEliece cryptosystem based on quasi-cyclic moderate-density parity-check with adaptive chosen-ciphertext attack conversion is secure against information set decoding and message-resend attacks. However, it is vulnerable to reaction based key recovery attacks and cannot be implemented over the noise channel. To overcome this problem, we propose an improved McEliece cryptosystem based on quasi-cyclic quasi moderate-density parity-check (QC-QMDPC). In this cryptosystem, a stamp generation function which is based on the pseudorandom sequence is designed to resist the message-resend attack. The random channel noise is employed to enhance security. Furthermore, the upper bound of the density of QC-QMDPC code is proved for optimal efficiency. The index-based storage technique is proposed so that the key size can be reduced to approximately quadruple code length. The encoding and decoding algorithms are optimized to reduce the computational cost on the hardware platform. We analyze the performance of the proposed cryptosystem and compare it with other McEliece cryptosystems. The results show that the proposed cryptosystem is secure against critical attacks while keeping high error correction ability and efficiency.
      PubDate: 2022-05-01
       
  • Buffer-aided cooperative NOMA with partial relay selection

    • Free pre-print version: Loading...

      Abstract: Abstract The Cooperative Non-orthogonal multiple access (C-NOMA) technique has been considered as a promising solution to improve the coverage extension and transmission reliability. But due to the unavailability of perfect channel state information in dual hope network, transmission link becomes unreliable, and difficulty in decoding also arises in the successive interference cancellation (SIC) process at destination users. To solve this problem, this contribution develops and investigates a joint buffer-aided multi-relay cooperative NOMA scheme (BAN-PRS) with partial relay selection. More specifically, we examine a model, where the source transmits the message to two NOMA users via the best relay node selected from a set of half-duplex (HD) amplify and forward relays. In this model, information from source to destination is transmitted using the power domain NOMA technique. In between the transmission, a cooperative buffer-based relay network is used, where partial relay selection (PRS) is performed, and based on first-hop channel state information, we choose the best buffer-based relay node. To evaluate the system performance, exact and asymptotic analytical expressions of outage probabilities, maximum packet delay, and throughput are derived in integral form for both the destination users. Additionally, relying on these analytical expressions, we accessed the impact of buffer size, the number of relay nodes, and power allocation coefficients between the destinations on the performance of this cooperative NOMA network. Furthermore, we carry out Monte-Carlo simulations to validate the correctness of this analysis.
      PubDate: 2022-05-01
       
  • Single-channel phaseless blind source separation

    • Free pre-print version: Loading...

      Abstract: Abstract In this letter, we consider a novel problem of blind source separation from observed magnitude-only measurements of their convolutive mixture in different communication systems. The problem setups correspond to a blind receiver architecture that either does not have phase information in the measurements or has excessive phase noise that cannot be easily recovered. We have formulated the problem as a matrix recovery problem by using the lifting technique and proposed a convex programming-based solution for joint recovery of the unknown channel and source signals. We have implemented the proposed solution using the alternating direction method of multipliers (ADMM). We have plotted a phase transition diagram for random Gaussian subspaces that shows, for s source signals each of length n and channel of length k, the minimum measurements required for exact recovery are \(m \ge 1.19 (sn+k) \log ^{2}m\) that is in accord with our theoretical result. We have also plotted a phase transition diagram for the case where the channel delays matrix is deterministic (consisting of the first k columns of the identity matrix) that shows the minimum measurements required for exact recovery are \(m \ge 2.86 (sn+k) \log ^{2}m\) which are higher than random subspaces.
      PubDate: 2022-04-30
       
  • A novel hybrid range-free approach to locate sensor nodes in 3D WSN using
           GWO-FA algorithm

    • Free pre-print version: Loading...

      Abstract: The precise node location of the sensor nodes is an essential requirement in wireless sensor networks (WSNs) to determine the place or event occurring at a particular instant of time. In WSN, existing localization schemes consider two-dimensional (2D) space, while in actual life, sensor nodes are placed in three-dimensional (3D) space. In 3D localization, there are many research challenges, such as higher computational complexity, poor location prediction, lesser coverage, and depending only on fewer anchor nodes. To address various research issues in a 3D environment we propose a range-free technique applied in an anisotropic scenario having degree of irregularity (
      DOI ) as 0.01 using the concepts of a fuzzy logic system (FLS). Anisotropic properties of nodes are considered to determine the efficiency of Grey wolf with the Firefly algorithm. In our proposed scenario, the received signal strength (RSS) information is necessary among the target nodes and their corresponding anchor nodes for determining the location of target nodes using the information based on edge weights. These edge weights are further modeled using Hybrid Grey Wolf Optimization with Firefly Algorithm (GWO-FA) to estimate the location of target nodes. The proposed algorithm is energy efficient as a single location-aware node is used for localization. Further, the concept of virtual anchors is introduced that helps the algorithm to determine 3D positions.
      PubDate: 2022-04-28
       
  • Dataset mismatched steganalysis using subdomain adaptation with guiding
           feature

    • Free pre-print version: Loading...

      Abstract: Abstract The generalization problem in deep learning has always been an important problem to be solved. In the field of steganalysis, generalization is also an important factor that makes steganalysis models difficult to deploy in real-world scenarios. For a group of suspicious images that never appeared in the training set, the pre-trained deep learning-based steganalysis models tend to suffer from distinct performance degradation. To address this limitation, in this paper, a feature-guided subdomain adaptation steganalysis framework is proposed to improve the performance of the pre-trained models when detecting new data. Initially, the source domain and target domain will be divided into subdomains according to class, and the distributions of the relevant subdomains are aligned by subdomain adaptation. Afterward, the guiding feature is generated to make the division of subdomains more stable and precise. When it is used to detect three spatial steganographic algorithms with a wide variety of datasets and payloads, the experimental results show that the proposed steganalysis framework can significantly improve the average accuracy of SRNet model by 5.4% at 0.4bpp, 8.5% at 0.2bpp, and 8.0% at 0.1bpp in the case of dataset mismatch.
      PubDate: 2022-04-27
       
  • A survey on IRS NOMA integrated communication networks

    • Free pre-print version: Loading...

      Abstract: Abstract Intelligent reflecting surfaces aided communication have been emerging as strong candidates to support the 6G wireless physical platforms. IRS has shown promising qualities in enhancing the spectral efficiency of wireless networks because of its capability to alter the conduct of interacting electromagnetic waves through intelligent handling of the reflections phase shifts. Also, NOMA proves itself to be superior among the other multiple access techniques as it supports a greater number of users using non-orthogonal resource allocation. This paper brings a survey over the IRS-assisted NOMA networks. The IRS and NOMA technologies, and their physical working principles are first introduced in the paper. The state-of-the-art of the IRS-assisted NOMA communication networks is next presented followed by a discussion of related performance parameters for analysis. Afterward, it discusses the resource allocation, and secrecy requirements in the IRS–NOMA networks. Furthermore, it presents the relevant work related to the optimization of energy efficiency, power efficiency and coverage. A comparison of IRS–NOMA network with MIMO–NOMA, and relay aided NOMA network is provided. Finally, a few exciting open challenges for IRS-assisted NOMA networks are identified including optimization problem using ML, identifying implementing scenarios of NOMA or OMA with IRS, PLS, and terahertz communication.
      PubDate: 2022-04-23
       
  • Energy efficiency maximization of massive MIMO systems using RF chain
           selection and hybrid precoding

    • Free pre-print version: Loading...

      Abstract: Abstract Modern day millimeter wave communication systems prefer hybrid precoding architecture over digital architecture due to higher energy efficiency, lower power consumption and comparable spectral efficiency. Both energy efficiency and spectral efficiency defines the system performance of a hybrid precoder and are dependent on the number of available active RF chains. The aim to maximize energy efficiency without any obvious performance degradation in terms of spectral efficiency has created a tradeoff due to dependency of energy and spectral efficiency on RF chains. This tradeoff is being investigated in this paper by performing RF chain selection using evolutionary algorithms. We present a hybrid heuristic approach comprising of low computationally complex evolutionary algorithms for RF chain selection and successive interference cancellation for precoding. Furthermore, we have shown that for low SNR regime the analog percoding is optimal in terms of energy efficiency and for high SNR regime we can adopt the RF chain selection procedure to maximize the energy efficiency. Moreover, the channel irregularities do not effect our proposed scheme.
      PubDate: 2022-04-21
       
  • Experimental validation of carrier waveform inter-displacement modulation
           with software defined electronics platform

    • Free pre-print version: Loading...

      Abstract: Abstract In this work, a Carrier Waveform Inter-Displacement (CWID) modulation, based on Linear Frequency Modulation-Phase Shift Keying (LFM-PSK), is proposed to achieve high Bit Transmission Rate (BTR) in wireless radio communications system. The novel modulation scheme introduces position modulation by re-ordering inter-displacement in different symbol carriers, which improves the BTR as compared with the LFM-PSK system. Moreover, a Graphical User Interface (GUI) based on Wireless open-Access Research Platform (WARP) is designed and the CWID system is implemented and validated on the Software Defined Electronics platform. Results of simulations and experiments show the effectiveness and the superiority of the CWID over its competitors.
      PubDate: 2022-04-20
       
  • Genetic algorithm-based hybrid spectrum handoff strategy in cognitive
           radio-based internet of things

    • Free pre-print version: Loading...

      Abstract: Abstract In Cognitive radio-based Internet of Things (CR-IoT) systems, the return of the primary user (PU) causes the secondary user (SU) that is communicating to face the spectrum handoff problem. In the process of spectrum handoff, the user terminal cant get the idle channels in time because of the unknown channel usage state.To solve this problem, a hybrid spectrum handoff algorithm based on genetic algorithm is proposed. The algorithm considers the regularity of PU activities in space and time, defines the idle probability of channels from the perspective of week attributes and time periods, obtains the optimal time period length using genetic algorithm,generates a channel idle probability table, and provides the target channel sequence for SUs in combination with the proposed channel ordering scheme. Simulation results show that when the total number of SUs is within 10 \(\sim \) 20, the proposed algorithm has a spectrum handoff outage probability of less than 7%, an average delivery time of less than 13s, a total packet error rate of less than 5.5%, a channel utilization of consistently above 70%, and an average detection times of less than 7 times.
      PubDate: 2022-04-13
       
  • Research on spectrum sensing data falsification attack detection algorithm
           in cognitive Internet of Things

    • Free pre-print version: Loading...

      Abstract: Abstract The Internet of Things (IoT) is a new paradigm for connecting various heterogeneous networks. Cognitive radio (CR) adopts cooperative spectrum sensing (CSS) to realize the secondary utilization of idle spectrum by unauthorized IoT devices, allowing IoT objects can effectively use spectrum resources. However, the abnormal IoT devices in the cognitive Internet of Things will disrupt the CSS process. For this attack, we propose a spectrum sensing strategy based on weighted combining of the hidden Markov model. The method uses the hidden Markov model to detect the probability of malicious attacks at each node and reports to the Fusion Center (FC), which evaluates the submitted observations and assigns reasonable weight to improve the accuracy of the sensing results. Simulation results show that the algorithm proposed has a higher detection probability and a lower false alarm probability than other algorithms, which can effectively resist spectrum sensing data falsification (SSDF) attacks in cognitive Internet of Things and improve the performance of IoT devices.
      PubDate: 2022-04-13
       
  • Modeling for small cell networks in 5G communication environment

    • Free pre-print version: Loading...

      Abstract: Abstract The small cell structure in which many cells are arranged per unit area by reducing the size of cells is a candidate technology for an increase in transmission capacity in the 5G environment. However, the decrease in the size of the cell led to additional problems such as increased inter cell interference and frequent cell changes owing to the movement of the terminal. Therefore, the aim of this study was to propose small cell dynamic channel allocation (SDCA) and hybrid and dynamic channel allocation (HDCA) using conventional reuse methods to improve the macro cell performance while efficiently utilizing scarce frequency resources. The proposed method facilitates an improved performance that is lacking for macro-cell users in the center area of the cell boundary for the network where conventional macro cells and small cells are superposed. Furthermore, to improve the performance, it can provide resources that are lacking in the small cells of the center. To evaluate the performance, the proposed method was compared to frequency reuse factor1 (FRF1), frequency reuse factor3 (FRF3), and fractional frequency reuse (FFR) methods in terms of the signal-to-interference/noise-ratio (SINR) of users of each macro cell and small cell, outage, capacity for each user, and total system capacity. As a result of comparing the SINR, it was confirmed that the performance of the macro cell users has improved by an average of 43.88% compared to FRF1, FRF3, and FFR, and the performance of small cell users has improved by an average of 4.31%. Comparison results show that the outage proportions of the macro and small cell users are 61.29% and 70.59% lower on average, respectively. A comparison of results show that the capacities of the macro and small cell users have also improved by 22.5% and 14.5% on average, respectively. As the comparison results of the total system capacity indicate, the proposed method shows an average improvement of 11.67%. In cases in which the added resources of the small cells are found to be unnecessary based on the results of the performance evaluation, there is an advantage in that they can be reduced to improve the performance of macro cell users, or they can be used to fill the insufficient resources of the small cells while maintaining the performance of the macro cell users. This fluidity originates from the ability to address occasional situations in a dense environment. These two approaches are expected to be used effectively in 5G network environments.
      PubDate: 2022-04-13
       
  • A novel minimal set decode-amplify-forward (MS-DAF) relaying scheme for
           MIMO-NOMA

    • Free pre-print version: Loading...

      Abstract: Abstract In non-orthogonal multiple access (NOMA) scheme, the strong users, located near to base station, demodulate their data by considering the information of other users as interference. One of the crucial challenges in NOMA is the design of sophisticated interference cancellation techniques to improve performance. An alternate approach is to exploit cooperative communication with more straightforward interference cancellation techniques to enhance performance without increasing computational complexity. In this paper, we propose a novel hybrid minimal set decode-amplify-forward (MS-DAF) relaying scheme with maximal ratio combining and space–time block coding for MIMO-NOMA to enhance the performance of weak users located away from the base station and/or having poor channel conditions. The proposed MS-DAF approach reduces the number of relayed links through an intelligent selection of relaying users. The aim is to minimize the re-transmission overhead without compromising the performance. Furthermore, the proposed MS-DAF approach switches between amplify-and-forward and decode-and-forward based on the channel conditions. Simulation results for both SISO- and MIMO- NOMA are presented to show the superiority of the proposed hybrid scheme over existing individual schemes. The proposed technique can be used to improve the performance of edge users in a cellular network with minimal relayed links.
      PubDate: 2022-04-05
       
  • Analysis of energy saving in user equipment in LTE-A using stochastic
           modelling

    • Free pre-print version: Loading...

      Abstract: Abstract Energy saving in User Equipment (UE) is one of the important issues for limited sources of power in the device. It is critical for the UE to maximize its energy efficiency. In this paper, we have presented two stochastic models, namely the Markov model and semi-Markov model, for the UE based on the states of discontinuous reception (DRX) mechanism, i.e., a power saving method in mobile communication networks. Explicit expressions are derived for transient and steady-state system size probabilities for the Markov model. For the semi-Markov model, steady-state probabilities are computed. Further, the performance measures such as mean and variance are computed for both models. Using these models, based on the states of DRX mechanism, energy saving in the UE is calculated. Finally, sensitivity analysis is performed in which the results obtained are compared for both models. Numerical results obtained in this paper ensure that energy saving can be maximized in the UE using the Markov modelling of DRX mechanism rather than semi-Markov modelling. The energy saving using the Markov model is atleast 33.19 \(\%\) more than the semi-Markov model. Also, for energy saving in the UE, the semi-Markov model for DRX mechanism is compared with the Markov model. The semi-Markov models for the DRX mechanism are available in the literature without considering the packet arrivals. Our analysis of DRX mechanism and conclusion on its performance can be designed and implemented to an extension for the existing DRX mechanism. We believe that, these models can also be extended to study the energy saving of hardware and other components of the system.
      PubDate: 2022-04-02
       
  • Inter-intra cellular pilot contamination mitigation for heterogeneous
           massive MIMO cellular systems

    • Free pre-print version: Loading...

      Abstract: Abstract Massive multiple-input-multiple-output (MIMO) technology has been advocated as one of the most advanced and promising technologies for catering to the high data requirements of present and future cellular networks. It can be achieved by the installation of hundreds or thousands of antennas at the base station (BS), for serving tens of users. For making proper use of its high gain capabilities, it is required for the BS to have full knowledge of the channel between the users and itself which is obtained using channel state information (CSI). Pilot contamination has been identified as a major hindrance in the error-free computation of CSI. In this paper, a heterogeneous massive MIMO cellular system has been considered where the number of users present in different cells are assumed to be different. Moreover, the same pilots are reused by the users of each cell. This gives rise to the scenario of both inter-cellular and intra-cellular pilot contamination in the massive MIMO cellular system approach. To mitigate these aforesaid pilot contamination, two sub-optimal algorithms have been proposed in this correspondence which allocate the available same pilots to various users in a systematic manner based upon their perceived interference. In the first approach, the intra-cellular pilot contamination has been addressed before addressing the inter-cellular pilot contamination. The inter-cellular pilot contamination has been resolved ahead of the intra-cellular pilot contamination as per the second approach. Both these algorithms are designed with the aim of maximizing the system throughput. Hence, pilots with low interference are allocated to better channel conditioned users and vice-versa. On different performance parameters, the algorithms are evaluated and the simulation results show that the second pilot allocation strategy is more successful than the first scheme incurring the same computational complexity. Moreover, the effectiveness of the proposed algorithms have been presented by comparing with existing pilot contamination mitigation algorithms for various system metrics.
      PubDate: 2022-03-14
       
  • Hybrid algorithm optimization for coverage problem in wireless sensor
           networks

    • Free pre-print version: Loading...

      Abstract: Abstract With the continuous development of evolutionary computing, many excellent algorithms have emerged, which are applied in all walks of life to solve various practical problems. In this paper, two hybrid fish, bird and insect algorithms based on different architectures are proposed to solve the optimal coverage problem in wireless sensor networks. The algorithm combines the characteristics of three algorithms, namely, particle swarm optimization algorithm, Phasmatodea population evolution algorithm and fish migration optimization algorithm. The new algorithm has the advantages of the three algorithms. In order to prove the effectiveness of the algorithm, we first test it on 28 benchmark functions. The results show that the two hybrid fish, bird and insect algorithms with different architectures have significant advantages. Then we apply the proposed algorithm to solve the coverage problem of wireless sensor networks through experimental simulation. The experimental results show the advantages of our proposed algorithm and prove that our proposed hybrid fish, bird and insect algorithm is suitable for solving the coverage problem of wireless sensor networks.
      PubDate: 2022-03-14
       
  • HMA-ID mechanism: a hybrid mayfly optimisation based apriori approach for
           intrusion detection in big data application

    • Free pre-print version: Loading...

      Abstract: Abstract Rapid growth of the internet facilitates various facilities in everyday lifestyle, but intrusion becomes a significant threat in internet usage. Thus, the detection of intrusion is essential for smooth and secure communication in a network. In literature, many techniques have been proposed for the detection of intrusion. But those techniques either complex or fails to provide better performance in a big data application. Therefore, this paper proposed a novel Hybrid Mayfly Apriori-Intrusion Detection mechanism for effective intrusion detection in big data applications. In the proposed mechanism, Mayfly optimization based Apriori is used to detect the intrusion. Unlike conventional classification based intrusion detection, in the proposed mechanism, the network data processed to form an apriori rule based on frequent itemset. The infrequent itemset or transactions are marked as an intrusion. Comparison with established algorithms such as Artificial Neural Network, Random Forest, K-Nearest Neighbour and Support Vector Machine analyses the efficacy of the suggested mechanism. Ultimately, the proposed mechanism has shown its effectiveness by providing better results as 97% accuracy, 99% precision, and 97% recall. Thus, this mechanism is more suitable for intrusion detection in big data.
      PubDate: 2022-03-10
       
  • Heterogeneous signcryption with proxy re-encryption and its application in
           EHR systems

    • Free pre-print version: Loading...

      Abstract: Abstract Electronic health record (EHR) systems provide the platform that enables digital documentation of patients health information. Practically, EHR systems aid in delivering quality medical healthcare and limiting medical errors. However, EHR systems are associated with known technical and security challenges such as interoperability, confidentiality, authentication, auditability, and access control. To overcome these challenges, we first propose a new heterogeneous signcryption with proxy re-encryption (HSC-PRE) scheme. Secondly, via an example design, we demonstrate how our scheme can be utilized to achieve a secure, interoperable, auditable and accessible EHR system using blockchain technology. The blockchain technology is required to assure interoperability and auditability while the HSC-PRE assures confidentiality, authentication and access control. Via comprehensive security analysis (in random oracle model (ROM)), we affirm that the HSC-PRE scheme is secure. Besides, it shows up efficient against other recent related schemes.
      PubDate: 2022-03-04
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 44.192.25.113
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-