Subjects -> COMMUNICATIONS (Total: 518 journals)
    - COMMUNICATIONS (446 journals)
    - DIGITAL AND WIRELESS COMMUNICATION (31 journals)
    - HUMAN COMMUNICATION (19 journals)
    - MEETINGS AND CONGRESSES (7 journals)
    - RADIO, TELEVISION AND CABLE (15 journals)

COMMUNICATIONS (446 journals)                  1 2 3 | Last

Showing 1 - 200 of 480 Journals sorted alphabetically
3C TIC     Open Access   (Followers: 1)
ACM Transactions on Information Systems (TOIS)     Hybrid Journal   (Followers: 18)
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)     Hybrid Journal   (Followers: 10)
Acta Universitatis Danubius. Communicatio     Open Access  
Acta Universitatis Sapientiae Communicatio     Open Access  
Advances in Image and Video Processing     Open Access   (Followers: 20)
Advances in Journalism and Communication     Open Access   (Followers: 26)
African Journal of Information and Communication     Open Access   (Followers: 6)
African Journal of Information Systems     Open Access   (Followers: 6)
African Journal of Rhetoric     Full-text available via subscription   (Followers: 3)
African Yearbook of Rhetoric     Full-text available via subscription   (Followers: 3)
Ambitos     Open Access   (Followers: 1)
American Journal of Semiotics     Full-text available via subscription   (Followers: 4)
Anagrama     Open Access  
Anagramas : Rumbos y Sentidos de la Comunicación     Open Access   (Followers: 2)
Anàlisi : Quaderns de Comunicació i Cultura     Open Access  
Âncora : Revista Latino-Americana de Jornalismo     Open Access  
Andharupa : Journal of Visual Communication Design & Multimedia     Open Access   (Followers: 3)
Annales Universitatis Paedagogicae Cracoviensis / Studia de Cultura     Open Access  
Annals of Telecommunications     Hybrid Journal   (Followers: 6)
Annals of the International Communication Association     Hybrid Journal   (Followers: 4)
Anuario electrónico de estudios en Comunicación Social "Disertaciones"     Open Access   (Followers: 1)
Apparatus. Film, Media and Digital Cultures of Central and Eastern Europe     Open Access   (Followers: 5)
Área Abierta     Open Access   (Followers: 2)
Art Design & Communication in Higher Education     Hybrid Journal   (Followers: 22)
At-Tabsyir : Jurnal Komunikasi Penyiaran Islam     Open Access  
Atatürk İletişim Dergisi     Open Access  
Aturá : Revista Pan-Amazônica de Comunicação     Open Access  
Auditory Perception & Cognition     Hybrid Journal  
Augmentative and Alternative Communication     Hybrid Journal   (Followers: 46)
Avatares de la Comunicación y la Cultura     Open Access  
Baltic International Yearbook of Cognition, Logic and Communication     Open Access   (Followers: 2)
Baltic Screen Media Review     Open Access   (Followers: 1)
Bioelectromagnetics     Hybrid Journal   (Followers: 1)
Black Camera     Full-text available via subscription   (Followers: 8)
Borderlands Journal : Culture, Politics, Law and Earth     Open Access   (Followers: 1)
C&SC - Communication & Social Change     Open Access   (Followers: 7)
Caderno de Letras     Open Access  
Canadian Journal of Communication     Partially Free   (Followers: 24)
Catalan Journal of Communication & Cultural Studies     Hybrid Journal   (Followers: 2)
Celebrity Studies     Hybrid Journal   (Followers: 13)
Chasqui. Revista Latinoamericana de Comunicación     Open Access   (Followers: 1)
China Communications     Full-text available via subscription   (Followers: 8)
Chinese Journal of Communication     Hybrid Journal   (Followers: 12)
Church, Communication and Culture     Open Access   (Followers: 1)
CIC. Cuadernos de Informacion y Comunicacion     Open Access   (Followers: 4)
Comedy Studies     Hybrid Journal   (Followers: 10)
Commons. Revista de Comunicación y Ciudadanía Digital     Open Access  
Communicatio : South African Journal for Communication Theory and Research     Hybrid Journal   (Followers: 3)
Communication     Open Access   (Followers: 28)
Communication & Language at Work     Open Access   (Followers: 10)
Communication & Society     Open Access   (Followers: 6)
Communication & Sport     Hybrid Journal   (Followers: 7)
communication +1     Open Access   (Followers: 2)
Communication and Culture Online / Komunikacija i kultura     Open Access   (Followers: 1)
Communication and Media in Asia Pacific (CMAP)     Open Access   (Followers: 2)
Communication and the Public     Hybrid Journal   (Followers: 2)
Communication Booknotes Quarterly     Hybrid Journal   (Followers: 15)
Communication Cultures in Africa     Open Access   (Followers: 7)
Communication et organisation     Open Access  
Communication et Professionnalisation     Open Access  
Communication Papers : Media Literacy & Gender Studies     Open Access   (Followers: 20)
Communication Research and Practice     Hybrid Journal  
Communication Theory     Hybrid Journal   (Followers: 29)
Communication, Culture & Critique     Hybrid Journal   (Followers: 28)
Communication, technologies et développement     Open Access  
Communications in Mobile Computing     Open Access   (Followers: 14)
Communications of the Association for Information Systems     Open Access   (Followers: 15)
Communiquer : Revue de communication sociale et publique     Open Access  
Computational Communication Research     Open Access   (Followers: 1)
Comuni@cción     Open Access  
Comunicação & Educação     Open Access  
Comunicação & Sociedade     Open Access   (Followers: 1)
Comunicação e Sociedade     Open Access  
Comunicació. Revista de recerca i d'anàlisi     Open Access  
Comunicación     Open Access  
Comunicación y Ciudadanía     Open Access  
Comunicación y Género     Open Access  
Comunicación y Medios     Open Access   (Followers: 2)
Comunicación y sociedad     Open Access   (Followers: 2)
Comunicar     Open Access   (Followers: 1)
Conexión     Open Access  
Connections     Open Access  
Connections : A Journal of Language, Media and Culture     Open Access   (Followers: 3)
Contratexto     Open Access  
Convergence The International Journal of Research into New Media Technologies     Hybrid Journal   (Followers: 48)
Creative Artist : A Journal of Theatre and Media Studies     Open Access   (Followers: 11)
Cross-cultural Communication     Open Access   (Followers: 8)
Cryptography     Open Access   (Followers: 1)
Cuadernos de H Ideas     Open Access  
Cuadernos de Informacion     Open Access  
Cuadernos.info     Open Access  
De Signos y Sentidos     Open Access  
Democratic Communiqué     Open Access   (Followers: 1)
Design Ecologies     Hybrid Journal   (Followers: 13)
Digithum     Open Access   (Followers: 2)
Discourse, Context & Media     Open Access   (Followers: 23)
Distúrbios da Comunicação     Open Access  
Dixit     Open Access  
Documentación de las Ciencias de la Información     Open Access  
Doxa Comunicación : Revista interdisciplinar de estudios de Comunicación y Ciencias Sociales     Open Access  
e-Journal of Linguistics     Open Access   (Followers: 3)
e-learning and education (eleed)     Open Access   (Followers: 39)
Electronic Journal of Knowledge Management     Open Access   (Followers: 25)
Electronics and Communications in Japan     Hybrid Journal   (Followers: 8)
Empedocles : European Journal for the Philosophy of Communication     Hybrid Journal   (Followers: 2)
Entreculturas : Revista de Traducción y Comunicación Intercultural     Open Access  
ESSACHESS : Journal for Communication Studies     Open Access   (Followers: 2)
Etudes de communication     Open Access   (Followers: 3)
Evidence Based Library and Information Practice     Open Access   (Followers: 386)
Explorations in Media Ecology     Hybrid Journal   (Followers: 5)
Fibreculture Journal     Open Access   (Followers: 9)
FLEKS : Scandinavian Journal of Intercultural Theory and Practice     Open Access   (Followers: 1)
Folia Toruniensia     Open Access  
Foundations and Trends® in Communications and Information Theory     Full-text available via subscription   (Followers: 6)
Framework : The Journal of Cinema and Media     Full-text available via subscription   (Followers: 19)
Fronteiras - estudos midiáticos     Open Access  
Frontiers in Communication     Open Access   (Followers: 1)
Frontiers in Human Dynamics     Open Access  
Genre en séries. Cinéma, télévision, médias     Open Access  
Gesture     Hybrid Journal   (Followers: 4)
Global Advances in Business Communication     Open Access   (Followers: 5)
Global Media and China     Open Access  
Global Media and Communication     Hybrid Journal   (Followers: 17)
Global Media Journal     Open Access   (Followers: 11)
Globe : A Journal of Language, Culture and Communication     Open Access   (Followers: 3)
Green Letters : Studies in Ecocriticism     Hybrid Journal   (Followers: 1)
GSI Journals Serie C : Advancements in Information Sciences and Technologies     Open Access   (Followers: 1)
GSTF Journal on Media & Communications     Open Access   (Followers: 2)
H-ermes. Journal of Communication     Open Access   (Followers: 3)
Health Information Management Journal     Hybrid Journal   (Followers: 23)
HERMES - Journal of Language and Communication in Business     Open Access   (Followers: 3)
Hipertext.net : Anuario Académico sobre Documentación Digital y Comunicación Interactiva     Open Access  
Historia y Comunicación Social     Open Access  
Human Communication Research     Hybrid Journal   (Followers: 17)
Ibérica     Open Access   (Followers: 2)
Ícone     Open Access  
ICSES Transactions on Computer Networks and Communications     Full-text available via subscription  
IEEE Communications Standards Magazine     Full-text available via subscription   (Followers: 2)
IEEE Open Journal of the Communications Society     Open Access  
IEEE Transactions on Cognitive Communications and Networking     Hybrid Journal   (Followers: 4)
IEEE Transactions on Smart Grid     Hybrid Journal   (Followers: 18)
IEICE - Transactions on Fundamentals of Electronics, Communications and Computer Sciences     Full-text available via subscription   (Followers: 9)
IET Communications     Open Access   (Followers: 11)
İletişim Kuram ve Araştırma Dergisi     Open Access  
Imaging Decisions MRI     Hybrid Journal   (Followers: 2)
Improntas     Open Access  
index.comunicación     Open Access  
Informacijos mokslai     Open Access  
Informal Logic     Open Access   (Followers: 9)
Informatics     Open Access   (Followers: 3)
Informatio. Revista del Instituto de Información de la Facultad de Información y Comunicación     Open Access  
Information & Communications Technology Law     Hybrid Journal   (Followers: 22)
Information Design Journal     Hybrid Journal   (Followers: 7)
Information Technologies & International Development     Open Access   (Followers: 81)
Information, Communication & Society     Hybrid Journal   (Followers: 70)
Inquiry : Critical Thinking Across the Disciplines     Full-text available via subscription   (Followers: 2)
Intelligent Information Management     Open Access   (Followers: 7)
Interaction Studies     Hybrid Journal   (Followers: 9)
Interactions : Studies in Communication & Culture     Hybrid Journal   (Followers: 3)
International Journal of Ad Hoc and Ubiquitous Computing     Hybrid Journal   (Followers: 8)
International Journal of Advanced Media and Communication     Hybrid Journal   (Followers: 22)
International Journal of Autonomous and Adaptive Communications Systems     Hybrid Journal   (Followers: 3)
International Journal of Broadband Cellular Communication     Full-text available via subscription  
International Journal of Business Communication     Hybrid Journal   (Followers: 10)
International Journal of Communication     Open Access   (Followers: 15)
International Journal of Community Development and Management Studies (IJCDMS)     Open Access  
International Journal of Computer Science and Telecommunications     Open Access   (Followers: 13)
International Journal of Cooperative Information Systems     Hybrid Journal   (Followers: 4)
International Journal of Critical Media Literacy     Hybrid Journal  
International Journal of Electronics and Telecommunications     Open Access   (Followers: 8)
International Journal of Entertainment Technology and Management     Hybrid Journal   (Followers: 1)
International Journal of Information and Communication Technology Education     Full-text available via subscription   (Followers: 13)
International Journal of Information Communication Technologies and Human Development     Full-text available via subscription   (Followers: 4)
International Journal of Information Science and Technology     Open Access  
International Journal of Information Technology, Communications and Convergence     Hybrid Journal   (Followers: 14)
International Journal of Intelligence Science     Open Access   (Followers: 3)
International Journal of Interdisciplinary Telecommunications and Networking     Full-text available via subscription   (Followers: 3)
International Journal of Knowledge and Systems Science     Full-text available via subscription   (Followers: 1)
International Journal of Monitoring and Surveillance Technologies Research     Full-text available via subscription   (Followers: 3)
International Journal of Review in Electronics & Communication Engineering     Open Access   (Followers: 2)
International Journal of Society, Culture & Language     Open Access   (Followers: 15)
International Journal of Telecommunications & Emerging Technologies     Full-text available via subscription   (Followers: 1)
International Journal of Telework and Telecommuting Technologies     Full-text available via subscription  
International Journal of Trust Management in Computing and Communications     Hybrid Journal   (Followers: 1)
International Journals Digital Communication and Analog Signals     Full-text available via subscription   (Followers: 6)
International Review of Communication and Marketing Mix : IROCAMM     Open Access   (Followers: 1)
International Review of Pragmatics     Hybrid Journal   (Followers: 4)
Investigative Radiology     Hybrid Journal   (Followers: 7)
IRIS - Revista de Informação, Memória e Tecnologia     Open Access  
Izvestia Ural Federal University Journal. Series 1. Issues in Education, Science and Culture     Open Access  
Javnost - The Public     Hybrid Journal  
Język. Komunikacja. Informacja     Open Access  
Journal for the History of Rhetoric     Hybrid Journal   (Followers: 16)
Journal of Advertising Education     Hybrid Journal  
Journal of African Media Studies     Hybrid Journal   (Followers: 2)
Journal of Applied Communications     Open Access  
Journal of Applied Journalism & Media Studies     Hybrid Journal   (Followers: 14)
Journal of Argumentation in Context     Hybrid Journal   (Followers: 2)
Journal of Arts & Communities     Hybrid Journal   (Followers: 4)

        1 2 3 | Last

Similar Journals
Journal Cover
Annals of Telecommunications
Journal Prestige (SJR): 0.223
Citation Impact (citeScore): 1
Number of Followers: 6  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 1958-9395 - ISSN (Online) 0003-4347
Published by Springer-Verlag Homepage  [2469 journals]
  • Digital sufficiency: conceptual considerations for ICTs on a finite planet

    • Free pre-print version: Loading...

      Abstract: Abstract ICT hold significant potential to increase resource and energy efficiencies and contribute to a circular economy. Yet unresolved is whether the aggregated net effect of ICT overall mitigates or aggravates environmental burdens. While the savings potentials have been explored, drivers that prevent these and possible counter measures have not been researched thoroughly. The concept digital sufficiency constitutes a basis to understand how ICT can become part of the essential environmental transformation. Digital sufficiency consists of four dimensions, each suggesting a set of strategies and policy proposals: (a) hardware sufficiency, which aims for fewer devices needing to be produced and their absolute energy demand being kept to the lowest level possible to perform the desired tasks; (b) software sufficiency, which covers ensuring that data traffic and hardware utilization during application are kept as low as possible; (c) user sufficiency, which strives for users applying digital devices frugally and using ICT in a way that promotes sustainable lifestyles; and (d) economic sufficiency, which aspires to digitalization supporting a transition to an economy characterized not by economic growth as the primary goal but by sufficient production and consumption within planetary boundaries. The policies for hardware and software sufficiency are relatively easily conceivable and executable. Policies for user and economic sufficiency are politically more difficult to implement and relate strongly to policies for environmental transformation in general. This article argues for comprehensive policies for digital sufficiency, which are indispensible if ICT are to play a beneficial role in overall environmental transformation.
      PubDate: 2022-05-12
       
  • Balance: depolarized intelligent sensing system with multi-angle
           energy-saving optimized control model

    • Free pre-print version: Loading...

      Abstract: Abstract A simulation model of balanced energy consumption for wireless sensor networks (WSNs) is proposed to solve the uneven energy consumption problem in WSN that leads to the rapid death of some nodes and the occurrence of blind spots. The model consists of five parts: a hierarchical model, an energy consumption model, a cluster filtration model, a data transmission model, and a cluster model. It forms a complete scheme that can effectively solve the problems of unreasonable cluster head selection, uneven clustering, and poor network robustness in WSN networking by combining energy consumption depolarization strategies to fill the gap of set optimization scheme. A clustering method is proposed to equalize node load, and an adaptive two-cluster model is used in accordance with node location to equalize network energy consumption. The simulation results show that the proposed energy consumption model can significantly improve the overall performance of the network. The network lifetime is extended by about 120%, the total data transmission per unit of energy is improved by 51% on average, the redundant data generation is reduced by 44.2%, and the localization tracking success rate is reduced by only 2.14%.
      PubDate: 2022-05-07
       
  • Mutated traffic detection and recovery: an adversarial generative deep
           learning approach

    • Free pre-print version: Loading...

      Abstract: Abstract Machine learning (ML)-based traffic classification is evolving into a well-established research domain. Considering statistical characteristics of the traffic flows, ML-based classification methods have succeeded in even classifying encrypted traffic. However, recent research efforts have emerged, for privacy preservation, where traffic obfuscation is being considered as a way to hide traffic characteristics preventing traffic classification. Traffic mutation is one such obfuscation technique that consists of modifying the flow packet sizes and inter-arrival times. However, at the same time, these techniques can be used by malicious attackers to hide their attack traffic and avoid detection. In this paper, we propose a deep learning (DL) model to detect mutated traffic and recover the original one. The experimental results show the effectiveness of the proposed model in detecting mutated traffic with a detection rate up to 95%, on average, and denoising recovery loss less than 3 × 10− 1.
      PubDate: 2022-04-23
       
  • An extended assessment of metaheuristics-based feature selection for
           intrusion detection in CPS perception layer

    • Free pre-print version: Loading...

      Abstract: Abstract Cyber-physical systems (CPS) are multi-layer complex systems that form the basis for the world’s critical infrastructure and, thus, have a significant impact on human lives. In recent years, the increasing demand for connectivity in CPS has brought attention to the issue of cyber security. Aside from traditional information systems threats, CPS faces new challenges due to the heterogeneity of devices and protocols. In this paper, we assess how feature selection may improve different machine learning training approaches for intrusion detection and identify the best features for each intrusion detection system (IDS) setup. In particular, we propose using F1-Score as a criteria for the adapted greedy randomized adaptive search procedure (GRASP) metaheuristic to improve the intrusion detection performance through binary, multi-class, and expert classifiers. Our numerical results reveal that there are different feature subsets that are more suitable for each combination of IDS approach, classifier algorithm, and attack class. The GRASP metaheuristic found features that detect accurately four DoS (denial of service) attack classes and several variations of injection attacks in cyber physical systems.
      PubDate: 2022-04-20
       
  • Product of two Gaussian Q-functions as sum of exponentials and its
           applications

    • Free pre-print version: Loading...

      Abstract: Abstract In this paper, product of two Gaussian-Q functions is represented as sum of exponentials. It is further used to evaluate error probabilities of modulation techniques in fading distributions. The knowledge of moment generating function (MGF) is sufficient enough to derive closed-form solution to integrals appearing in symbol error probability (SEP). Numerical results demonstrate accuracy improvement over other existing competing approximations. Furthermore, the proposed solutions are fairly simple as MGF of fading models comprises of fundamental mathematical functions.
      PubDate: 2022-04-01
      DOI: 10.1007/s12243-021-00864-w
       
  • Iterative interference alignment with spatial hole sensing in MIMO
           cognitive radio networks

    • Free pre-print version: Loading...

      Abstract: Abstract This paper investigates the performance of iterative interference alignment (IA) with spatial hole sensing in K-user multi-input multi-output (MIMO) cognitive radio (CR) networks. In the considered network, there are some unused degrees of freedom (DoF) or equivalently spatial holes in the primary network (PN) where the secondary network (SN) users communicate without causing harmful interference to the PN receivers. First, the generalized likelihood ratio test method is utilized to determine the availability of the unused DoFs; then, it is decided whether individual primary streams are present in the PN. With the aid of precoding and suppression matrices generated by an iterative IA approach, the interferences in the PN that are caused by the SN are aligned, and due to the secondary transmission, interference leakage on the kth primary receiver decreases below 10− 6. The effects of the detection threshold values and the number of transmitter and receiver antennas are investigated in terms of detection and false alarm probability. Finally, the amplify-and-forward (AF) relaying scheme in the SN is evaluated and the impact of the relaying architecture on the system performance is analyzed.
      PubDate: 2022-04-01
      DOI: 10.1007/s12243-021-00869-5
       
  • Federated learning-based scheme for detecting passive mobile attackers in
           5G vehicular edge computing

    • Free pre-print version: Loading...

      Abstract: Abstract Detecting passive attacks is always considered difficult in vehicular networks. Passive attackers can eavesdrop on the wireless medium to collect beacons. These beacons can be exploited to track the positions of vehicles not only to violate their location privacy but also for criminal purposes. In this paper, we propose a novel federated learning-based scheme for detecting passive mobile attackers in 5G vehicular edge computing. We first identify a set of strategies that can be used by attackers to efficiently track vehicles without being visually detected. We then build an efficient machine learning (ML) model to detect tracking attacks based only on the receiving beacons. Our scheme enables federated learning (FL) at the edge to ensure collaborative learning while preserving the privacy of vehicles. Moreover, FL clients use a semi-supervised learning approach to ensure accurate self-labeling. Our experiments demonstrate the effectiveness of our proposed scheme to detect passive mobile attackers quickly and with high accuracy. Indeed, only 20 received beacons are required to achieve 95% accuracy. This accuracy can be achieved within 60 FL rounds using 5 FL clients in each FL round. The obtained results are also validated through simulations.
      PubDate: 2022-04-01
      DOI: 10.1007/s12243-021-00871-x
       
  • A novel offline indoor acoustic synchronization protocol: experimental
           analysis

    • Free pre-print version: Loading...

      Abstract: Abstract Smart electronic devices are playing a fundamental role in modern home and industrial applications. The increased reliance on such devices, especially in time critical and secure applications, intensifies the need for time synchronization among multiple devices. This work presents a novel audio-based, cheap, offline synchronization method, whereby multiple slaves synchronize simultaneously to a master within a single room. Synchronization is carried out under the proposed protocol in a way that is independent of the physical location of the target devices, which in turn are not required to have any sort of network connectivity. The proposed method relies on the transmission of a De Bruijn sequence that holds the information required for the slaves to synchronize. The effectiveness of the proposed synchronization protocol is validated through an in-house experimental setup. Synchronization at distances of up to 250 cm between the master and a slave was achieved.
      PubDate: 2022-04-01
      DOI: 10.1007/s12243-021-00877-5
       
  • Wi-Sense: a passive human activity recognition system using Wi-Fi and
           convolutional neural network and its integration in health information
           systems

    • Free pre-print version: Loading...

      Abstract: Abstract A human activity recognition (HAR) system acts as the backbone of many human-centric applications, such as active assisted living and in-home monitoring for elderly and physically impaired people. Although existing Wi-Fi-based human activity recognition methods report good results, their performance is affected by the changes in the ambient environment. In this work, we present Wi-Sense—a human activity recognition system that uses a convolutional neural network (CNN) to recognize human activities based on the environment-independent fingerprints extracted from the Wi-Fi channel state information (CSI). First, Wi-Sense captures the CSI by using a standard Wi-Fi network interface card. Wi-Sense applies the CSI ratio method to reduce the noise and the impact of the phase offset. In addition, it applies the principal component analysis to remove redundant information. This step not only reduces the data dimension but also removes the environmental impact. Thereafter, we compute the processed data spectrogram which reveals environment-independent time-variant micro-Doppler fingerprints of the performed activity. We use these spectrogram images to train a CNN. We evaluate our approach by using a human activity data set collected from nine volunteers in an indoor environment. Our results show that Wi-Sense can recognize these activities with an overall accuracy of 97.78%. To stress on the applicability of the proposed Wi-Sense system, we provide an overview of the standards involved in the health information systems and systematically describe how Wi-Sense HAR system can be integrated into the eHealth infrastructure.
      PubDate: 2022-04-01
      DOI: 10.1007/s12243-021-00865-9
       
  • An SDN-based energy-aware traffic management mechanism

    • Free pre-print version: Loading...

      Abstract: Abstract Green computing is a central theme in many computer science areas, including computer networks. Dynamic solutions that can properly adjust network resources can prevent infrastructure over-provision and mitigate power consumption during low-demand periods. In this work, we propose DTM (Dynamic mechanism for Traffic Management), an energy-aware dynamic mechanism for traffic management, built upon the SDN paradigm. DTM continuously monitors the use of network links to concentrate traffic and disconnect idle equipment without degrading the offered quality of service. Our simulations show that the mechanism can save up to 46% of energy, on average, in the links’ capacities of homogeneous and heterogeneous scenarios. In scenarios with average to high traffic demands, the mean energy savings are 36.72% and 17.86%, respectively. Compared to a well-known existing mechanism, our approach is up to 7% better for medium-demand scenarios, and approximately 4% better for high-demand scenarios.
      PubDate: 2022-04-01
      DOI: 10.1007/s12243-021-00863-x
       
  • Performance analysis of full-duplex decode-and-forward two-way relay
           networks with transceiver impairments

    • Free pre-print version: Loading...

      Abstract: Abstract In this paper, we analyze the performance of an in-band full-duplex (IBFD) decode-and-forward (DF) two-way relay (TWR) system whose two terminal nodes exchange information via a relay node over the same frequency and time slot. Unlike the previous works on full-duplex two-way relay systems, we investigate the system performance under the impacts of both hardware impairments and imperfect self-interference cancellation (SIC) at all full-duplex nodes. Specifically, we derive the exact expression of outage probability based on the signal to interference plus noise and distortion ratio (SINDR), thereby determine the throughput and the symbol error probability (SEP) of the considered system. The numerical results show a strong impact of transceiver impairments on the system performance, making it saturate at even a low level of residual self-interference. In order to tackle with the impact of hardware impairments, we derive an optimal power allocation factor for the relay node to minimize the outage performance. Finally, the numerical results are validated by Monte Carlo simulations.
      PubDate: 2022-04-01
      DOI: 10.1007/s12243-021-00870-y
       
  • Secrecy sum rate maximization for UAV-aided NOMA communication systems

    • Free pre-print version: Loading...

      Abstract: Abstract This article studies the secure communication of a non-orthogonal multiple access (NOMA) system with the help of an unmanned aerial vehicle (UAV). The UAV flies from an initial location to a final location and assists the NOMA communication between terrestrial nodes, including a source, a near user, and a far user, in the presence of an eavesdropper. Artificial noise (AN) is inserted into the transmitted signal of the UAV to enable secure communication for the users. To maximize the system secrecy sum-rate (SSSR), an algorithm is proposed to optimize key system parameters, such as the UAV’s trajectory, the power–allocation factors, and the transmit powers of the source and the UAV. Since the objective function of the SSSR maximization problem is non-convex, the successive convex optimization (SCO) and block coordinate descent (BCD) methods are applied to find efficient approximate solutions. The effectiveness of the proposed algorithms is confirmed by simulation results.
      PubDate: 2022-04-01
      DOI: 10.1007/s12243-021-00859-7
       
  • A noise reduction orthogonal multi-user CDSK communication system based on
           frequency domain processing

    • Free pre-print version: Loading...

      Abstract: Abstract In this paper, a noise reduction orthogonal multi-user correlated delay shift keying (NR-OMU-CDSK) noncoherent communication system based on frequency domain processing is proposed. In NR-OMU-CDSK, chaotic signal generated in frequency domain is converted to time domain through inverse Fourier transform, and then the real and imaginary components of the time domain signal are simultaneously modulated to two phase-orthogonal branches. The transmission rate and security performance of each branch are further improved by switches and Walsh code. In the receiver, moving average filter is used to reduce the variance of interference term in the decision variable, and information bits are obtained through relevant demodulation. The bit error rate (BER) performance of NR-OMU-CDSK is evaluated in AWGN channel and multipath Rayleigh fading channel. The research results show that the theoretical BER is basically consistent with the simulation results. The transmission rate of NR-OMU-CDSK is improved by 4N×100% (N is the number of users), and the signal-to-noise ratio is improved by nearly 4dB for the same BER performance, when NR-OMU-CDSK is compared with conventional CDSK in AWGN channel. Moreover, compared to other multi-user systems, this system has also obvious advantages in various system performance and avoids RF delay line problems.
      PubDate: 2022-04-01
      DOI: 10.1007/s12243-021-00873-9
       
  • Investigating the practicality of adversarial evasion attacks on network
           intrusion detection

    • Free pre-print version: Loading...

      Abstract: Abstract As machine learning models are increasingly integrated into critical cybersecurity tools, their security issues become a priority. Particularly after the rise of adversarial examples, original data to which a small and well-computed perturbation is added to influence the prediction of the model. Applied to cybersecurity tools, like network intrusion detection systems, they could allow attackers to evade detection mechanisms that rely on machine learning. However, if the perturbation does not consider the constraints of network traffic, the adversarial examples may be inconsistent, thus making the attack invalid. These inconsistencies are a major obstacle to the implementation of end-to-end network attacks. In this article, we study the practicality of adversarial attacks for the purpose of evading network intrusion detection models. We evaluate the impact of state-of-the-art attacks on three different datasets. Through a fine-grained analysis of the generated adversarial examples, we introduce and discuss four key criteria that are necessary for the validity of network traffic, namely value ranges, binary values, multiple category membership, and semantic relations.
      PubDate: 2022-03-28
       
  • Slotted patch and ground for reducing side lobe level of planar antenna
           operating under higher order mode

    • Free pre-print version: Loading...

      Abstract: Abstract In this article, a novel technique based on the combined utilization of slots in patch and ground plane is proposed to reduce the side lobe level (SLL) in the E-plane of a square patch antenna operating at TM03 mode. The concept of beam reshaping through surface current reorientation is explained in detail by an analytical model and the same is validated through simulated as well as measured results. The combination of a complementary split-ring resonator (CSRR)–shaped slot, two plus-shaped slots on the patch and a plus-shaped defected ground structure (DGS), reduces the SLL by 14.7 dB and increases the half-power beamwidth (HPBW) and first null beamwidth (FNBW) by 21° and 42°, respectively, in comparison to the conventional square patch antenna. Starting from the basic expression of the E-plane radiation pattern of a square patch, an analytical model is invoked to modify this basic expression as per the structural modification to get the final expression for the proposed antenna structure. The physical insight for the stepwise modifications of the antenna structure is properly explained and justified. Analytical and simulated predictions are experimentally verified using a prototype. The simulated and measured results show a good agreement.
      PubDate: 2022-03-15
       
  • A bi-objective optimization model for segment routing traffic engineering

    • Free pre-print version: Loading...

      Abstract: Abstract The number of tunnels configured and state kept in IP/MPLS backbones depends on the number of flows and traffic engineering requirements. Segment routing automates tunnel configuration and reduces state in the network, based on the concept of segments: subpaths of the graph. A flow can be defined using only one segment if the route matches the shortest path computed by the IGP, while this number grows with the need for different subpaths. As a consequence, there is a trade-off between traffic engineering and the number of segments used, which translates to header overhead and state in routers. The challenge then is to have flows sharing as many segments as possible. We advance the state of the art with a two-step bi-objective optimization model to reduce the number of configured segments, considering two traffic engineering requirements, load balancing and latency. Our results show that, as we increase the number of flows in the network, the number of configured segments also increases, and then stabilizes regardless of the number of additional flows. Hence, using a real telecommunication network, we show that we can meet traffic engineering requirements with less than 22% of the total number of states as compared to the usual case of IP/MPLS backbones.
      PubDate: 2022-02-18
      DOI: 10.1007/s12243-022-00907-w
       
  • A statistical analysis of intrinsic bias of network security datasets for
           training machine learning mechanisms

    • Free pre-print version: Loading...

      Abstract: Abstract Machine learning mechanisms for network intrusion detection systems lack accurate evaluation, comparison, and deployment due to the scarcity of well-constructed datasets. In this paper, we propose a statistical analysis of the features contained in four highly used security datasets. We conclude that the analyzed datasets should not be used as a benchmark for creating novel anomaly-based mechanisms for intrusion detection systems. The analyzed datasets introduce a biased classification since features are over-correlated, and most of the features are capable of making a complete distinction between normal and attack flows. Our proposed methodology analyzes the correlation among features instead of checking for redundant values or data imbalance. The results align with the performance of three machine learning techniques. We show that biased classification occurs due to a significant difference between attack and normal data. The syntactically generated features are statistically different between normal and attack classes, which implies overfitting in the machine learning approaches.
      PubDate: 2022-02-12
      DOI: 10.1007/s12243-021-00904-5
       
  • Special issue on blockchain networks and distributed protocols

    • Free pre-print version: Loading...

      PubDate: 2022-02-05
      DOI: 10.1007/s12243-022-00908-9
       
  • Fibonacci tiles strategy for optimal coverage in IoT networks

    • Free pre-print version: Loading...

      Abstract: Abstract This paper aims to find a minimal set of nodes to optimize coverage, connectivity, and energy-efficiency for 2D and 3D Wireless Sensor Networks (WSN). This issue is denoted as a trinomial problem in our study. We propose using the paving rectangle technique, which provides a minimal number of squares based on Fibonacci’s tiles. Applying this strategy to the area coverage, connectivity, and lifetime can reduce the non-deterministic polynomial time problem (NP-Hard problem). We propose a theoretical framework to model the problem, to show the effectiveness of the method applied to the area coverage, connectivity, and lifetime on heterogeneous WSNs. The simulation results highlight the benefits of using this technique.
      PubDate: 2022-02-03
      DOI: 10.1007/s12243-021-00890-8
       
  • Lattice-based undeniable signature scheme

    • Free pre-print version: Loading...

      Abstract: Abstract In this paper, we propose a lattice-based undeniable signature where security is based on the hardness of the ISIS problem. The security requirements for an undeniable signature scheme are clearly described, and the proposed scheme is proved to enjoy completeness, soundness, unforgeability, and invisibility properties.
      PubDate: 2022-01-10
      DOI: 10.1007/s12243-021-00843-1
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.235.176.80
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-