A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

        1 2 | Last   [Sort alphabetically]   [Restore default list]

  Subjects -> ELECTRONICS (Total: 207 journals)
Showing 1 - 200 of 277 Journals sorted by number of followers
IEEE Transactions on Aerospace and Electronic Systems     Hybrid Journal   (Followers: 314)
Control Systems     Hybrid Journal   (Followers: 252)
IEEE Transactions on Geoscience and Remote Sensing     Hybrid Journal   (Followers: 202)
Journal of Guidance, Control, and Dynamics     Hybrid Journal   (Followers: 194)
Electronics     Open Access   (Followers: 138)
Advances in Electronics     Open Access   (Followers: 132)
Electronic Design     Partially Free   (Followers: 129)
Electronics For You     Partially Free   (Followers: 128)
IEEE Antennas and Propagation Magazine     Hybrid Journal   (Followers: 120)
IEEE Power Electronics Magazine     Full-text available via subscription   (Followers: 91)
IEEE Transactions on Power Electronics     Hybrid Journal   (Followers: 89)
IEEE Antennas and Wireless Propagation Letters     Hybrid Journal   (Followers: 88)
IEEE Transactions on Software Engineering     Hybrid Journal   (Followers: 84)
IEEE Transactions on Industrial Electronics     Hybrid Journal   (Followers: 84)
IEEE Transactions on Antennas and Propagation     Full-text available via subscription   (Followers: 81)
IET Power Electronics     Open Access   (Followers: 70)
IEEE Transactions on Automatic Control     Hybrid Journal   (Followers: 67)
Selected Topics in Applied Earth Observations and Remote Sensing, IEEE Journal of     Hybrid Journal   (Followers: 63)
IEEE Embedded Systems Letters     Hybrid Journal   (Followers: 62)
IEEE Transactions on Industry Applications     Hybrid Journal   (Followers: 58)
IEEE Journal of Emerging and Selected Topics in Power Electronics     Hybrid Journal   (Followers: 53)
Canadian Journal of Remote Sensing     Full-text available via subscription   (Followers: 53)
Advances in Power Electronics     Open Access   (Followers: 49)
IEEE Nanotechnology Magazine     Hybrid Journal   (Followers: 45)
IEEE Transactions on Consumer Electronics     Hybrid Journal   (Followers: 45)
Journal of Electrical and Electronics Engineering Research     Open Access   (Followers: 41)
IEEE Transactions on Biomedical Engineering     Hybrid Journal   (Followers: 35)
IEEE Transactions on Circuits and Systems for Video Technology     Hybrid Journal   (Followers: 34)
IET Microwaves, Antennas & Propagation     Open Access   (Followers: 34)
Journal of Physics B: Atomic, Molecular and Optical Physics     Hybrid Journal   (Followers: 32)
American Journal of Electrical and Electronic Engineering     Open Access   (Followers: 30)
IEEE Transactions on Information Theory     Hybrid Journal   (Followers: 28)
Electronics Letters     Open Access   (Followers: 28)
Bell Labs Technical Journal     Hybrid Journal   (Followers: 27)
Microelectronics and Solid State Electronics     Open Access   (Followers: 27)
International Journal of Power Electronics     Hybrid Journal   (Followers: 24)
International Journal of Aerospace Innovations     Full-text available via subscription   (Followers: 24)
Journal of Sensors     Open Access   (Followers: 23)
International Journal of Image, Graphics and Signal Processing     Open Access   (Followers: 22)
IEEE Reviews in Biomedical Engineering     Hybrid Journal   (Followers: 20)
IEEE/OSA Journal of Optical Communications and Networking     Hybrid Journal   (Followers: 19)
IEEE Transactions on Electron Devices     Hybrid Journal   (Followers: 18)
Journal of Artificial Intelligence     Open Access   (Followers: 18)
Journal of Power Electronics & Power Systems     Full-text available via subscription   (Followers: 17)
IET Wireless Sensor Systems     Open Access   (Followers: 17)
Circuits and Systems     Open Access   (Followers: 16)
Machine Learning with Applications     Full-text available via subscription   (Followers: 15)
Archives of Electrical Engineering     Open Access   (Followers: 15)
International Journal of Control     Hybrid Journal   (Followers: 14)
IEEE Transactions on Signal and Information Processing over Networks     Hybrid Journal   (Followers: 14)
International Journal of Advanced Research in Computer Science and Electronics Engineering     Open Access   (Followers: 14)
IEEE Women in Engineering Magazine     Hybrid Journal   (Followers: 13)
Advances in Microelectronic Engineering     Open Access   (Followers: 13)
IEEE Solid-State Circuits Magazine     Hybrid Journal   (Followers: 13)
IEEE Transactions on Learning Technologies     Full-text available via subscription   (Followers: 12)
IEEE Transactions on Broadcasting     Hybrid Journal   (Followers: 12)
Intelligent Transportation Systems Magazine, IEEE     Full-text available via subscription   (Followers: 12)
International Journal of Microwave and Wireless Technologies     Hybrid Journal   (Followers: 11)
Journal of Low Power Electronics     Full-text available via subscription   (Followers: 11)
International Journal of Advanced Electronics and Communication Systems     Open Access   (Followers: 11)
IEICE - Transactions on Electronics     Full-text available via subscription   (Followers: 11)
International Journal of Sensors, Wireless Communications and Control     Hybrid Journal   (Followers: 11)
Open Journal of Antennas and Propagation     Open Access   (Followers: 10)
IETE Journal of Research     Open Access   (Followers: 10)
Solid-State Electronics     Hybrid Journal   (Followers: 10)
International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems     Open Access   (Followers: 10)
Journal of Signal and Information Processing     Open Access   (Followers: 9)
IETE Technical Review     Open Access   (Followers: 9)
International Journal of Wireless and Microwave Technologies     Open Access   (Followers: 9)
Nature Electronics     Hybrid Journal   (Followers: 9)
Superconductivity     Full-text available via subscription   (Followers: 9)
Electronics and Communications in Japan     Hybrid Journal   (Followers: 9)
Batteries     Open Access   (Followers: 9)
APSIPA Transactions on Signal and Information Processing     Open Access   (Followers: 8)
International Journal of Electronics and Telecommunications     Open Access   (Followers: 8)
International Journal of Antennas and Propagation     Open Access   (Followers: 8)
Journal of Low Power Electronics and Applications     Open Access   (Followers: 8)
IEEE Journal of the Electron Devices Society     Open Access   (Followers: 8)
Journal of Electronic Design Technology     Full-text available via subscription   (Followers: 8)
Advances in Electrical and Electronic Engineering     Open Access   (Followers: 8)
IEEE Transactions on Autonomous Mental Development     Hybrid Journal   (Followers: 8)
Journal of Electromagnetic Waves and Applications     Hybrid Journal   (Followers: 8)
China Communications     Full-text available via subscription   (Followers: 8)
Universal Journal of Electrical and Electronic Engineering     Open Access   (Followers: 7)
Power Electronic Devices and Components     Open Access   (Followers: 7)
Foundations and Trends® in Signal Processing     Full-text available via subscription   (Followers: 7)
Nanotechnology, Science and Applications     Open Access   (Followers: 7)
IEEE Magnetics Letters     Hybrid Journal   (Followers: 7)
Progress in Quantum Electronics     Full-text available via subscription   (Followers: 7)
Foundations and Trends® in Communications and Information Theory     Full-text available via subscription   (Followers: 6)
Metrology and Measurement Systems     Open Access   (Followers: 6)
Advances in Biosensors and Bioelectronics     Open Access   (Followers: 6)
International Journal of Systems, Control and Communications     Hybrid Journal   (Followers: 6)
Kinetik : Game Technology, Information System, Computer Network, Computing, Electronics, and Control     Open Access   (Followers: 6)
International Journal of Electronics     Hybrid Journal   (Followers: 6)
IEICE - Transactions on Information and Systems     Full-text available via subscription   (Followers: 6)
Research & Reviews : Journal of Embedded System & Applications     Full-text available via subscription   (Followers: 6)
Journal of Power Electronics     Hybrid Journal   (Followers: 6)
Annals of Telecommunications     Hybrid Journal   (Followers: 6)
Electronic Markets     Hybrid Journal   (Followers: 6)
Energy Storage Materials     Full-text available via subscription   (Followers: 6)
IEEE Transactions on Services Computing     Hybrid Journal   (Followers: 5)
International Journal of Computational Vision and Robotics     Hybrid Journal   (Followers: 5)
Journal of Optoelectronics Engineering     Open Access   (Followers: 5)
Journal of Electromagnetic Analysis and Applications     Open Access   (Followers: 5)
Journal of Field Robotics     Hybrid Journal   (Followers: 5)
Journal of Electronics (China)     Hybrid Journal   (Followers: 5)
Batteries & Supercaps     Hybrid Journal   (Followers: 5)
IEEE Pulse     Hybrid Journal   (Followers: 5)
Journal of Microelectronics and Electronic Packaging     Hybrid Journal   (Followers: 4)
Networks: an International Journal     Hybrid Journal   (Followers: 4)
EPE Journal : European Power Electronics and Drives     Hybrid Journal   (Followers: 4)
Advanced Materials Technologies     Hybrid Journal   (Followers: 4)
Frontiers in Electronics     Open Access   (Followers: 4)
Wireless and Mobile Technologies     Open Access   (Followers: 4)
Synthesis Lectures on Power Electronics     Full-text available via subscription   (Followers: 4)
Journal of Energy Storage     Full-text available via subscription   (Followers: 4)
IEEE Transactions on Haptics     Hybrid Journal   (Followers: 4)
Journal of Electrical Engineering & Electronic Technology     Hybrid Journal   (Followers: 4)
Journal of Circuits, Systems, and Computers     Hybrid Journal   (Followers: 4)
International Journal of Review in Electronics & Communication Engineering     Open Access   (Followers: 4)
Electronic Materials Letters     Hybrid Journal   (Followers: 4)
Journal of Biosensors & Bioelectronics     Open Access   (Followers: 4)
Biomedical Instrumentation & Technology     Hybrid Journal   (Followers: 4)
IJEIS (Indonesian Journal of Electronics and Instrumentation Systems)     Open Access   (Followers: 3)
Informatik-Spektrum     Hybrid Journal   (Followers: 3)
IEEE Journal on Exploratory Solid-State Computational Devices and Circuits     Hybrid Journal   (Followers: 3)
International Journal of Numerical Modelling: Electronic Networks, Devices and Fields     Hybrid Journal   (Followers: 3)
Advancing Microelectronics     Hybrid Journal   (Followers: 3)
International Journal of Applied Electronics in Physics & Robotics     Open Access   (Followers: 3)
IETE Journal of Education     Open Access   (Followers: 3)
Superconductor Science and Technology     Hybrid Journal   (Followers: 3)
Sensors International     Open Access   (Followers: 3)
e-Prime : Advances in Electrical Engineering, Electronics and Energy     Open Access   (Followers: 3)
EPJ Quantum Technology     Open Access   (Followers: 3)
Frontiers of Optoelectronics     Hybrid Journal   (Followers: 3)
Transactions on Electrical and Electronic Materials     Hybrid Journal   (Followers: 2)
ACS Applied Electronic Materials     Open Access   (Followers: 2)
IET Smart Grid     Open Access   (Followers: 2)
Energy Storage     Hybrid Journal   (Followers: 2)
Journal of Microwave Power and Electromagnetic Energy     Hybrid Journal   (Followers: 2)
Australian Journal of Electrical and Electronics Engineering     Hybrid Journal   (Followers: 2)
Journal of Information and Telecommunication     Open Access   (Followers: 2)
TELKOMNIKA (Telecommunication, Computing, Electronics and Control)     Open Access   (Followers: 2)
Journal of Semiconductors     Full-text available via subscription   (Followers: 2)
Radiophysics and Quantum Electronics     Hybrid Journal   (Followers: 2)
International Transaction of Electrical and Computer Engineers System     Open Access   (Followers: 2)
Journal of Intelligent Procedures in Electrical Technology     Open Access   (Followers: 2)
Sensing and Imaging : An International Journal     Hybrid Journal   (Followers: 2)
Security and Communication Networks     Hybrid Journal   (Followers: 2)
Journal of Nuclear Cardiology     Hybrid Journal   (Followers: 2)
ECTI Transactions on Electrical Engineering, Electronics, and Communications     Open Access   (Followers: 1)
IET Energy Systems Integration     Open Access   (Followers: 1)
Majalah Ilmiah Teknologi Elektro : Journal of Electrical Technology     Open Access   (Followers: 1)
International Journal of Granular Computing, Rough Sets and Intelligent Systems     Hybrid Journal   (Followers: 1)
IEEE Letters on Electromagnetic Compatibility Practice and Applications     Hybrid Journal   (Followers: 1)
Journal of Computational Intelligence and Electronic Systems     Full-text available via subscription   (Followers: 1)
Електротехніка і Електромеханіка     Open Access   (Followers: 1)
Open Electrical & Electronic Engineering Journal     Open Access   (Followers: 1)
IEEE Journal of Electromagnetics, RF and Microwaves in Medicine and Biology     Hybrid Journal   (Followers: 1)
Journal of Advanced Dielectrics     Open Access   (Followers: 1)
Transactions on Cryptographic Hardware and Embedded Systems     Open Access   (Followers: 1)
International Journal of Hybrid Intelligence     Hybrid Journal   (Followers: 1)
Ural Radio Engineering Journal     Open Access   (Followers: 1)
IET Cyber-Physical Systems : Theory & Applications     Open Access   (Followers: 1)
Edu Elektrika Journal     Open Access   (Followers: 1)
Power Electronics and Drives     Open Access   (Followers: 1)
Automatika : Journal for Control, Measurement, Electronics, Computing and Communications     Open Access  
npj Flexible Electronics     Open Access  
Elektronika ir Elektortechnika     Open Access  
Emitor : Jurnal Teknik Elektro     Open Access  
IEEE Solid-State Circuits Letters     Hybrid Journal  
IEEE Open Journal of Industry Applications     Open Access  
IEEE Open Journal of the Industrial Electronics Society     Open Access  
IEEE Open Journal of Circuits and Systems     Open Access  
Journal of Electronic Science and Technology     Open Access  
Solid State Electronics Letters     Open Access  
Industrial Technology Research Journal Phranakhon Rajabhat University     Open Access  
Journal of Engineered Fibers and Fabrics     Open Access  
Jurnal Teknologi Elektro     Open Access  
IET Nanodielectrics     Open Access  
Elkha : Jurnal Teknik Elektro     Open Access  
JAREE (Journal on Advanced Research in Electrical Engineering)     Open Access  
Jurnal Teknik Elektro     Open Access  
IACR Transactions on Symmetric Cryptology     Open Access  
Acta Electronica Malaysia     Open Access  
Bioelectronics in Medicine     Hybrid Journal  
Chinese Journal of Electronics     Open Access  
Problemy Peredachi Informatsii     Full-text available via subscription  
Technical Report Electronics and Computer Engineering     Open Access  
Jurnal Rekayasa Elektrika     Open Access  
Facta Universitatis, Series : Electronics and Energetics     Open Access  
Visión Electrónica : algo más que un estado sólido     Open Access  
Telematique     Open Access  
International Journal of Nanoscience     Hybrid Journal  
International Journal of High Speed Electronics and Systems     Hybrid Journal  
Semiconductors and Semimetals     Full-text available via subscription  

        1 2 | Last   [Sort alphabetically]   [Restore default list]

Similar Journals
Journal Cover
Annals of Telecommunications
Journal Prestige (SJR): 0.223
Citation Impact (citeScore): 1
Number of Followers: 6  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 1958-9395 - ISSN (Online) 0003-4347
Published by Springer-Verlag Homepage  [2467 journals]
  • A performance evaluation of C4M consensus algorithm

    • Free pre-print version: Loading...

      Abstract: Abstract Blockchain designed for Mobile Ad hoc Networks (MANETs) and mesh networks is an emerging research topic that has to cope with the network partition problem. However, existing consensus algorithms used in blockchain have been designed to work in a fully connected network with reliable communication. As this assumption does not hold anymore in mobile wireless networks, we describe in this paper the problem of network partitions and their impact on blockchain. Then, we propose a new consensus algorithm called Consensus for Mesh (C4M) which is inspired by RAFT as a solution to this problem. The C4M consensus algorithm is integrated with Blockgraph, a blockchain solution for MANET and mesh networks. We implemented our solution in NS-3 to analyze its performances through simulations. The simulation results gave the first characterization of our algorithm, its performance, and its limits, especially in case of topology changes.
      PubDate: 2022-11-03
       
  • Explainable artificial intelligence for cybersecurity: a literature survey

    • Free pre-print version: Loading...

      Abstract: Abstract With the extensive application of deep learning (DL) algorithms in recent years, e.g., for detecting Android malware or vulnerable source code, artificial intelligence (AI) and machine learning (ML) are increasingly becoming essential in the development of cybersecurity solutions. However, sharing the same fundamental limitation with other DL application domains, such as computer vision (CV) and natural language processing (NLP), AI-based cybersecurity solutions are incapable of justifying the results (ranging from detection and prediction to reasoning and decision-making) and making them understandable to humans. Consequently, explainable AI (XAI) has emerged as a paramount topic addressing the related challenges of making AI models explainable or interpretable to human users. It is particularly relevant in cybersecurity domain, in that XAI may allow security operators, who are overwhelmed with tens of thousands of security alerts per day (most of which are false positives), to better assess the potential threats and reduce alert fatigue. We conduct an extensive literature review on the intersection between XAI and cybersecurity. Particularly, we investigate the existing literature from two perspectives: the applications of XAI to cybersecurity (e.g., intrusion detection, malware classification), and the security of XAI (e.g., attacks on XAI pipelines, potential countermeasures). We characterize the security of XAI with several security properties that have been discussed in the literature. We also formulate open questions that are either unanswered or insufficiently addressed in the literature, and discuss future directions of research.
      PubDate: 2022-10-26
       
  • Mitigation of a poisoning attack in federated learning by using historical
           distance detection

    • Free pre-print version: Loading...

      Abstract: Abstract Federated learning provides a way to achieve joint model training while keeping the data of every party stored locally, and it protects the data privacy of all participants in cooperative training. However, there are availability and integrity threats in federated learning, as malicious parties may pretend to be benign ones to interfere with the global model. In this paper, we consider a federated learning scenario with one center server and multiple clients, where malicious clients launch poisoning attacks. We explore the statistical relationship of Euclidean distance among models, including benign versus benign models and malicious versus benign models. Then, we design a defense method based on our findings and inspired by evolutionary clustering. The center server uses this defense scheme to screen possible malicious clients and mitigate their attacks. Our mitigation scheme refers to the detection results of both the current and previous rounds. Moreover, we improve our scheme to apply it to a privacy threat scenario. Finally, we demonstrate the effectiveness of our scheme through experiments in several different scenarios.
      PubDate: 2022-10-26
       
  • Multi-labeling with topic models for searching security information

    • Free pre-print version: Loading...

      Abstract: Abstract Security information such as threat information and vulnerability information are utilized to analyze cyberattacks. If specific keywords such as the name of malware related to the event to be analyzed are known in advance, it is possible to obtain information using typical search engines. However, when a security operator cannot recall appropriate keywords related to the event to be analyzed, or when a commonly recognized identifier does not exist, a general search engine cannot be expected to produce useful results. In this paper, we propose a method using topic models and outlier detection to generate multi-labels for search, with the goal of constructing a search engine that can present relevant security information even in such situations. In addition, this paper discusses the application of the proposed method to 2386 security reports issued from 2017 to 2019 to demonstrate that the labeling can be focused on specific topics.
      PubDate: 2022-10-26
       
  • PAPR reduction using constrained convex optimization for vector OFDM

    • Free pre-print version: Loading...

      Abstract: Abstract Vector OFDM (VOFDM) is a coding technique that can mitigate the effect of spectral nulls in the channel by converting the single–input–single–output (SISO) channel to a multiple-input-multiple-output (MIMO) channel. This technique acts as a bridge between the conventional orthogonal frequency division multiplexing (OFDM) and single carrier frequency domain multiple access (SC-FDMA). This paper proposes a method to reduce peak-to-average power ratio (PAPR) in vector OFDM systems using constrained convex optimization. The optimization is performed by formulating the PAPR reduction problem as a convex function and then imposing the power and signal-space constraints on it. This paper presents the methodology, complexity analysis, illustrative diagrams, and simulation results of the proposed method. The proposed method shows an improvement in PAPR reduction by 54.59%, whereas the popular probabilistic techniques like selective mapping (SLM) and partial transmit sequence (PTS) give a reduction of 44% and 41.29% respectively. This method also gives flexibility to dedicate the vector blocks with low diversity gain for PAPR reduction. As indicated by the complementary cumulative density function (CCDF) plots, the proposed method offers a 70% PAPR reduction when 5 low performing vector blocks are dedicated for PAPR reduction.
      PubDate: 2022-10-07
       
  • Editorial Expression of Concern: Motor imagery-based neuro-feedback system
           using neuronal excitation of the active synapses

    • Free pre-print version: Loading...

      PubDate: 2022-10-01
       
  • Traffic identification model based on generative adversarial deep
           convolutional network

    • Free pre-print version: Loading...

      Abstract: Abstract With the rapid development of network technology, the Internet has accelerated the generation of network traffic, which has made network security a top priority. In recent years, due to the limitations of deep packet inspection technology and port number-based network traffic identification technology, machine learning-based network traffic identification technology has gradually become the most concerned method in the field of traffic identification with its advantages. As the learning ability of deep learning in machine learning becomes more substantial and more able to adapt to highly complex tasks, deep learning has become more widely used in natural language processing, image identification, and computer vision. Therefore, more and more researchers are applying deep learning to network traffic identification and classification. To address the imbalance of current network traffic, we propose a traffic identification model based on generating adversarial deep convolutional networks (GADCN), which effectively fits and expands traffic images, maintains a balance between classes of the dataset, and enhances the dataset stability. We use the USTC-TFC2016 dataset as training and test samples, and experimental results show that the method based on GADCN has better performance than general deep learning models.
      PubDate: 2022-10-01
       
  • An improved user authentication and key agreement scheme for roaming
           service in ubiquitous network

    • Free pre-print version: Loading...

      Abstract: Abstract Up till now, numerous authentication and key agreement schemes have been proposed for ubiquitous networks. Recently, Arshad and Rasoolzadegan also proposed an authentication and key agreement scheme for ubiquitous network with user anonymity. However, we determined that Arshad and Rasoolzadegan’s scheme has the following flaws: (1) the login phase is inefficient, which may lead to server resource exhaustion attacks; (2) the password change phase is inefficient and not user-friendly; and (3) the revocation phase arisen when the mobile device is lost and the re-register phase is absent. Therefore, we propose an improved scheme that successfully removes all of the previous mentioned flaws existing in Arshad and Rasoolzadegan’s protocol by using the biometric based authentication. Formal analysis of the proposed scheme is conducted using the random oracle model, and heuristic analysis is also conducted to demonstrate that the proposed scheme fulfills all of the security requirements. In addition, the proposed scheme is validated by the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, computational and communication cost comparisons indicate that our improved scheme is more suitable for ubiquitous networks.
      PubDate: 2022-10-01
       
  • Block-wise Kaczmarz successive interference cancellation: a matrix
           algebraic approach

    • Free pre-print version: Loading...

      Abstract: Abstract In this work, a novel block-wise Kaczmarz successive interference cancellation (BKSIC) detector, that is, a generalization of the Kaczmarz SIC detector proposed recently, is presented. Two reduced complexity versions of this detector are also detailed. This new detector is then analyzed using a matrix algebraic approach and shown that it is in fact a matrix filtering of the received signal, which allows the derivation of a closed form expression for its BER performance. Its convergence behavior is studied and the conditions of its convergence are determined. Simulation results indicate that the proposed block-wise SIC detector not only reduces significantly the detection delay but also achieves better BER performance.
      PubDate: 2022-10-01
       
  • Oddlab: fault-tolerant aware load-balancing framework for data center
           networks

    • Free pre-print version: Loading...

      Abstract: Abstract Data center networks (DCNs) act as critical infrastructures for emerging technologies. In general, a DCN involves a multi-rooted tree with various shortest paths of equal length from end to end. The DCN fabric must be maintained and monitored to guarantee high availability and better QoS. Traditional traffic engineering (TE) methods frequently reroute large flows based on the shortest and least-congested paths to maintain high service availability. This procedure results in a weak link utilization with frequent packet reordering. Moreover, DCN link failures are typical problems. State-of-the-art approaches address such challenges by modifying the network components (switches or hosts) to discover and avoid broken connections. This study proposes Oddlab (Odds labels), a novel deployable TE method to guarantee the QoS of multi-rooted data center (DC) traffic in symmetric and asymmetric modes. Oddlab creatively builds a heuristic model for efficient flow scheduling and faulty link detection by exclusively using the gathered statistics from the DCN data plane, such as residual bandwidth and the number of installed elephant flows. Besides, the proposed method is implemented in an SDN-based DCN without altering the network components. Our findings indicate that Oddlab can minimize the flow completion time, maximize bisection bandwidth, improve network utilization, and recognize faulty links with sufficient accuracy to improve DC productivity.
      PubDate: 2022-10-01
       
  • Performance evaluation of an HTTP proxy implemented as a virtual network
           function

    • Free pre-print version: Loading...

      Abstract: Abstract Network functions virtualization (NFV) is an important approach in the telecommunications industry. One of the main features of NFV is the execution of network functions in software rather than using specific hardware. These functions can run on virtualization platforms, which can increase service elasticity and reduce infrastructure costs. However, virtualization imposes performance penalties, which can severely impact NFV services. In this work, we analyze this performance impact when the virtualized network function is an HTTP proxy. We then compare two virtualization solutions, i.e., KVM and Docker, under different configurations. Our results show that Docker containers yield performance close to that of native Linux for HTTP proxies since Docker does not employ a hypervisor. We show that KVM incurs a severe performance penalty, which a paravirtualization approach can reduce. We also evaluate how much load balancing in Docker can improve the performance of virtual proxies. We show that, for our scenario, two parallel proxies significantly improve performance. However, we observe a negative impact when increasing the number of proxies since they interfere with each other.
      PubDate: 2022-10-01
       
  • Full data rate space-time code selection

    • Free pre-print version: Loading...

      Abstract: Abstract This paper proposes a full-rate space-time code selection technique for multiple transmitter antenna diversity systems. The technique uses orthogonal space-time codes for transmitting with two antennas and a quasi-orthogonal space-time code when transmitting with four antennas. We selected the space-time code and the transmitter antennas by comparing the equivalent SISO channels with a set of predetermined threshold levels, found off-line as a function of the Doppler frequency. The performance of the proposed technique was evaluated using the error rate and the spectral efficiency, outperforming other existing techniques.
      PubDate: 2022-10-01
       
  • Maximizing the underwater wireless sensor networks’ lifespan using BTC
           and MNP5 compression techniques

    • Free pre-print version: Loading...

      Abstract: Abstract The sending/receiving of data is the biggest energy user in the underwater wireless sensor networks (UWSNs). The energy supplied by the battery is the most critical resource in the sensor node affecting UWSN’s lifetime. At sensor nodes, energy is used in several forms, such as data reception and transmission, sensing, and processing. In all these, the transmission of data is very expensive in terms of power depletion, whereas data processing demand is known to be much smaller. Therefore, to save energy and boost the lifespan of UWSN, it is crucial to reduce data sending/receiving. In this paper, a two-level data compression method is proposed to work at two levels of the network that are sensor nodes and the gateway. At the sensor nodes level, we introduced a compression-based block truncation coding (CBBTC) strategy to minimize the amount of transferred data, reduce the energy used, and thereby prolong the network lifetime while attempting to keep the accuracy of the data reaching the base station at the best possible level. At the gateway (i.e., cluster head (CH)) level, a lossless compression algorithm called MNP5 is proposed to compress the obtained data sets. The MNP5 method is a double-staged procedure that consists of run-length (RLE) and adaptive frequency encodings. Using extensive simulation experiments, the assessment of proposed approaches is performed. Compared to prefix frequency filtering (PFF) and Harb protocols, the results of the simulation prove effectiveness, i.e., overhead reduction of up to 98% in residual data and 98% in energy consumption while preserving the accuracy of sent data above 90%.
      PubDate: 2022-10-01
       
  • A study on robustness of malware detection model

    • Free pre-print version: Loading...

      Abstract: Abstract In recent years, machine learning–based techniques are used to prevent cyberattacks caused by malware, and special attention is paid to the risks posed by such systems. However, there are relatively few studies on adversarial attacks on machine learning–based malware detection model using portable execution (PE) surface information and even less study from a defender’s perspective. In this study, we focus on malware detection field and treat the aforementioned issue from the perspectives of both attackers and defenders; subsequently, we propose a novel black-box adversarial attack method, named Image_Resource attack, and a robust malware detection model, respectively, using dimensionality reduction and machine learning techniques. The robustness of the proposed model is evaluated using PE surface information obtained from the FFRI Dataset 2018. During robustness evaluation, distances (e.g., the Euclidean distance) between the malware and benign files are measured, and the effectiveness of Image_Resource attack is estimated. Thus, we establish the effectiveness and superiority of the proposed model in terms of detection accuracy and robustness.
      PubDate: 2022-10-01
       
  • MIMO-OFDM LTE system based on a parallel IFFT/FFT on NoC-based FPGA

    • Free pre-print version: Loading...

      Abstract: Abstract The growing demand for wireless devices capable of performing complex communication processes has imposed an urgent need for high-speed communication systems and advanced network processors. This paper proposes a hardware workflow developed for the Long-Term Evolution (LTE) communication system. It studies the multiple-input, multiple-output orthogonal frequency-division multiplexing (MIMO-OFDM) LTE system. Specifically, this work focuses on the implementation of the OFDM block that dominates the execution time in high-speed communication systems. To achieve this goal, we have proposed an NoC-based low-latency OFDM LTE multicore system that leverages Inverse Fast Fourier Transform (IFFT) parallel computation on a variable number of processing cores. The proposed multicore system is implemented on an FPGA platform using the ProNoC tool, an automated rapid prototyping platform. Our obtained results show that LTE OFDM execution time is drastically reduced by increasing the number of processing cores. Nevertheless, the NoC’s parameters, such as routing algorithm and topology, have a negligible influence on the overall execution time. The implementation results show up to 24% and 76% execution time reduction for a system having 2 and 16 processing cores compared to conventional LTE OFDM implemented in a single-core, respectively. We have found that a 4×4 Mesh NoC with XY deterministic routing connected to 16 processing tiles computing IFFT task is the most efficient configuration for computing LTE OFDM. This configuration is 4.12 times faster than a conventional system running on a single-core processor.
      PubDate: 2022-10-01
       
  • Vertical group handover congestion game for a vehicular platoon in VLC
           networks

    • Free pre-print version: Loading...

      Abstract: Abstract Vehicle platooning systems improve road active safety while reducing vehicular congestion. Visible light communications (VLC) is an efficient technology that enables safety messages exchange between platoon members, and thus improves road safety. Nevertheless, packet transmission could be perturbed by neighboring vehicles, impacting the quality of service and inducing packet loss. Therefore, it is of paramount importance to tackle the provisioning of a vertical handover, of a group of competing platoon vehicles, to a radio frequency (RF) technology. This paper models the network selection procedure by means of a congestion game with an unknown number of players. More precisely, the game considers players that aim at choosing resources among a certain number of resources. Moreover, the game considers the lack of information about the users’ preferences. The main objective is to distribute platoon vehicles among available RF technologies, while maximizing the throughput of each user and avoiding network congestion. The game is solved with the safety-level equilibrium. Performance analysis shows that our solution offers high throughput, low delay, and packet loss ratio for each platoon vehicle while achieving load balancing among available networks.
      PubDate: 2022-10-01
       
  • A biobjective availability optimization problem with nonlinear constraints

    • Free pre-print version: Loading...

      Abstract: Abstract In this paper, we revisit a biobjective optimization problem arising in software-defined networking with availability guarantees. The problem jointly optimizes the number of controllers and their locations, as well as optimizes a set of links that can be upgraded to achieve intercontroller availability targets. This problem is known to be NP-complete, includes generalized nonlinear flow constraints and includes nonlinear and nonconvex path pair availability constraints. In this paper, we propose an iterative approach for solving the optimization problem. The approach consists in a linear approximation that is obtained through convex relaxation. The linear approximated problem is solved iteratively, and can be tailored to be as close to the original problem as possible at the expense of a greater computational effort. The results obtained using this approach are compared with previously obtained ones. We show how the iterative approach is able to significantly improve most of the tested instances (or find the same solution as previously obtained) within feasible computational effort.
      PubDate: 2022-09-30
       
  • Cloud assisted semi-static secure accountable authority identity-based
           

    • Free pre-print version: Loading...

      Abstract: Abstract Cloud computing has gained widespread popularity in the industry and academia and rapidly becomes an integral part of our everyday life. It offers several benefits including reduced cost on technical support for data backups, saving electric power and maintenance cost. These encourage the major industry players like Google, IBM, Microsoft to invest into cloud storage with the goal to extend the spectrum of cloud-based services from open public to closed private. One of the crucial challenges in cloud computing is the security of outsourced data. Sharing sensitive data among multiple users under the same domain in a secure and efficient way requires technical solutions. Identity-based broadcast encryption (IBBE) is an important building block in cryptography. This is a one to many encryption that broadcasts a message to many identities. In this paper, we address the key escrow problem of IBBE. As private key generator (PKG) generates secret keys for users, it has the capability to decrypt the ciphertext and recover the message. The accountable authority IBBE was introduced to give accountability in IBBE, where white-box A-IBBE can differentiate the creator of a given pirated private key between the PKG and suspected user and black-box A-IBBE can further trace the creator of a decoder box. In our construction, we have established the secret key by using zero-knowledge proof between the user and PKG. The decryption key is held by the user only. This restricts PKG to re-distribute keys maliciously and solves the key escrow problem. Inspired by the work of Zhao et al., we develop an accountable authority identity-based broadcast encryption scheme (A-IBBE). Our construction is the first publicly traceable weak black-box A-IBBE scheme secure against the indistinguishability under chosen-identity and chosen-plaintext attack in the standard model. We support the conjectured security of our candidate by analysis and prove its security without using any random oracle under the hardness of the decision bilinear Diffie-Hellman exponent (DB-DHE) sum problem. Another interesting feature of our scheme is that it features a constant size secret key and ciphertext. More positively, when contrasted with the existing similar schemes, our scheme exhibits favorable results in terms of secret key size and ciphertext length with constant number of pairing computations.
      PubDate: 2022-09-20
       
  • Sliding window symbol-pair constrained codes for energy harvesting

    • Free pre-print version: Loading...

      Abstract: Abstract The binary symbol-pair constrained codes that can enable simultaneous transfer of information and energy is the topic of interest in this paper. The construction and properties of such binary symbol-pair code using the sliding window constraint are discussed in this paper. The sliding window constraint ensures the presence of at least t weighted symbols within any prescribed window of l consecutive symbol-pairs. The information capacity of (l,t)-constrained sequences has been obtained and analyzed. This paper provides the block code construction of (l,t) symbol-pair constrained codes of length n without using a n-step finite-state machine. The information capacity obtained in this paper is better than the information capacity of (l,t)-constrained codes in Schouhamer Immink and Kui (IEEE Commun Lett 24(9):1890–1893, 2020) [16].
      PubDate: 2022-09-10
      DOI: 10.1007/s12243-022-00923-w
       
  • Joint energy efficiency and load balancing optimization in hybrid IP/SDN
           networks

    • Free pre-print version: Loading...

      Abstract: Abstract Software-defined networking (SDN) is a paradigm that provides flexibility and programmability to computer networks. By introducing SDN nodes in a legacy IP network topology, network operators can benefit on higher control over the infrastructure. However, this migration is not a fast or straightforward process. Furthermore, to provide an adequate quality of service in hybrid IP/SDN networks, the coordination of both IP and SDN paradigm is fundamental. In this paper, this coordination is used to solve two optimization problems that are typically solved separately: (i) traffic load balancing and (ii) power consumption minimization. Each of these problems has opposing objectives, and thus, their joint consideration implies striking a balance between them. Therefore, this paper proposes the Hybrid Spreading Load Algorithm (HSLA) heuristic that jointly faces the problems of balancing traffic by minimizing link utilization and network’s power consumption in a hybrid IP/SDN network. HSLA is evaluated over differently sized topologies using different methods to select which nodes are migrated from IP to SDN. These evaluations reveal that alternative approaches that only address one of the objectives are outperformed by HSLA.
      PubDate: 2022-09-08
      DOI: 10.1007/s12243-022-00921-y
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.238.72.180
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-