International Journal of Interdisciplinary Telecommunications and Networking
Latest Publications


TOTAL DOCUMENTS

275
(FIVE YEARS 70)

H-INDEX

7
(FIVE YEARS 2)

Published By Igi Global

1941-8671, 1941-8663

Author(s):  
Ahmed Y. Awad ◽  
Seshadri Mohan

This article applies machine learning to detect whether a driver is drowsy and alert the driver. The drowsiness of a driver can lead to accidents resulting in severe physical injuries, including deaths, and significant economic losses. Driver fatigue resulting from sleep deprivation causes major accidents on today's roads. In 2010, nearly 24 million vehicles were involved in traffic accidents in the U.S., which resulted in more than 33,000 deaths and over 3.9 million injuries, according to the U.S. NHTSA. A significant percentage of traffic accidents can be attributed to drowsy driving. It is therefore imperative that an efficient technique is designed and implemented to detect drowsiness as soon as the driver feels drowsy and to alert and wake up the driver and thereby preventing accidents. The authors apply machine learning to detect eye closures along with yawning of a driver to optimize the system. This paper also implements DSRC to connect vehicles and create an ad hoc vehicular network on the road. When the system detects that a driver is drowsy, drivers of other nearby vehicles are alerted.


Author(s):  
Larry J. LeBlanc ◽  
Thomas A. Grossman

Vehicle routing (such as for package delivery) presents challenges for operations planning and operations control. Planning ensures that vehicles are assigned to “good” routes, and control enables routes to be changed in real time in response to changes in destination requirements. Both planning and control can be accomplished using web-based, intelligent geographic information system tools to rapidly generate a heuristic solution using an embedded algorithm, rather than the established approach of using explicit customized optimization models. The authors contrast the established approach of using customized integer optimization models to a heuristic that integrates human judgment with Google Maps travel time data to solve vehicle routing problems. This paper discusses the data requirements, simplifying assumptions, and practical performance of both approaches. The advantage of the heuristic approach is that genuine, useful access to much of the power of highly sophisticated OR network models can be provided to large numbers of analytically unsophisticated managers, along with enhanced operational control.


Author(s):  
Bradley Comar

This paper describes a method of combining cryptographic encoding and low density parity check (LDPC) encoding for the purpose of enhancing privacy. This method uses pseudorandom number generators (PRNGs) to create parity check matrices that are constantly updated. The generated cyphertext is at least as private as a standard additive (XORing) cryptosystem, and also has error correcting capability. The eavesdropper, Eve, has the expanded burden of having to perform cryptanalysis and error correction simultaneously.


Author(s):  
Edward J. Glantz ◽  
Mahdi Nasereddin ◽  
David J. Fusco ◽  
Devin Kachmar

There is a gap between available cyber professionals with necessary skills and experience to meet industry requirements. Institutions of higher education (IHE)—as well as other programs—have begun increasing course and degree offerings to help educate, train, and even retrain working professionals to close this gap. Of growing importance are tools and techniques to supplement theoretical development with accelerated experiential cyber training. Fortunately, there has been an increase in providers offering these services, although they vary substantially in features, costs, and opportunities. The purpose of this research is to identify a current spectrum of vendors and opportunities providing hands-on cyber training. The authors of this paper include cyber faculty at a university offering undergraduate and master's cybersecurity degrees. Both degrees are offered to resident as well as online students.


Author(s):  
Xiaojie Liu ◽  
Ulrich Speidel

Ad hoc wireless networks depend on mutual collaboration among nodes. Congestion in ad hoc wireless networks thus presents more of a challenge than for other network types. This article proposes RAODV (relieving AODV), a modification of the AODV routing protocol, to handle congestion via third party neighbour nodes in dense and static ad hoc networks. RAODV nodes use a T-entropy threshold-based congestion detection algorithm to determine the congestion status of their neighbours. If RAODV determines that congestion is occurring, it then tries to relieve congestion via a local repair modification algorithm that replaces the congested node by a suitable monitoring/third party neighbour node. This article also shows evidence that RAODV results in better network performance than AODV in simulations with random network topologies.


Author(s):  
Evariste Some ◽  
Bryan Boots ◽  
Gregory Gondwe

The internet of things (IoT) is the notion of all devices and products being connected to the internet rather than only computers and mobile devices, as has been the case until the recent past. The IoT is already booming, and its adoption will only accelerate in coming years. At the same time, the world continues to go wireless. Wired internet and telephone connections are becoming rarer with each passing year, and consumers expect and demand wireless communications more and more. One critical enabling technology for the IoT is wireless communications: IP-cameras, printers, kitchen appliances, and more deliver greater flexibility in their design when they do not need a wired connection to access the internet. In this paper, a flexible spectrum management framework to enable greater innovation, investment, and flexibility in IoT products, as well as the necessary architecture that will enable a wider deployment of IoT is proposed. An illustration and analogy from the success of the unlicensed bands used for Wi-Fi technology, and the accompanying supporting organizations that enable Wi-Fi's success are drawn.


Author(s):  
Tahreer Mahmood ◽  
Seshadri Mohan

Amplitude clipping is one of the techniques used to reduce PAPR. This technique does not demand side information; therefore, there is no reduction in the system's data throughput. However, it leads to additional distortion (in-band signal distortion and out-of-band radiation). To overcome this problem, low complexity non-distortion clipping technique is proposed for MIMO-OFDM system. The main concept of this proposed method is how to convert the generated distortion (in-band and out-of-band signals distortion) when using clipping at transmitter to impulse noise (error), which is possible by using a simple coding technique to cover error at the receiver. The proposed method does not clip the signal in time domain. The clipping use for discrete samples directly after IFFT. Simulation outcome detects that the proposed non-distortion clipping technique provides an efficient reduction in PAPR, best performance compared with conventional clipping technique, and less cost and complexity.


Author(s):  
Evariste Some ◽  
Ibrahim Ayad ◽  
Bryan Boots

The internet of things (IoT) is the notion of all devices and products being connected to the internet rather than only computers and mobile devices as has been the case until the recent past. The IoT is already booming, and its adoption will only accelerate in coming years. At the same time, the world continues to go wireless. Wired internet and telephone connections are becoming rarer with each passing year, and consumers expect and demand wireless communications. One critical enabling technology for the IoT is wireless communications: IP-cameras, printers, kitchen appliances, and more deliver greater flexibility in their design when they do not need a wired connection to access the internet. In this paper, a flexible spectrum management framework to enable greater innovation, investment, and flexibility in IoT products, as well as the necessary architecture that will enable a wider deployment of IoT, is proposed. An illustration and analogy from the success of the unlicensed bands used for wi-fi technology and the accompanying supporting organizations that enable wi-fi's success are drawn.


Author(s):  
Siddharth Goutam ◽  
Srija Unnikrishnan

The increasing use of mobile communication and computing has made accurate and efficient methods of executing vertical handoff a necessity. This research paper captures the design and implementation of an effectual algorithm for making decision for vertical handoff based on fuzzy logic. The input parameters considered are bandwidth, battery status, and cost. The authors present analysis of the handover value, which gives the handoff decision, in relation to the input attributes, using regression analysis, correlation analysis, and ANOVA.


Author(s):  
Ali Subhi Alsadi ◽  
Seshadri Mohan

The physical layer security in the context of the internet of things is still one of the challenges due to the resource constraints of the end terminals and the IoT network heterogeneity. Although it has been adopted by different wireless applications due to its high spectral efficiency, the OFDM physical layer remains a challenge. The frequency hopping technique is used to protect the nodes from jamming and eavesdropping attacks. The cyclic prefix manipulation has been simulated against different time-delayed paths and the simulated results compared to the theoretical ones. The comparison shows a close match and the guard width encryption mechanism worked as desired.


Sign in / Sign up

Export Citation Format

Share Document