Journal of Computer and Communications

Journal Information
ISSN / EISSN : 23275219 / 23275227
Current Publisher: Scientific Research Publishing, Inc, (10.4236)
Total articles ≅ 812
Archived in
SHERPA/ROMEO
Filter:

Latest articles in this journal

Kasaye Asres, Amin Tuni Gure, Durga Prasad Sharma
Journal of Computer and Communications, Volume 8, pp 1-15; doi:10.4236/jcc.2020.81001

Abstract:The worldwide change and transformations are taking place in socio-techno cultures. In the epicenter of all these Information and Communication Technologies (ICTs), the Internet is the backbone and paving salient communications and computations Medias like the emergence of social networking sites (SNSs). These SNSs are facilitating globalized entertainment, socialization, communications, and information sharing over hand-held electronic gazettes/mobiles like Facebook, Twitter, Instagram, Skype, and WhatsApp etc. The positive side of these SNSs is making the world a social village but apart from these positive aspects, there is another trait of multifold adversities/disruptions or negative effects which still have not been exposed and drawn attention. The remedial action for such adversities is needed to be designed and developed. The all age groups and genders are typically involved and resulting in wastage of time, money and peace of minds. The adverse effects of social media users in a Higher Learning Institutions are getting worse day-by-day. The prime aim of this research study is to design an automatic Surveillance System Framework for alleviation of the social media disruptions in these institutions. This framework aims to design and develop a surveillance system and access control guidelines for judiciously alleviating the misuse of social media. The study used MS form, Protopie, adobe XD and InVision for data collection, framework design and prototype development respectively. This research is an attempt to apply an explanatory and applied research design science approach using survey, interviews and technical observations-based primary data analytics. The study concluded with a cloud-based automatic surveillance, auto alerts and control system framework (DPS-KA-AT) and functionally validated by a system framework prototype. In the survey and interview, the 66% respondents’ response was “YES”, while 34% “NO” when enquired for the need assessment of the automatic surveillance and control system towards alleviation of the social media adversities or disruptions. This percentage indicates that the highest number of respondent or the highest number of higher learning institutions communities need an urgent automatic monitoring, surveillance and control system towards alleviation of such adversities/disruptions. The study concluded with a remark “a concrete and Automatic Surveillance and Control System Framework can be a great instrumental for minimizing the adversities of social media in higher learning institutions”.
Bedelkhanuly Azat, Tang Hong
Journal of Computer and Communications, Volume 8, pp 28-44; doi:10.4236/jcc.2020.81003

Abstract:Now in modern telecommunication, one of the big topic research is a Vehicle Ad-hoc Network “VANET” (V2V). This topic is one of an “issues of the day” because research has problematic topic due to its many application-questions, what we need to solve: avoid collisions, any accidents on a way, and notifications about congestions on the road, available car parking, road-side commercial-business ads, and etcetera. These like application forms creating big delay constraining’s i.e. the instant data should reach the destination within certain time limits. Therefore, we need a really efficient stable clustering method and routing in vehicle ad-hoc network which will be resistant to network delays and meets network requirements. The methods are proposed in the paper for optimization VANETs data traffic as well as to minimizing delay. First, here is presented, a stable clustering algorithm based on the destination, contextually take into consideration various physical parameters for cluster formation such as location of the vehicle and its direction, vehicle speed and destination, as well as a possible list of interests of the vehicle. And also the next main process is to depend on these “five parameters” we can calculate the “Cluster Head Eligibility” of each car. Second, based on this “Cluster Head Eligibility”, described cluster head selection method. Third, for efficient communication between clusters, present a routing protocol based on the “destination”, which considered an efficient selecting method of next forwarding nodes, which is calculated by using “FE” metric.
Minsu Park, Mwawi Kayuni, Tiwonge Manda, Hyunsung Kim
Journal of Computer and Communications, Volume 8, pp 45-70; doi:10.4236/jcc.2020.81004

Abstract:The Internet of things (IoT) can be used in our daily life. Home area network (HAN) is one of the applications of loT. However, deploying HAN for underdeveloped countries in Africa is not easy due to the lack of Internet connectivity and stable electricity. First of all, Internet in Africa is growing fast but the majority of countries in Africa have Internet penetration of less than 10%. Furthermore, the problem of accessing electricity varies greatly across African countries, which is still less than 30% of the average usage rate. The aim of this paper is to model a secure HAN based on IoT for resource constraints environment, which are focused on both network connectivity and energy stability. Poor connectivity, the prevalence of low-end devices and several other obstacles should be considered for the secure HAN deployment in developing and underdeveloped countries. The proposed HAN model will provide the resource constraints module composed of network connectivity function and energy stability function to support the two constraints based on the IoT basic module and the security and privacy module. The proposed HAN model could be securely applied to various countries HAN applications with poor electricity supply and network connectivity.
Xinlei Wang, Zhen Jia
Journal of Computer and Communications, Volume 8, pp 71-89; doi:10.4236/jcc.2020.81005

Abstract:Molecular communication is a novel nanoscale communication method. It can use ions, biochemical molecules or other information carriers to transmit information. However, due to molecules are easily accumulated in the channel to produce strong internal symbol interference, the information transmission in the channel is vulnerable to a low reliability. Therefore, reliability has become an important research issue in the field of molecular communication. At present, the existing reliability model of molecular communication does not take into account the drift velocity of the medium. Nevertheless, in some scenarios, it is often necessary to consider the effect of the drift velocity of the medium on the reliability of molecular communication. In this paper, we introduce the drift velocity of the medium and propose a reliability model of molecular communication based on drift diffusion (MCD2) in different topologies. Furthermore, in the case of transmission failure, a retransmission mechanism is used to ensure reliable transmission of information. Finally, we also compare the reliability performance of molecular communication between reliability model of MCD2 and reliability model of molecular communication based on free diffusion. The simulation results indicate that the proposed reliability model is superior to the existing reliability model of molecular communication based on free diffusion in analyzing the reliability of MCD2.
Lianjun Zhang, Lifang Zhao, Gang Liu
Journal of Computer and Communications, Volume 8, pp 16-27; doi:10.4236/jcc.2020.81002

Abstract:A spatiotemporal atlas refers to a standard image sequence that represents the general motion pattern of the targeted anatomy across a group of subjects. Recent years have witnessed an increasing interest in using spatiotemporal atlas for scientific research and clinical applications in image processing, data analysis and medical imaging. However, the generation of spatiotemporal atlas is often time-consuming and computationally expensive due to the nonlinear image registration procedures involved. This research targets at accelerating the generation of spatiotemporal atlas by formulating the atlas generation procedure as a multi-level modulation (M-ary) classification problem. In particular, we have implemented a fast template matching method based on singular value decomposition, and applied it to generate high quality spatiotemporal atlas with reasonable time and computational complexity. The performance has been systematically evaluated on public accessible data sets. The results and conclusions hold promise for further developing advanced algorithms for accelerating generation of spatiotemporal atlas.
Murat Hasan Ali Altun, Serdar Kum
Journal of Computer and Communications, Volume 7, pp 18-33; doi:10.4236/jcc.2019.71003

Abstract:A significant amount of world trade has been carried out by maritime transportation. In 2016, world maritime trade volume increased by 2% and reached 10.3 billion tons, 55,057 global ton-miles. There has been a significant increase in quantity and tonnage of tankers, with the requirement for well qualified and experienced personnel in the maritime industry. Therefore, employment has become a serious problem. Major Oil Companies (MOCs), port states, classification societies, and flag states have increased the number of inspections on tankers due to safety concerns. Tanker inspections are becoming more difficult and inefficient due to intensive cargo operations. Inefficient, subjective or substandard inspections/evaluations are usually leading to incorrect decisions, and causing an unfair market. In addition, corrective actions cannot be carried out properly, and decision making authorities cannot give the best decisions about vessels and their operator companies due to lack of scientific methods. In this study, details are identified such as finding the root causes, identifying the risks, understanding the possible consequences, and determining the working areas during the ship crews’, operators’, auditors’ and charterers’ working and ship selection periods. Pairwise comparisons were carried out by means of surveys on ship masters (captains), chief officers, deck officers, and superintendents. Five criteria―Crew, Equipment, Company, Structure, and ISM (International Safety Management) were weighted using Analytical Hierarchy Process (AHP). Finally, Bridge Safety Support System (BSSS) was developed according to criteria weights. In this way, best choices can be offered to ship charterers about which ship is better for a company’s interests. And, carrying out bridge inspections and corrective actions will be more reliable and effective for maritime transportation. Statistical data and vessel improvements will be obtained in BSSS. As a result, fair market conditions will be available in maritime industry with the help of this study.
Mehdi Tarhani, Sanjib Sarkar, Morad Khosravi Eghbal, Mehdi Shadaram
Journal of Computer and Communications, Volume 7, pp 14-20; doi:10.4236/jcc.2019.710002

Abstract:Routing, modulation and spectrum allocation in elastic optical networks is a problem aiming at increasing the capacity of the network. Many algorithms such as shortest path algorithm can be used as the routing section of this problem. The efficiency of these algorithms is partly based on how the cost of each link is defined. In this study, we considered several basic metrics in cost of network links and compared their effects on the network capacity. In particular, the static costs and the dynamic costs were evaluated and compared. For dynamic scenarios, compared to static scenarios, at least one additional factor, the usage of the links, was added. We further considered a new factor that is based on probability of accommodating the signal at a given time in any given link. The results show that, among them, the shortest path algorithm provides the least blocking probability when the cost is a combination of link length and the abovementioned possibility/usage of the link.
Hala Sabbah, Hussein Trabulsi, Rida Chbib, Ibtissam Sabbah
Journal of Computer and Communications, Volume 7, pp 21-35; doi:10.4236/jcc.2019.710003

Abstract:In the last few years, cloud computing (CC) has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Many businesses including small, medium (SMEs) and large enterprises are migrating to this technology. The objective of this paper was to describe the opinions of enterprises about the benefits and challenges of cloud computing services in the private and public companies in South Lebanon. During 2019, a cross-sectional study which enrolled 29 enterprises used CC was conducted. The survey included questions on socio-demographic characteristics of representative of companies, and companies’ factors in reference to the technology, organization, and environment (TOE) framework. Most (58.6%) of companies were private and micro and SMEs sized (86.8%). The cost saving (75.0%), scalability and flexibility (75.9%), security (44.8%), and improved service delivery were the main benefits that cloud offer to the business. The security aspect, the cost, and the limited provision of infra-structure remain a challenge for the adoption of CC. In conclusion, the research reveals the potential for the development of CC and obstacles for successful implementation of this new technology.
Xueling Chu, Haiming Li
Journal of Computer and Communications, Volume 7, pp 1-13; doi:10.4236/jcc.2019.710001

Abstract:Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and foreign scholars in the blind forensic technology of JPEG image tampering were briefly described. Then, according to the different methods of tampering and detection, the current detection was divided into two types: double JPEG compression detection and block effect inconsistency detection. This paper summarized the existing methods of JPEG image blind forensics detection, and analyzed the two methods. Finally, the existing problems and future research trends were analyzed and prospected to provide further theoretical support for the research of JPEG image blind forensics technology.
Mingtong Sun, Jie Wang, Dongming Wang, Lijun Zhai
Journal of Computer and Communications, Volume 7, pp 116-126; doi:10.4236/jcc.2019.710011

Abstract:In this paper, we propose the novel iterative detection which operates iteratively on blocks of the received signal in downlink in massive MIMO (Massive Multiple-input Multiple-output) system. This article will combine the equivalent channel with soft detection and soft decoder, and finally propose a new structure for the iterative detection in downlink based on 5G simulation test platform of NCRL and analysis the performance of the novel structure. The simulation result shows iterative algorithm performs better than conventional detection with lower amount of iterations.