Channel clustering and QoS level identification scheme for multi-channel cognitive radio networks
- Authors: Ali, Amjad , Yaqoob, Ibrar , Ahmed, Adnan , Imran, Muhammad , Kwak, Kyung
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Communications Magazine Vol. 56, no. 4 (2018), p. 164-171
- Full Text:
- Reviewed:
- Description: The increasing popularity of wireless services and devices necessitates high bandwidth requirements; however, spectrum resources are not only limited but also heavily underutilized. Multiple license channels that support the same levels of QoS are desirable to resolve the problems posed by the scarcity and inefficient use of spectrum resources in multi-channel cognitive radio networks (MCRNs). One reason is that multimedia services and applications have distinct, stringent QoS requirements. However, due to a lack of coordination between primary and secondary users, identifying the QoS levels supported over available licensed channels has proven to be problematic and has yet to be attempted. This article presents a novel Bayesian non-parametric channel clustering scheme, which identifies the QoS levels supported over available license channels. The proposed scheme employs the infinite Gaussian mixture model and collapsed Gibbs sampler to identify the QoS levels from the feature space of the bit rate, packet delivery ratio, and packet delay variation of licensed channels. Moreover, the real measurements of wireless data traces and comparisons with baseline clustering schemes are used to evaluate the performance of the proposed scheme. © 1979-2012 IEEE. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran” is provided in this record**
Chaos-based robust method of zero-watermarking for medical signals
- Authors: Ali, Zulfiqar , Imran, Muhammad , Alsulaiman, Mansour , Shoaib, Muhammad , Ullah, Sana
- Date: 2018
- Type: Text , Journal article
- Relation: Future Generation Computer Systems Vol. 88, no. (2018), p. 400-412
- Full Text:
- Reviewed:
- Description: The growing use of wireless health data transmission via Internet of Things is significantly beneficial to the healthcare industry for optimal usage of health-related facilities. However, at the same time, the use raises concern of privacy protection. Health-related data are private and should be suitably protected. Several pathologies, such as vocal fold disorders, indicate high risks of prevalence in individuals with voice-related occupations, such as teachers, singers, and lawyers. Approximately, one-third of the world population suffers from the voice-related problems during the life span and unauthorized access to their data can create unavoidable circumstances in their personal and professional lives. In this study, a zero-watermarking method is proposed and implemented to protect the identity of patients who suffer from vocal fold disorders. In the proposed method, an image for a patient's identity is generated and inserted into secret keys instead of a host medical signal. Consequently, imperceptibility is naturally achieved. The locations for the insertion of the watermark are determined by a computation of local binary patterns from the time–frequency spectrum. The spectrum is calculated for low frequencies such that it may not be affected by noise attacks. The experimental results suggest that the proposed method has good performance and robustness against noise, and it is reliable in the recovery of an individual's identity. © 2018 Elsevier B.V.
Cloud-based smart manufacturing for personalized candy packing application
- Authors: Wang, Shiyong , Wan, Jiafu , Imran, Muhammad , Li, Di , Zhang, Chunhua
- Date: 2018
- Type: Text , Journal article
- Relation: Journal of Supercomputing Vol. 74, no. 9 (2018), p. 4339-4357
- Full Text: false
- Reviewed:
- Description: Industry 4.0 has been proposed to address personalized consumption demands by building cyber-physical production systems for smart manufacturing. Although cloud manufacturing and some integrated frameworks for smart factory have been presented in literatures, it still lacks industrial applications. In this paper, we use personalized candy packing application as a demonstration to illustrate our smart factory design. We first describe the component layers of the smart factory, i.e., physical devices, private cloud, client terminals, and network, to enable the smart factory to be integrated with other systems, such as banks and logistical network, to cope with personalized consumption demands. Then, we present a scheme for inter-layered interaction. As for the physical devices, we also design an intra-layered negotiation mechanism to implement dynamic reconfiguration, so that the system can support hybrid production of multi-typed products. Finally, we give experimental results to verify efficiency, self-organized process, and hybrid production paradigm of the proposed system. © 2016, Springer Science+Business Media New York.
Co-EEORS : cooperative energy efficient optimal relay selection protocol for underwater wireless sensor networks
- Authors: Khan, Anwar , Ali, Ihsan , Rahman, Atiq , Imran, Muhammad , Amin, Fazal , Mahmood, Hasan
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 28777-28789
- Full Text:
- Reviewed:
- Description: Cooperative routing mitigates the adverse channel effects in the harsh underwater environment and ensures reliable delivery of packets from the bottom to the surface of water. Cooperative routing is analogous to sparse recovery in that faded copies of data packets are processed by the destination node to extract the desired information. However, it usually requires information about the two or three position coordinates of the nodes. It also requires the synchronization of the source, relay, and destination nodes. These features make the cooperative routing a challenging task as sensor nodes move with water currents. Moreover, the data packets are simply discarded if the acceptable threshold is not met at the destination. This threatens the reliable delivery of data to the final destination. To cope with these challenges, this paper proposes a cooperative energy-efficient optimal relay selection protocol for underwater wireless sensor networks. Unlike the existing routing protocols involving cooperation, the proposed scheme combines location and depth of the sensor nodes to select the destination nodes. Combination of these two parameters does not involve knowing the position coordinates of the nodes and results in selection of the destination nodes closest to the water surface. As a result, data packets are less affected by the channel properties. In addition, a source node chooses a relay node and a destination node. Data packets are sent to the destination node by the relay node as soon as the relay node receives them. This eliminates the need for synchronization among the source, relay, and destination nodes. Moreover, the destination node acknowledges the source node about the successful reception or retransmission of the data packets. This overcomes the packets drop. Based on simulation results, the proposed scheme is superior in delivering packets to the final destination than some existing techniques. © 2013 IEEE.
Deep deterministic learning for pattern recognition of different cardiac diseases through the internet of medical things
- Authors: Iqbal, Uzair , Wah, Teh , Habib ur Rehman, Muhammad , Mujtaba, Ghulam , Imran, Muhammad , Shoaib, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: Journal of Medical Systems Vol. 42, no. 12 (2018), p.
- Full Text: false
- Reviewed:
- Description: Electrocardiography (ECG) sensors play a vital role in the Internet of Medical Things, and these sensors help in monitoring the electrical activity of the heart. ECG signal analysis can improve human life in many ways, from diagnosing diseases among cardiac patients to managing the lifestyles of diabetic patients. Abnormalities in heart activities lead to different cardiac diseases and arrhythmia. However, some cardiac diseases, such as myocardial infarction (MI) and atrial fibrillation (Af), require special attention due to their direct impact on human life. The classification of flattened T wave cases of MI in ECG signals and how much of these cases are similar to ST-T changes in MI remain an open issue for researchers. This article presents a novel contribution to classify MI and Af. To this end, we propose a new approach called deep deterministic learning (DDL), which works by combining predefined heart activities with fused datasets. In this research, we used two datasets. The first dataset, Massachusetts Institute of Technology–Beth Israel Hospital, is publicly available, and we exclusively obtained the second dataset from the University of Malaya Medical Center, Kuala Lumpur Malaysia. We first initiated predefined activities on each individual dataset to recognize patterns between the ST-T change and flattened T wave cases and then used the data fusion approach to merge both datasets in a manner that delivers the most accurate pattern recognition results. The proposed DDL approach is a systematic stage-wise methodology that relies on accurate detection of R peaks in ECG signals, time domain features of ECG signals, and fine tune-up of artificial neural networks. The empirical evaluation shows high accuracy (i.e., ≤99.97%) in pattern matching ST-T changes and flattened T waves using the proposed DDL approach. The proposed pattern recognition approach is a significant contribution to the diagnosis of special cases of MI. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.
Extending the technology acceptance model for use of e-learning systems by digital learners
- Authors: Hanif, Aamer , Jamal, Faheem , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 73395-73404
- Full Text:
- Reviewed:
- Description: Technology-based learning systems enable enhanced student learning in higher-education institutions. This paper evaluates the factors affecting behavioral intention of students toward using e-learning systems in universities to augment classroom learning. Based on the technology acceptance model, this paper proposes six external factors that influence the behavioral intention of students toward use of e-learning. A quantitative approach involving structural equation modeling is adopted, and research data collected from 437 undergraduate students enrolled in three academic programs is used for analysis. Results indicate that subjective norm, perception of external control, system accessibility, enjoyment, and result demonstrability have a significant positive influence on perceived usefulness and on perceived ease of use of the e-learning system. This paper also examines the relevance of some previously used external variables, e.g., self-efficacy, experience, and computer anxiety, for present-world students who have been brought up as digital learners and have higher levels of computer literacy and experience. © 2018 IEEE.
Fog-assisted congestion avoidance scheme for internet of vehicles
- Authors: Yaqoob, Shumayla , Ullah, Ata , Akbar, Muhammad , Imran, Muhammad , Guizani, Mohsen
- Date: 2018
- Type: Text , Conference paper
- Relation: 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018 p. 618-622
- Full Text: false
- Reviewed:
- Description: Recently, Internet of Vehicles (IoVs) is getting growing interest because of their suitability for a wide range of emerging applications. Most of these applications require vehicles to continuously update their information to a centralized location in order to gain various services. However, frequent transmission of messages by an abundance number of vehicles may not only overwhelm a centralized server but also causes a huge congestion which might disrupt various services including emergency situations. The aim of this research is to minimize congestion and messaging delay. This paper presents a fog-assisted congestion avoidance scheme for IoV named Energy Efficient Message Dissemination (E2MD). To capitalize the merits of fog computing and minimize latency, E2MD opts a distributed approach by employing a fog server to complement services in IoVs. In E2MD, vehicles continuously update their status to a fog server either directly or through intermediate nodes. The performance of the proposed scheme is validated through NS 2.35 simulations. Simulation results confirm the performance supremacy of E2MD compared to contemporary schemes in terms of end-to-end delay and messaging cost. © 2018 IEEE.
Managing big RDF data in clouds : challenges, opportunities, and solutions
- Authors: Elzein, Nahla , Majid, Mazlina , Hashem, Ibaker , Yaqoob, Ibrar , Alaba, Fadele , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: Sustainable Cities and Society Vol. 39, no. (2018), p. 375-386
- Full Text: false
- Reviewed:
- Description: The expansion of the services of the Semantic Web and the evolution of cloud computing technologies have significantly enhanced the capability of preserving and publishing information in standard open web formats, such that data can be both human-readable and machine-processable. This situation meets the challenge in the current big data era to effectively store, retrieve, and analyze resource description framework (RDF) data in swarms. This paper presents an overview of the existing challenges, evolving opportunities, and current developments towards managing big RDF data in clouds and provides guidance and substantial lessons learned from research in big data management. In particular, it highlights the basic principles of RDF data management, which allow researchers to know the most recent stage in developing RDF graphs and its achievement. Additionally, the research provides comparative studies among current storage systems and query processing approaches in understanding their efficiency. The paper also provides a vision for long-term future research directions by providing highlights on future challenges and opportunities in RDF domain. © 2018 Elsevier Ltd
On the PAPR reduction : a novel filtering based hadamard transform precoded uplink MC-NOMA scheme for 5G cellular networks
- Authors: Baig, Imran , Farooq, U. , Ul Hasan, N. , Zghaibeh, M. , Imran, Muhammad
- Date: 2018
- Type: Text , Conference paper
- Relation: 1st International Conference on Computer Applications and Information Security, ICCAIS 2018, Riyadh, 4-6 April 2018
- Full Text: false
- Reviewed:
- Description: Multicarrier Non-Orthogonal Multiple Access (MC-NOMA) is a variant of hybrid NOMA, where, Orthogonal Frequency Division Multiple Access (OFDMA) may be employed due to its technical maturity. The MC-NOMA is one of the attractive schemes and likely to be employed in the forthcoming 5G Cellular Networks due to its massive connectivity, spectral efficiency, better cell coverage capability and higher data rate. However, all OFDMA based schemes suffer from the problem of high Peak-to-Average Power Ratio (PAPR). Therefore, in this paper, a novel Finite Impulse Response (FIR) filter based Hadamard Transform (HT) precoded uplink MC-NOMA scheme is presented for high PAPR reduction. MATLAB® simulations demonstrate that, the proposed FIR filter based HT precoded uplink MC-NOMA scheme outperform the HT precoded uplink MC-NOMA schemes without any filtering and conventional uplink MC-NOMA schemes available in literature. © 2018 IEEE. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran” is provided in this record**
Performance analysis of priority-based IEEE 802.15.6 protocol in saturated traffic conditions
- Authors: Ullah, Sana , Tovar, Eduardo , Kim, Ki , Kim, Kyong , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 66198-66209
- Full Text:
- Reviewed:
- Description: Recent advancement in internet of medical things has enabled deployment of miniaturized, intelligent, and low-power medical devices in, on, or around a human body for unobtrusive and remote health monitoring. The IEEE 802.15.6 standard facilitates such monitoring by enabling low-power and reliable wireless communication between the medical devices. The IEEE 802.15.6 standard employs a carrier sense multiple access with collision avoidance protocol for resource allocation. It utilizes a priority-based backoff procedure by adjusting the contention window bounds of devices according to user requirements. As the performance of this protocol is considerably affected when the number of devices increases, we propose an accurate analytical model to estimate the saturation throughput, mean energy consumption, and mean delay over the number of devices. We assume an error-prone channel with saturated traffic conditions. We determine the optimal performance bounds for a fixed number of devices in different priority classes with different values of bit error ratio. We conclude that high-priority devices obtain quick and reliable access to the error-prone channel compared to low-priority devices. The proposed model is validated through extensive simulations. The performance bounds obtained in our analysis can be used to understand the tradeoffs between different priority levels and network performance. © 2018 IEEE.
Q-Learning for energy balancing and avoiding the void hole routing protocol in underwater sensor networks
- Authors: Javaid, Nadeem , Karim, Obaida , Sher, Arshad , Imran, Muhammad , Yasar, Ansar , Guizani, Mohsen
- Date: 2018
- Type: Text , Conference paper
- Relation: 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018 p. 702-706
- Full Text: false
- Reviewed:
- Description: In energy constraint networks, the utilization of limited node battery is very crucial to enhance the network lifespan. The imbalanced node battery dissipation greatly effects the performance of the network. In this paper, we propose QLearning based energy-efficient and balanced data gathering routing protocol (QL-EEBDG). The effectiveness of a forwarder node is computed based on; residual energy of the source node and group energies of the neighbour nodes. The consideration of energy parameters provides complete control on the forwarder node selection and ensures efficient energy consumptions in the network. Still, due to topology changes, void node occurs which is avoided through adjacent node technique (QL-EEBDG-ADN). This scheme finds an alternate route via neighbor nodes to provide continuous communication among the network nodes. Simulations are performed to validate the effectiveness of proposed schemes against existing scheme based on energy tax, network lifetime. © 2018 IEEE.
Recent advances and challenges in mobile big data
- Authors: Ahmed, Ejaz , Yaqoob, Ibrar , Hashem, Ibrahim , Shuja, Junaid , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Communications Magazine Vol. 56, no. 2 (2018), p. 102-108
- Full Text: false
- Reviewed:
- Description: The unabated flurry of research activities dedicated to gaining business insights from a flood of data generated by heterogeneous mobile sources, such as the Internet of Vehicles, sensors, and smartphones, has instigated a new research domain called MBD. At the core of this mobile environment, scalability, cost effectiveness, reliability, analytics, and security are important concerns. Coping with these issues in handling MBD requires understanding the challenges associated with it. Mobile computing and big data have been widely studied separately; however, very few studies have explored the convergence of these two domains. In this article, we critically review recent research efforts directed at MBD. We also classify the MBD by devising a thematic taxonomy that is based on source, analytics, applications, characteristics, security, and data type. Furthermore, we discuss the opportunities offered by MBD in terms of analytics. Some potential uses of MBD in healthcare, telecommunication, digital advertising, and transportation are also presented. Several open research challenges are discussed as future research directions. © 1979-2012 IEEE. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran” is provided in this record**
SDN-Based load balancing service for cloud servers
- Authors: Abdelaziz, Ahmed , Ahmed, Ejaz , Fong, Ang , Gani, Abdullah , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Communications Magazine Vol. 56, no. 8 (2018), p. 106-111
- Full Text: false
- Reviewed:
- Description: With the continuous growth, heterogeneity, and ever increasing demand of services, load balancing of cloud servers is an emerging challenge to meet highly demanding requirements (e.g., data rates, latency, quality of service) of 5G network applications. Although various load balancing techniques have been proposed, some of these techniques either require installation of dedicated additional load balancers for each service, or manual reconfiguration of the device to handle new services is desired. These techniques are expensive, time-consuming, and impractical. Moreover, most of the existing load balancing schemes do not consider service types. This article presents an SDN-based load balancing (SBLB) service for cloud servers to maximize resource utilization and minimize response time of users. The constituents of the proposed scheme are an application module that runs on top of an SDN controller and server pools that connect to the controller through OpenFlow switches. The application module consists of a service classification module, a dynamic load balancing module, and a monitoring module. The controller handles all messages, manages host pools, and maintains the load of host in real time. Experimental results validate the performance of the proposed scheme. Through experimental results, SBLB demonstrates significant decrease in average response time and reply time. © 1979-2012 IEEE.
Simultaneous wireless information and power transfer for buffer-aided cooperative relaying systems
- Authors: Nasir, Hina , Javaid, Nadeem , Imran, Muhammad , Shoaib, Muhammad , Anwar, Mehmoon
- Date: 2018
- Type: Text , Conference paper
- Relation: 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018, Limassol, 25-28 June 2018 p. 845-849
- Full Text: false
- Reviewed:
- Description: This paper explored cooperative relaying in the presence of energy constrained relays with data storage facility. The relays depend only on the source signal to harvest energy and forward signal to the destination. The relay is selected according to the instantaneous strength of the wireless link. The strongest link among all links on both sides i.e., source-relay and relaydestination links is selected for relay to receive or transmit data, respectively. Two protocols are used for energy harvesting and information transfer namely: 'power splitting based relaying' and 'time switching based relaying'. We evaluate the outage probability performance of the presented scheme using Monte Carlo simulations. The results show that TSR performs better than PSR protocol. © 2018 IEEE.
Technology-assisted decision support system for efficient water utilization : a real-time testbed for irrigation using wireless sensor networks
- Authors: Khan, Rahim , Ali, Ihsan , Zakarya, Muhammad , Ahmad, Mushtaq , Imran, Muhammad , Shoaib, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 25686-25697
- Full Text:
- Reviewed:
- Description: Scientific organizations and researchers are eager to apply recent technological advancements, such as sensors and actuators, in different application areas, including environmental monitoring, creation of intelligent buildings, and precision agriculture. Technology-assisted irrigation for agriculture is a major research innovation which eases the work of farmers and prevents water wastage. Wireless sensor networks (WSNs) are used as sensor nodes that directly interact with the physical environment and provide real-time data that are useful in identifying regions in need, particularly in agricultural fields. This paper presents an efficient methodology that employs WSN as a data collection tool and a decision support system (DSS). The proposed DSS can assist farmers in their manual irrigation procedures or automate irrigation activities. Water-deficient sites in both scenarios are identified by using soil moisture and environmental data sensors. However, the proposed system's accuracy is directly proportional to the accuracy of dynamic data generated by the deployed WSN. A simplified outlier-detection algorithm is thus presented and integrated with the proposed DSS to fine-tune the collected data prior to processing. The complexity of the algorithm is O(1) for dynamic datasets generated by sensor nodes and O(n) for static datasets. Different issues in technology-assisted irrigation management and their solutions are also addressed. © 2013 IEEE.
The role of edge computing in internet of things
- Authors: Hassan, Najmul , Gillani, Saira , Ahmed, Ejaz , Yaqoob, Ibrar , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Communications Magazine Vol. 56, no. 11 (2018), p. 110-115
- Full Text: false
- Reviewed:
- Description: Remarkable advancements in embedded systems- on-a-chip have significantly increased the number of commercial devices that possess sufficient resources to run full-fledged operating systems. This change has extended the potential of the IoT. Many early IoT devices could only collect and send data for analysis. However, the increasing computing capacity of today's devices allow them to perform complex computations on-site, resulting in edge computing. Edge computing extends cloud computing capabilities by bringing services close to the edge of a network and thus supports a new variety of services and applications. In this work, we investigate, highlight, and report on recent advances in edge computing technologies with respect to measuring their impact on IoT. We establish a taxonomy of edge computing by classifying and categorizing existing literature, and by doing so, we reveal the salient and supportive features of different edge computing paradigms for IoT. Moreover, we present the key requirements for the successful deployment of edge computing in IoT and discuss a few indispensable scenarios of edge computing in IoT. Several open research challenges are also outlined. © 1979-2012 IEEE.
Toward dynamic resources management for IoT-based manufacturing
- Authors: Wan, Jiafu , Chen, Baotong , Imran, Muhammad , Tao, Fei , Li, Di
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Communications Magazine Vol. 56, no. 2 (2018), p. 52-59
- Full Text: false
- Reviewed:
- Description: The cyber-physical production system (CPPS), which combines information communication technology, cyberspace virtual technology, and intelligent equipment technology, is accelerating the path of Industry 4.0 to transform manufacturing from traditional to intelligent. The Industrial Internet of Things integrates the key technologies of industrial communication, computing, and control, and is providing a new way for a wide range of manufacturing resources to optimize management and dynamic scheduling. In this article, OLE for process control technology, software defined industrial network, and device-To-device communication technology are proposed to achieve efficient dynamic resource interaction. Additionally, the integration of ontology modeling with multiagent technology is introduced to achieve dynamic management of resources. We propose a load balancing mechanism based on Jena reasoning and Contract-Net Protocol technology that focuses on intelligent equipment in the smart factory. Dynamic resources management for IoT-based manufacturing provides a solution for complex resource allocation problems in current manufacturing scenarios, and provides a technical reference point for the implementation of intelligent manufacturing in Industry 4.0. © 1979-2012 IEEE. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran" is provided in this record**
VANET–LTE based heterogeneous vehicular clustering for driving assistance and route planning applications
- Authors: Ahmad, Iftikhar , Noor, Rafidah , Ahmedy, Ismail , Shah, Syed , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: Computer Networks Vol. 145, no. (2018), p. 128-140
- Full Text: false
- Reviewed:
- Description: The Internet of vehicles incorporates multiple access networks and technologies to connect vehicles on roads. These vehicles usually require the use of individual long-term evolution (LTE) connections to send/receive data to/from a remote server to make smart decisions regarding route planning and driving. An increasing number of vehicles on the roads may not only overwhelm LTE network usage but also incur added cost. Clustering helps minimize LTE usage, but the high speed of vehicles renders connections unstable and unreliable not only among vehicles but also between vehicles and the LTE network. Moreover, non-cooperative behavior among vehicles within a cluster is a bottleneck in sharing costly data acquired from the Internet. To address these issues, we propose a novel destination- and interest-aware clustering (DIAC) mechanism. DIAC primarily incorporates a strategic game-theoretic algorithm and a self-location calculation algorithm. The former allows vehicles to participate/cooperate and enforces a fair-use policy among the cluster members (CMs), whereas the latter enables CMs to calculate their location coordinates in the absence of a global positioning system under an urban topography. DIAC strives to reduce the frequency of link failures not only among vehicles but also between each vehicle and the 3G/LTE network. The mechanism also considers vehicle mobility and LTE link quality and exploits common interests among vehicles in the cluster formation phase. The performance of the DIAC mechanism is validated through extensive simulations, whose results demonstrate that the performance of the proposed mechanism is superior to that of similar and existing approaches. © 2018 Elsevier B.V.
A quantitative risk assessment model involving frequency and threat degree under line-of-business services for infrastructure of emerging sensor networks
- Authors: Jing, Xu , Hu, Hanwen , Yang, Huijun , Au, Man , Li, Shuqin , Xiong, Naixue , Imran, Muhammad , Vasilakos, Athanasios
- Date: 2017
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 17, no. 3 (2017), p.
- Full Text:
- Reviewed:
- Description: The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. © 2017 by the authors. Licensee MDPI, Basel, Switzerland.
An automatic digital audio authentication/forensics system
- Authors: Ali, Zulfiqar , Imran, Muhammad , Alsulaiman, Mansour
- Date: 2017
- Type: Text , Journal article
- Relation: IEEE Access Vol. 5, no. (2017), p. 2994-3007
- Full Text:
- Reviewed:
- Description: With the continuous rise in ingenious forgery, a wide range of digital audio authentication applications are emerging as a preventive and detective control in real-world circumstances, such as forged evidence, breach of copyright protection, and unauthorized data access. To investigate and verify, this paper presents a novel automatic authentication system that differentiates between the forged and original audio. The design philosophy of the proposed system is primarily based on three psychoacoustic principles of hearing, which are implemented to simulate the human sound perception system. Moreover, the proposed system is able to classify between the audio of different environments recorded with the same microphone. To authenticate the audio and environment classification, the computed features based on the psychoacoustic principles of hearing are dangled to the Gaussian mixture model to make automatic decisions. It is worth mentioning that the proposed system authenticates an unknown speaker irrespective of the audio content i.e., independent of narrator and text. To evaluate the performance of the proposed system, audios in multi-environments are forged in such a way that a human cannot recognize them. Subjective evaluation by three human evaluators is performed to verify the quality of the generated forged audio. The proposed system provides a classification accuracy of 99.2% ± 2.6. Furthermore, the obtained accuracy for the other scenarios, such as text-dependent and text-independent audio authentication, is 100% by using the proposed system. © 2017 IEEE.