2024-03-28T18:05:00Z
https://ijicta.org/index.php/ijicta/oai
oai:ojs.pkp.sfu.ca:article/1
2017-12-29T20:20:53Z
ijicta:ART
DVB-S2 Channel Estimation and Decoding in The Presence of Phase Noise for Non-Linear Channels
Pal, Urvashi
KING, Horace L
DVB-S2
AWGN
Rician Channel
Rayleigh Channel
Correlated Phase Noise
Iterative Channel Estimation
BPSK
QPSK
16 QAM
MATLAB
In a multipath fading channel of DVB-S2, smallscalevariations occur due to unwanted noise signal, which isdirectly related to the impulse response of a radio channel. Thevarying channel has to be estimated before decoding the signal atthe receiver for proper signal recovery. However, In the presenceof a time varying and correlated phase noise, proper estimation ofthe Channel Impulse Response (CIR) becomes difficult. Toovercome this problem, a pilot-aided joint channel estimation anddecoding method is proposed to obtain the initial estimate of thechannel. This technique is reliable and important for satellitecommunication as the Ku-band capacity is almost over crowdedand more satellite resources are needed. The results show thatIterative Channel Estimation technique results in a lower BER andimproved signal quality for DVB-S2, which fine-tunes the systemfor an efficient use of power and bandwidth of satellite resources.
Australasian Association for Information and Communication Technology
2015-03-09
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Simulation
application/pdf
https://ijicta.org/index.php/ijicta/article/view/1
10.17972/ajicta2015111
International Journal of Information, Communication Technology and Applications; Vol. 1 No. 1 (2015); 112-127
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/1/15
oai:ojs.pkp.sfu.ca:article/3
2017-12-29T20:20:53Z
ijicta:ART
Frequency-Adaptive Approach In IEEE 802.15.4 Wireless Body Sensor Networks: Continuous-Assessment or Periodic-Assessment?
Moravejosharieh, Amir Hossein
internal interference
wireless body sensor network
frequency-adaptive
frequency hopping
IEEE 802.15.4 is arguably considered as a welldesigned standard protocol to address the need for low-rate, low-power and low-cost Wireless Body Sensor Networks (WBSNs).Within a WBSN, Node‘s communication occurs during theirconfined active periods. The increase in number of active WBSNswould consequently result in the elevation of the overlapping ratiobetween the active periods of neighbouring WBSNs. In this paper,we address the interference caused by neighbouring WBSNsand its devastating consequences. Additionally, two frequencyadaptive approaches are proposed as the solutions for decreasingthe negative impacts of internal intereference. Frequency hoppingcould be considered as a possible approach to alleviate theWBSNs performance degradation due to such interference. Inthat regard, two frequency-adaptive approaches are proposednamely: “Continuous-Assessment” and “Periodic-Assessment”schemes and are compared with previously introduced “Initial-Choice” and “Blind-Choice” schemes in terms of channel util-isation, success rate, Satisfaction rate and energy consumption(both sensors and coordinator). Eventually, it is concluded thatContinuous-Assessment scheme outperforms the other introducedschemes in terms of above-mentioned performance measures.
Australasian Association for Information and Communication Technology
2015-03-09
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Novel Research
application/pdf
https://ijicta.org/index.php/ijicta/article/view/3
10.17972/ajicta2015113
International Journal of Information, Communication Technology and Applications; Vol. 1 No. 1 (2015); 19-34
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/3/4
oai:ojs.pkp.sfu.ca:article/4
2017-12-29T20:20:53Z
ijicta:ART
Robust Cooperation in Mobile Ad Hoc Networks
Krzesinski, Anthony
mobile ad hoc networks
incentives for cooperation
credit-based incentives
resistance to fraud.
Consider a mobile ad hoc network where the nodes belong to different authorities. The nodes must be given incentives to spend their resources (battery power and transmission bandwidth) in forwarding packets that originate at nodes belonging to another authority. This can be done by assigning a credit balance to each node: when a node acts as an originating node it uses its credits to pay for the costs of sending its own traffic; when a node acts as a transit node it earns credits by forwarding traffic from other nodes.This paper presents a credit-based incentive scheme which assists nodes when they lack the credits necessary to transmit their data. An essential part of the credit-based scheme is a decentralised credit redistribution mechanism to destroy (create) credit at nodes that are over (under) supplied with credit.The goal of this paper is to investigate the effect of various fraudulent activities on the performance of the credit-based incentive scheme. We show that the credit-based scheme is inherently robust with respect to a number of fraudulent activities, provided the nodes behave in a rational manner. We show that credit redistribution is the main reason why the credit-based incentive scheme is relatively immune to fraud.
Australasian Association for Information and Communication Technology
2015-03-09
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
performance evaluation
application/pdf
https://ijicta.org/index.php/ijicta/article/view/4
10.17972/ajicta2015114
International Journal of Information, Communication Technology and Applications; Vol. 1 No. 1 (2015); 83-95
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/4/14
oai:ojs.pkp.sfu.ca:article/5
2017-12-29T20:20:53Z
ijicta:ART
Evaluating the Cascade Effect in Interdependent Networks via Algebraic Connectivity
Tauch, Sotharith
Liu, William
Pears, Russel
Interconnected networks
Network robustness
Topopogical matrics
Algebraic connectivity
Average node degree
Cascade effects
Understanding how the underlying network structure and interconnectivity impact on the robustness of the interdependent networks is a major challenge in complex networks studies. There are some existing metrics that can be used to measure network robustness. However, different metrics such as the average node degree interprets different characteristic of network topological structure, especially less metrics have been identified to effectively evaluate the cascade performance in interdependent networks. In this paper, we propose to use a combined Laplacian matrix to model the interdependent networks and their interconnectivity, and then use its algebraic connectivity metric as a measure to evaluate its cascading behavior. Moreover, we have conducted extensive comparative studies among different metrics such as the average node degree, and the proposed algebraic connectivity. We have found that the algebraic connectivity metric can describe more accurate and finer characteristics on topological structure of the interdependent networks than other metrics widely adapted by the existing research studies for evaluating the cascading performance in interdependent networks.
Australasian Association for Information and Communication Technology
2015-03-09
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Case Study
application/pdf
https://ijicta.org/index.php/ijicta/article/view/5
10.17972/ajicta2015115
International Journal of Information, Communication Technology and Applications; Vol. 1 No. 1 (2015); 55-68
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/5/5
oai:ojs.pkp.sfu.ca:article/7
2017-12-29T20:20:53Z
ijicta:ART
Mechanisms for QoE optimisation of Video Traffic: A review paper
Qadir, Qahhar Muhammad
QoE
Video
Quality optimisation
Transmission of video traffic over the Internet has grown exponentially in the past few years with no sign of waning. This increasing demand for video services has changed user expectation of quality. Various mechanisms have been proposed to optimise Quality of Experience (QoE) of end user's video. Studying these approaches are necessary for new methods to be proposed or combination of existing ones to be tailored. We discuss challenges facing the optimisation of QoE for video traffic in this paper. It surveys and classifies these mechanisms based on their functions. The limitation of each of them is identified and future directions are highlighted.
Australasian Association for Information and Communication Technology
2015-03-09
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Literature and survey
application/pdf
https://ijicta.org/index.php/ijicta/article/view/7
10.17972/ajicta2015117
International Journal of Information, Communication Technology and Applications; Vol. 1 No. 1 (2015); 1-18
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/7/16
oai:ojs.pkp.sfu.ca:article/12
2017-12-29T20:20:53Z
ijicta:ART
A novel delay line buffering architecture for asynchronous optical packet switched networks
Yang, Shuna
Stol, Norvald
delay-line optical buffer
optical packet switch
Markov model
fiber delay line (FDL)
packet loss ratio (PLR)
Optical buffering is one major challenge in realizing all-optical packet switching. In this paper we focus on a delay-line buffer architecture, named a Multiple-Input Single-Output (MISO) optical buffer, which is realized by cascaded fiber delay lines (FDLs). This architecture reduces the physical size of a buffer by up to an order of magnitude or more by allowing reuse of its delay line elements. We consider the MISO buffers in a network scenario where the incoming packets are asynchronous and of fixed length. A novel Markov model is developed to analyze the performance of our buffering scheme, in terms of packet loss ratio, average packet delay and the output link utilization. Both simulation and analytical results show that the length value of basic FDL element will significantly affect the performance of this buffer. This paper gives clear guidelines for designing optimal basic FDL lengths under different network scenarios. It is noticeable that this optimal length value is independent of the buffer sizes for specific traffic load and pattern.
Australasian Association for Information and Communication Technology
2015-03-09
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Novel Research
application/pdf
https://ijicta.org/index.php/ijicta/article/view/12
10.17972/ajicta20151112
International Journal of Information, Communication Technology and Applications; Vol. 1 No. 1 (2015); 69-82
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/12/6
oai:ojs.pkp.sfu.ca:article/13
2017-12-29T20:20:53Z
ijicta:ART
Increasing Wireless Adhoc Network Capacity through Simultaneous Transmissions
Hunjet, Robert
Coyle, Andrew
MANET
Wireless Network Capacity
A great deal of research has been carried out regarding increasing the capacity of wireless networks. The general findings are that increasing the number of nodes in a wireless network decreases individual throughput, simultaneous transmissions cause interference and therefore hinder capacity, and that topology control can increase network power efficiency and reduce the interference within the network. This paper demonstrates that appropriately spaced simultaneous transmissions are beneficial to the capacity of shared spectrum wireless networks and that adding nodes to a wireless network can, in fact, increase its capacity if the nodes are intelligently placed and node transmission powers are appropriately set. In this paper we firstly discuss the inefficiency of high power transmission for networks which allow simultaneous transmissions. It is then demonstrated that if multiple transmitters are utilised simultaneously with uniform transmission power, the network capacity is a local maximum if the required spacing conditions between the receivers are met. In the presence of background noise one can determine that this configuration represents the maximum network capacity achievable. The required separation is defined for the general case and shown to decrease as the number of simultaneous transmissions increases. This result is verified through simulations which demonstrate the construction of high capacity networks. Simulations are also presented which show how existing networks can be augmented with additional nodes and a reduction of transmission power, to exhibit higher uniform average network capacities.
Australasian Association for Information and Communication Technology
2015-03-09
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Novel Research; tutorial
application/pdf
https://ijicta.org/index.php/ijicta/article/view/13
10.17972/ajicta20151113
International Journal of Information, Communication Technology and Applications; Vol. 1 No. 1 (2015); 35-54
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/13/13
oai:ojs.pkp.sfu.ca:article/14
2017-12-29T20:20:53Z
ijicta:ART
Efficiency Evaluation for Femtocell Spectrum Access in LTE-Advanced
Arafat, Omar
Gregory, Mark A
Telecommunications
Wireless
Mobile Cellular
Femtocells are considered one of the ultimate solutions for the ever increasing demand in LTE-Advance. Recently, wireless industries have resorted to femtocell networks in order to enhance indoor coverage and quality of service since macro-antennas fail to reach these objectives. In enabling indoor home or enterprise users with mobile broadband solutions, role of femtocells are crucially important. While considering low cost solutions for higher coverage and data rate, femtocells apparently have one of the best potentials for indoor users. Due to the dense self-deployment of femtocells in a limited area, serious inter-femtocell interference (IFI) may cause, which consequently results in severe performance degradation. To mitigate the IFI and utilize spectrum resource more efficiently, this paper proposes a cluster based femtocell deployments along with a capacity based cognitive resource allocation scheme .Three different channel configurations in a hybrid access femtocell network are considered for performance analysis. The results of a performance analysis of the cluster based femtocell configurations in a priority based users’ network are presented.
Australasian Association for Information and Communication Technology
2015-03-09
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Novel Research
application/pdf
https://ijicta.org/index.php/ijicta/article/view/14
10.17972/ajicta20151114
International Journal of Information, Communication Technology and Applications; Vol. 1 No. 1 (2015); 96-111
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/14/8
oai:ojs.pkp.sfu.ca:article/15
2017-12-29T20:20:53Z
ijicta:ART
Passive Optical Network Survivability: Protection, Detection and Restoration
Abbas, Huda Saleh
Gregory, Mark A
Passive Optical Networks
Failure
Fiber to the Premises
Restoration
Passive optical network (PON) technologies have received increasing attention as demand for fibre access networks has grown. Enhancing fibre access network reliability provides lower operational costs, and improves customer satisfaction. This paper discusses PON survivability including protection schemes for the fiber link and the Optical Line Terminal (OLT), the exciting monitoring techniques of the fiber link, and the effect of reducing the restoration time on the network availability. The main contribution of this study is to provide two protection schemes namely OLT-only-protected and OLT-and-ring protected. The proposed schemes are designed to handle instances of single failure affecting all customers in the network. This work considers three key performance metrics- Failure Impact Robustness (FIR), cost, and availability. The objective of the proposed protection architectures is to guarantee high quality of service at low costs by protecting critical network elements such as OLT and fiber ring. The proposed architectures have been compared with other well-known protection schemes. The results postulate that OLT-and-ring protected approach has 99.993% availability with a 0.09% increase in cost compared to the ring-only protection architecture.
Australasian Association for Information and Communication Technology
2015-03-09
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Novel Research
application/pdf
https://ijicta.org/index.php/ijicta/article/view/15
10.17972/ajicta20151115
International Journal of Information, Communication Technology and Applications; Vol. 1 No. 1 (2015); 128-142
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/15/17
oai:ojs.pkp.sfu.ca:article/16
2017-12-29T20:20:53Z
ijicta:ART
Improving Remote Method Invocation via Method Authorization and Elimination of Registry: An Exploration of Java and Haxe
Adeyeye Oshin, Michael
Ojewale, Matthew Olusegun
Kabiawu, Oluyomi Olufemi
Challans, Romana
Mufeti, Kauna
Communication systems security
authorization
token networks
network servers
multiprocessor interconnection networks
Service availability in Java RMI (Remote Method Invocation) implementations can easily be compromised in a number of ways. One of the ways is when an attacker controls a directory service and mounts an attack on a RMI client and data. Stubs in a registry can be de- registered or overwritten by the attacker. In addition, he could register his own stubs as proxies to a server implementation. This project focuses on the security pitfalls of using default RMI implementation, namely the lack of access control mechanism to manage server methods (and objects) and limitations of RMI registry. The RMI registry is a weak point that could be exploited. This work addresses this concern by investigating RMI implementation and customizing the behavior to support client/method authorization, authentication and elimination of the need for an RMI registry. The contribution of this work is that it removes inherent vulnerability in RMI, which is due to weak security in RMI registry implementation. In addition, an emerging toolkit, Haxe, for platform-agnostic application development was introduced and its realization of RMI was briefly demonstrated. Haxe exhibits virtually all the features in Java and could be exploited like it. It however presents more promising features for the next generation of applications and services.
Australasian Association for Information and Communication Technology
2015-12-29
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
application/pdf
https://ijicta.org/index.php/ijicta/article/view/16
10.17972/ijicta20151116
International Journal of Information, Communication Technology and Applications; Vol. 1 No. 1 (2015); 152-179
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/16/22
oai:ojs.pkp.sfu.ca:article/21
2017-12-29T20:20:53Z
ijicta:ART
A Statistical Approach to Determine Handover Success Using the Principle of Inclusion and Load Variation on Links in Wireless Networks
KING, Horace L
Pal, Urvashi
Seamless Handover
Active set
pilot pollution
In this paper we present a statistical approach to establish a more efficient mechanism to predict handover success probability on a link in a wireless Network. We develop formulations that are used in the analysis to determine a more effective approach that reduces soft handover occurrences hence reducing unnecessary Network resource consumption. This approach can exploit the soft handover overhead metric and by optimum dimensioning can estimate the active set responsiveness using conditional thresholds set in a given service area. Furthermore, we analyse load variation and the value of pilot power in a given cell and the effects of pilot pollution in a dynamic traffic environment. Results of the analysis are presented for the probability of handover success and plots of signal strength variation on selected links using defined site specific formulations.
Australasian Association for Information and Communication Technology
2015-12-29
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Novel Research
application/pdf
https://ijicta.org/index.php/ijicta/article/view/21
10.17972/ijicta20151121
International Journal of Information, Communication Technology and Applications; Vol. 1 No. 1 (2015); 143-151
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/21/21
oai:ojs.pkp.sfu.ca:article/22
2017-12-29T20:21:13Z
ijicta:REV
Three-Dimensional Video Watermarking – A Review and Open Challenges
Al-Boeridi, Omar N.
Wu, Hong Ren
van Schyndel, Ron
3-D video
Stereoscopic video
Watermarking
Copyright protection
Data hiding
Intellectual property (IP) protection of three-dimensional (3-D) media is an important issue for both academic and wider communities to combat the illegal distribution and pirating of this visual medium. Digital watermarking has been used to address various challenges in media IP protection. The challenge central to 3-D video as well as other audio-visual signal watermarking is that given a fixed level of perceptual transparency, a watermarking system cannot simultaneously achieve a high degree of robustness and a high watermark payload. The majority of published research reports in this field try to introduce new embedding methodologies to increase the watermark robustness with highest possible visual media quality. This paper reviews the current state-of-the-art in 3-D video watermarking and assesses various watermarking techniques in the field. Some of 3-D video watermarking techniques are directly inherited from video watermarking, stereo image watermarking or 3-D mesh watermarking, and therefore the relevant techniques in these fields are reviewed in this paper as well. Key performances of various embedding algorithms are examined and compared in this review to identify a benchmark for future development and performance evaluation of new 3-D video watermarking techniques.
Australasian Association for Information and Communication Technology
2016-04-18
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Review
Review
application/pdf
https://ijicta.org/index.php/ijicta/article/view/22
10.17972/ijicta20162122
International Journal of Information, Communication Technology and Applications; Vol. 2 No. 1 (2016); 47-65
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/22/25
oai:ojs.pkp.sfu.ca:article/25
2017-12-29T20:21:13Z
ijicta:ART
Inference of Personal Sensors in the Internet of Things
Kang, James Jin Won
Larkin, Henry
Inference
Data Mining
mHealth
Personal Sensor Devices
WBAN
Sensor Networks
IoT
Big Data
Cloud Computing
Smartphone technology has become more popular and innovative over the last few years, and technology companies are now introducing wearable devices into the market. By emerging and converging with technologies such as Cloud, Internet of Things (IoT) and Virtualization, requirements to personal sensor devices are immense and essential to support existing networks, e.g. mobile health (mHealth) as well as IoT users. Traditional physiological and biological medical sensors in mHealth provide health data either periodically or on-demand. Both of these situations can cause rapid battery consumption, consume significant bandwidth, and raise privacy issues, because these sensors do not consider or understand sensor status when converged together. The aim of this research is to provide a novel approach and solution to managing and controlling personal sensors that can be used in various areas such as the health, military, aged care, IoT and sport. This paper presents an inference system to transfer health data collected by personal sensors efficiently and effectively to other networks in a secure and effective manner without burdening workload on sensor devices.
Australasian Association for Information and Communication Technology
2016-01-26
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Novel Reasch
application/pdf
https://ijicta.org/index.php/ijicta/article/view/25
10.17972/ijicta20162125
International Journal of Information, Communication Technology and Applications; Vol. 2 No. 1 (2016); 1-23
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/25/23
oai:ojs.pkp.sfu.ca:article/26
2017-12-29T20:21:13Z
ijicta:ART
Promoting Cooperation in Mobile Ad Hoc Networks
Krzesinski, Anthony
Mobile ad hoc networks
incentives for cooperation
credit-based incentives.
Consider a mobile ad hoc network (MANET) where the nodes belong todifferent authorities. The nodes must be given incentives to spend theirresources (battery energy, transmission bandwidth, buffer space) inforwarding packets that originate at nodes belonging to anotherauthority. This can be done by assigning a credit balance to each node:when a node acts as an originating node it uses its credits to pay forthe costs of sending its own traffic; when a node acts as a transit nodeit earns credits by forwarding traffic from other nodes. This paperpresents a credit-based incentive scheme which assists nodes thatpersistently lack the credits necessary to transmit their data, andprotects nodes from using too large a proportion of their resources toforward traffic that originated from other nodes. We first present twobasic incentive schemes: the first scheme free-for-all does not regulatethe willingness of the nodes to forward packets on behalf of othernodes; the second scheme tit-for-tat contains such a regulatorymechanism. Next we present the origin pays and the destination paysprotocol which contain a decentralised credit redistribution mechanismto destroy (create) credit at over (under) provisioned nodes. Bothconstant and congestion-dependent resource prices are investigated.Congestion pricing is also used to reward (penalise) the destinationnode for receiving packets on under (over) utilised routes. Initialexperiments indicate that the origin pays protocol with congestionpricing offers a substantial improvement over the free-for-all protocolthat is currently used in MANETs.
Australasian Association for Information and Communication Technology
2016-01-31
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Simulation study
application/pdf
https://ijicta.org/index.php/ijicta/article/view/26
10.17972/ijicta20162126
International Journal of Information, Communication Technology and Applications; Vol. 2 No. 1 (2016); 24-46
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/26/24
oai:ojs.pkp.sfu.ca:article/27
2017-12-29T20:21:13Z
ijicta:ART
The critical role of structural hole in forming trust for Securing Wireless Sensor Networks
Xiang, Ming
Liu, William
Bai, Quan
Al-Anbuky, Adnan
Wireless sensor networks
Trust and reputation managment
Adaptive networks
Structural hole
Topological metrics
The security issues in wireless sensor networks (WSNs) are crucial and the limitation of computing resources and distributed properties of WSN make the traditional security mechanisms no longer feasible in protecting WSN as in the wired networks. There is an emerging research area i.e., trust and reputation mechanisms, has been developed, as an alternative solution to tackle the security issues in WSNs. While the recent studies on trust are mainly focusing on the trust modelling so as to effectively detect and avoid malicious activities. In this paper, we propose to use adaptive network approach to investigate the interplay between the network entities' trust behaviour and their underlying topological connectivity. We have found that the structural hole has its unique position and efficiency on connecting different regional sub-networks, but on the other side, from the security perspective, it has risks of fragile in the network. The extensive simulation studies have confirmed that structure hole plays a critical role on both for securing WSNs and also enable network routing efficiency.
Australasian Association for Information and Communication Technology
2016-04-18
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Novel Research
application/pdf
https://ijicta.org/index.php/ijicta/article/view/27
10.17972/ijicta20162127
International Journal of Information, Communication Technology and Applications; Vol. 2 No. 1 (2016); 66-84
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/27/26
oai:ojs.pkp.sfu.ca:article/29
2017-12-29T20:21:13Z
ijicta:ART
On Simultaneously Increasing MANET Survivability, Capacity, Power Efficiency and Security
Hunjet, Robert
MANET
power control
wireless network capacity
network survivability
Increasing the capacity, survivability and power efficiency of wireless networks are often seen as competing goals. This paper shows that it is possible to pursue these goals simultaneously in ad hoc networks through the use of a multi-objective cross entropy optimisation operating on the placement of additional nodes and transmission power control. Encouraging results were obtained through simulation, with substantial capacity gains and associated transmission power savings achieved, whilst offering survivability through bi-connected topologies. This paper also discusses how the increase in power efficiency improves the security of the network by reducing the range at which messages within the network can be detected and decoded by eavesdropping nodes. A derivation of the optimal distance required between senders and receivers in the presence of noise is described, and the effects of relaying on overall network capacity and node throughput are discussed.
Australasian Association for Information and Communication Technology
2016-05-26
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
application/pdf
https://ijicta.org/index.php/ijicta/article/view/29
10.17972/ijicta20162129
International Journal of Information, Communication Technology and Applications; Vol. 2 No. 1 (2016); 85-107
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/29/27
oai:ojs.pkp.sfu.ca:article/32
2017-12-29T20:21:13Z
ijicta:ART
Data Processing of Physiological Sensor Data and Alarm Determination Utilising Activity Recognition
Kang, James Jin
Luan, Tom
Larkin, Henry
Body sensors
WBAN
IoT
Activity Recognition
Inference
Current physiological sensors are passive and transmit sensed data to Monitoring centre (MC) through wireless body area network (WBAN) without processing data intelligently. We propose a solution to discern data requestors for prioritising and inferring data to reduce transactions and conserve battery power, which is important requirements of mobile health (mHealth). However, there is a problem for alarm determination without knowing the activity of the user. For example, 170 beats per minute of heart rate can be normal during exercising, however an alarm should be raised if this figure has been sensed during sleep. To solve this problem, we suggest utilising the existing activity recognition (AR) applications. Most of health related wearable devices include accelerometers along with physiological sensors. This paper presents a novel approach and solution to utilise physiological data with AR so that they can provide not only improved and efficient services such as alarm determination but also provide richer health information which may provide content for new markets as well as additional application services such as converged mobile health with aged care services. This has been verified by experimented tests and examples of using vital signs such as heart pulse rate, respiration rate and body temperature with a demonstrated outcome of AR accelerometer sensors integrated with an Android app.
Australasian Association for Information and Communication Technology
2016-09-24
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
Novel Research
application/pdf
https://ijicta.org/index.php/ijicta/article/view/32
10.17972/ijicta20162132
International Journal of Information, Communication Technology and Applications; Vol. 2 No. 1 (2016); 108-131
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/32/28
oai:ojs.pkp.sfu.ca:article/34
2019-06-16T11:22:36Z
ijicta:ART
An Indoor Positioning System Using Multiple Methods and Tools
Adeyeye Oshin, Michael
Sehloho, Nobaene
Telecommunications
Sensor Networks
With many different studies showing a growing demand for the development of indoor positioning systems, numerous positioning and tracking methods and tools are available for which can be used for mobile devices. Therefore, an interest is more on development of indoor positioning and tracking systems that are accurate and effective. Presented and proposed in this work, is an indoor positioning system. As opposed to an Ad-hoc Positioning System (APS), it uses a Wireless Mesh Network (WMN). The system makes use of an already existing Wi-Fi infrastructure technology. Moreover, the approach tests the positioning of a node with its neighbours in a mesh network using multi-hopping functionality. The positioning measurements used were the ICMP echos, RSSI and RTS/CTS requests and responses. The positioning method used was the trilateral technique, in combination with the idea of the fingerprinting method. Through research and experimentation, this study developed a system which shows potential as a positioning system with an error of about 2 m to 3 m. The hybridisation of the method proves an enhancement in the system though improvements are still required.
Australasian Association for Information and Communication Technology
2018-05-01
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
application/pdf
https://ijicta.org/index.php/ijicta/article/view/34
10.17972/ijicta20184134
International Journal of Information, Communication Technology and Applications; Vol. 4 No. 1 (2018); 11-22
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/34/34
Copyright (c) 2018 International Journal of Information, Communication Technology and Applications
https://creativecommons.org/licenses/by-nc-nd/4.0
oai:ojs.pkp.sfu.ca:article/36
2019-06-16T11:22:30Z
ijicta:ART
Achieving Optimal K-Anonymity Parameters for Big Data
Al-Zobbi, Mohammed Essa
Shahrestani, Seyed
Ruan, Chun
Access Control
Anonymization
k-anonymity
Big Data
MapReduce
Datasets containing private and sensitive information are useful for data analytics. Data owners cautiously release such sensitive data using privacy-preserving publishing techniques. Personal re-identification possibility is much larger than ever before. For instance, social media has dramatically increased the exposure to privacy violation. One well-known technique of k-anonymity proposes a protection approach against privacy exposure. K-anonymity tends to find k equivalent number of data records. The chosen attributes are known as Quasi-identifiers. This approach may reduce the personal re-identification. However, this may lessen the usefulness of information gained. The value of k should be carefully determined, to compromise both security and information gained. Unfortunately, there is no any standard procedure to define the value of k. The problem of the optimal k-anonymization is NP-hard. In this paper, we propose a greedy-based heuristic approach that provides an optimal value for k. The approach evaluates the empirical risk concerning our Sensitivity-Based Anonymization method. Our approach is derived from the fine-grained access and business role anonymization for big data, which forms our framework.
Australasian Association for Information and Communication Technology
2018-05-15
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
application/pdf
https://ijicta.org/index.php/ijicta/article/view/36
10.17972/ijicta20184136
International Journal of Information, Communication Technology and Applications; Vol. 4 No. 1 (2018); 23-33
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/36/35
Copyright (c) 2018 International Journal of Information, Communication Technology and Applications
https://creativecommons.org/licenses/by-nc-nd/4.0
oai:ojs.pkp.sfu.ca:article/38
2019-06-16T11:22:42Z
ijicta:ART
Effectiveness of Intrusion Detection Systems in High-speed Networks
Hu, Qinwen
Asghar, Muhammad Rizwan
Brownlee, Nevil
Computer Networking
Telecommunications
Intrusion Detection Systems
Network Intrusion Detection Systems (NIDSs) play a crucial role in detecting malicious activities within networks. Basically, a NIDS monitors network flows and compares them with a set of pre-defined suspicious patterns. To be effective, different intrusion detection algorithms and packet capturing methods have been implemented. With rapidly increasing network speeds, NIDSs face a challenging problem of monitoring large and diverse traffic volumes; in particular, high packet drop rates can have a significant impact on detection accuracy. In this work, we investigate three popular open-source NIDSs: Snort, Suricata, and Bro along with their comparative performance benchmarks. We investigate key factors (including system resource usage, packet processing speed and packet drop rate) that limit the applicability of NIDSs to large-scale networks. Moreover, we also analyse and compare the performance of NIDSs when configurations and traffic volumes are changed.
Australasian Association for Information and Communication Technology
2018-03-18
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
application/pdf
https://ijicta.org/index.php/ijicta/article/view/38
10.17972/ijicta20184138
International Journal of Information, Communication Technology and Applications; Vol. 4 No. 1 (2018); 1-10
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/38/33
Copyright (c) 2018 International Journal of Information, Communication Technology and Applications
https://creativecommons.org/licenses/by-nc-nd/4.0
oai:ojs.pkp.sfu.ca:article/40
2019-06-16T11:22:54Z
ijicta:ART
Bandwidth Update Impact in Multi-Domain Software Defined Networking
Wibowo, Franciscus Xaverius Ari
Gregory, Mark A
Software Defined Networking, Multi-Domain, telecommunications, data communications, gateway
The rapid growth of data transmission over digital networks, especially of delay sensitive traffic, has meant that research into improved networking has increased. Network domain boundaries are key points in the network where service provisioning, flow control, and management occur between organizations. This paper presents a flexible automated approach that utilizes Software Defined Networking (SDN) to carry out provisioning, control and management functions at domain boundaries. We propose a multi-domain SDN provisioning framework and a domain boundary bandwidth update algorithm to improve link performance between domains. Simulations were carried out using data captured from a carrier to enterprise network link. The simulation results show that the proposed algorithm provides improved service fulfillment, lower packet loss probability and higher benefit-to-cost ratio compared to other approaches.
Australasian Association for Information and Communication Technology
2017-12-25
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
application/pdf
https://ijicta.org/index.php/ijicta/article/view/40
10.17972/ijicta20173140
International Journal of Information, Communication Technology and Applications; Vol. 3 No. 1 (2017); 1-14
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/40/31
Copyright (c) 2018 International Journal of Information, Communication Technology and Applications
https://creativecommons.org/licenses/by-nc-nd/4.0
oai:ojs.pkp.sfu.ca:article/41
2019-06-16T11:22:48Z
ijicta:ART
Performance Evaluation of IEEE 802.15.4-based Wireless Body Sensor Networks: An Experimental Study
Moravejosharieh, Amir Hossein
Wireless Body Sensor Network, WSN, Interference, Channel Utilisation, IEEE 802.15.4
One of the most challenging issues in IEEE 802.15.4-based Wireless Body Sensor Networks (WBSNs) is the mutual interference caused by neighbouring WBSNs. As the number of co-located such sensor networks becomes larger in a frequency channel, the destructive impact of mutual interference becomes stronger and eventually causes significant performance degradation mainly due to inefficient channel utilisation. In this paper, we have proposed a new scheme called “dynamic-phase-shifting” in which a WBSN is able to shift its beacon packets to other phases (time slot) to eventually find a phase with reasonably higher performance gain. A set of performance measures along with two experimental scenarios are used to evaluate the performance of dynamic-phase shifting scheme compared to a baseline scheme that follows IEEE 802.15.4 protocol standard. The obtained results show that dynamic-phase-shifting scheme is not only feasible to be implemented on real sensor devices but also, it outperforms IEEE 802.15.4 standard in terms of the considered performance measures.
Australasian Association for Information and Communication Technology
2017-12-25
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
application/pdf
https://ijicta.org/index.php/ijicta/article/view/41
10.17972/ijicta20173141
International Journal of Information, Communication Technology and Applications; Vol. 3 No. 1 (2017); 15-27
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/41/32
Copyright (c) 2017 International Journal of Information, Communication Technology and Applications
https://creativecommons.org/licenses/by-nc-nd/4.0
oai:ojs.pkp.sfu.ca:article/42
2019-06-16T11:22:25Z
ijicta:ART
Identifying Recurrence Behaviour in the Underlying BGP Traffic
Al-Musawi, Bahaa Qasim
Branch, Philip
Inter-domain routing
BGP
Stability
Recurrence Plot
Anomaly detection
The Border Gateway Protocol (BGP) is an Internet routing protocol responsible for exchanging network reachability information between Autonomous Systems (ASes). Monitoring and mining BGP traffic are important aspects to understand and improve the stability of the Internet. However, identifying the characteristics of BGP traffic is much harder than it seems at a first glance where BGP traffic has been identified as complex, voluminous, and noisy. In this paper, we show that BGP traffic can be understood as an aggregation of oscillations of different frequencies from different ASes. Using linear and nonlinear statistical analysis, we show that BGP traffic shows recurrent behaviour. The source of this behaviour is unsynchronised periodic behaviour from a set of ASes.
Australasian Association for Information and Communication Technology
2018-06-30
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
application/pdf
https://ijicta.org/index.php/ijicta/article/view/42
10.17972/ijicta20184142
International Journal of Information, Communication Technology and Applications; Vol. 4 No. 1 (2018); 34-47
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/42/36
Copyright (c) 2018 International Journal of Information, Communication Technology and Applications
https://creativecommons.org/licenses/by-nc-nd/4.0
oai:ojs.pkp.sfu.ca:article/48
2021-03-17T12:47:21Z
ijicta:ART
Increased Network Monitoring Support through Topic Modelling
Steinhauer, Joe
Åhlén, Anders
Helldin, Tove
Karlsson, Alexander
Mathiason, Gunnar
Topic Modelling
Exploratory Data Analysis
Anomaly Detection
Root Cause Detection
Telecommunication Networks
Network Performance Monitoring
To ensure that a wireless telecommunication system is reliably functioning at all times, root-causes of potential network failures need to be identified and remedied, ideally before a noticeable network performance degradation occurs. Network operators are today observing a multitude of key performance indicators (KPIs) and are notified of possible network problems through alarms issued by different parts of the network. However, the number of cascading alarms together with the number of observable KPIs are easily overwhelming the operator’s cognitive capacity. In this paper we show how exploratory data analysis and machine learning, in particular topic modelling, can assist the operator when monitoring network performance and identifying anomalous network behaviour as well as supporting the operator’s analysis of the anomaly and identification of its root-cause.
Australasian Association for Information and Communication Technology
2020-07-30
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
application/pdf
https://ijicta.org/index.php/ijicta/article/view/48
International Journal of Information, Communication Technology and Applications; Vol. 6 No. 1 (2020)
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/48/37
Copyright (c) 2021 International Journal of Information, Communication Technology and Applications
http://creativecommons.org/licenses/by-nc-nd/4.0
oai:ojs.pkp.sfu.ca:article/51
2022-04-20T04:48:48Z
ijicta:ART
The Use of ICT in Natural Disaster Management in the KABALE District of UGANDA
Guy Gael, Mfuranzima
Mbabazi, Dr. Businge Phelix
Mpora, Dr. Byamukama Eliab
Tamale, Micheal
ICT
use
Natural Disaster
Management
Uganda
Disaster management requires collaboration among geographically distributed public and private organizations to enable a rapid and effective response to an unexpected event. Many disaster management systems often lack the capability to cope with the complexity and uncertainty. In this investigation on the use of ICTs in natural disaster management we discuss the disasters that Kabale has experienced and how ICTs are used in the disaster management processes. The paper concludes that although there are some types of ICTs used, ICT infrastructure is still under-developed in Kabale district. There is a need to increase the level of ICT usage such that natural disaster management can realize its full potential.
Australasian Association for Information and Communication Technology
2021-12-20
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
application/pdf
https://ijicta.org/index.php/ijicta/article/view/51
10.17972/ijicta20217151
International Journal of Information, Communication Technology and Applications; Vol. 7 No. 1 (2021)
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/51/40
Copyright (c) 2022 International Journal of Information, Communication Technology and Applications
https://creativecommons.org/licenses/by-nc-nd/4.0
oai:ojs.pkp.sfu.ca:article/52
2021-12-30T00:39:14Z
ijicta:ART
Multi-HAPS Network Implementation within 3GPP’s NTN framework for 5G and beyond
Anicho, Ogbonnaya
Charlesworth, Philip
Baicher, Gurvinder
Nagar, Atulya
HAPS
NTN
5G
Multi-HAPS
UAS
High Altitude Platform Station (HAPS) is part of the 3GPP defined non-terrestrial network (NTN) infrastructure for 5G networks. Various technical studies by 3GPP have addressed NTN-based implementations and have significantly studied satellite-based scenarios. However, the study does not sufficiently address HAPS or multi-HAPS based scenarios specifically. Though HAPS, is captured under Unmanned Aerial Systems (UAS), it has unique operational realities that set it apart from other NTN platforms. For instance, HAPS come in different variants of fixed-wing, balloons and airships. This paper highlights the need for expanded studies specifically aimed at HAPS for more seamless integration. The work also analyses the Doppler effect associated with fixed-wing HAPS systems to further demonstrate how operational scenarios may differ for these platforms and the need for targeted studies. HAPS is expected to contribute significantly to the NTN-based implementations and may require more specialised considerations within the 3GPP NTN technical specification process, especially for 5G and beyond 5G (B5G) networks.
Australasian Association for Information and Communication Technology
2021-12-30
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
application/pdf
https://ijicta.org/index.php/ijicta/article/view/52
10.17972/ijicta20217152
International Journal of Information, Communication Technology and Applications; Vol. 7 No. 1 (2021); 7-12
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/52/39
Copyright (c) 2021 International Journal of Information, Communication Technology and Applications
https://creativecommons.org/licenses/by-nc-nd/4.0
oai:ojs.pkp.sfu.ca:article/53
2022-04-20T04:55:57Z
ijicta:ART
Cloud Network Data Acquisition Challenges
Lutui, Paula Raymond
Cusack, Brian
Networking
Cloud
Virtualization
Forensics
The challenge and problem for network investigators is that many of the data repositories are now virtualized and Cloud distributed. This paper reviews the extraction of evidence from virtualized RAM in the Cloud context on two virtual machines. Such evidence informs network system fault correction, and attack diagnosis. The contribution of this research is to promote an awareness of valuable evidence held in Cloud virtual machines, where it is located, and the extraction tools kits required. A challenge for network investigators is the variation in distributed network architecture and protocols. There is little consistency in the Cloud environment beyond proprietary dominance of Cloud services, and vendor virtualization provisions. This exploratory research takes up this challenge and demonstrates a working solution to the extraction of data in Cloud distributed networks.
Australasian Association for Information and Communication Technology
2021-12-20
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
application/pdf
https://ijicta.org/index.php/ijicta/article/view/53
10.17972/ijicta20217153
International Journal of Information, Communication Technology and Applications; Vol. 7 No. 1 (2021)
2205-0930
eng
https://ijicta.org/index.php/ijicta/article/view/53/38
Copyright (c) 2022 International Journal of Information, Communication Technology and Applications
https://creativecommons.org/licenses/by-nc-nd/4.0