Forthcoming articles

 


International Journal of Autonomous and Adaptive Communications Systems

 

These articles have been peer-reviewed and accepted for publication in IJAACS, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

 

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

 

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

 

Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

 

Register for our alerting service, which notifies you by email when new issues of IJAACS are published online.

 

We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.

 

International Journal of Autonomous and Adaptive Communications Systems (14 papers in press)

 

Regular Issues

 

  • AMBAS: an autonomous multimodal biometric authentication system   Order a copy of this article
    by Abdeljebar Mansour, Mohamed Sadik, Essaid Sabir, Mostafa Jebbar 
    Abstract: The traditional authentication techniques based on single factors such as passwords and tokens suffer from problems related to their robustness. Moreover, multi-factor authentication based on multimodal biometrics (MFA-MB) technique is used to overcome the drawbacks related to these techniques and also the problems related to the biometrics using single traits. Based on MFA-MB, this paper aims to model and develop an autonomous multimodal biometric authentication system called AMBAS using discrete-time Markov chains in order to decrease the complexity of the multimodal biometric system used in the MFA-MB scheme. In fact, giving the self-control to the AMBAS will improve therefore one user experience and achieve as well good performances in terms of authentication time. This system aims to identify users according to four different methodologies. While giving a case study with three-modal biometrics, we exhibit the performed algorithms. A simulation is done in order to test the system performances and usefulness.
    Keywords: multi-factor authentication; multimodal biometric authentication; MBA; multimodal biometrics; discrete-time Markov chains; DTMCs; autonomous systems; user experience; computer security.

  • A monitoring based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication   Order a copy of this article
    by Raul A. Fuentes-Samaniego, Vinh Hoa LA, Ana R. Cavalli, Juan A. Nolazco-Flores, Raul V. Ramirez-Velarde 
    Abstract: In this paper, we present a monitoring based approach for securing upper layer communications of WSN (Wireless Sensor Networks), the latter using IEEE802.15.4/6LoWPAN stacks and tinyDTLS. The monitoring techniques have been integrated as an extension to the industrial tool MMT (Montimage Monitoring Tool). The MMT-extension verifies that the network is working following a set of security rules that have been defined by ETSI. The security rules check if the protocol stack is working properly. If MMT detects a security rule that was not respected, then it sends an alarm to the system manager so that he can take properly reactive adjustments. We tested each of the security rules in MMT's extension using point-to-point configuration. After all these tests were verified, we tested our MMT-extension using real data gathered from the FIT IoT-LAB platform. The results of these tests shown that our MMT's extension for WSN using IEEE-802.15.4/6LowPAN and DTLS communication is feasible.
    Keywords: WSN; IoT; Security monitoring; Monitoring Tools; Intrusion Detection; 6LoWPAN.

  • Achieving a Balanced Optimization Between Network Lifetime and Data Delivery Latency in Multihop Wireless Sensor Networks   Order a copy of this article
    by Ravi Babu, Udaya Kumar K. Shenoy, Kiran Kumari Patil 
    Abstract: Data gathering using mobile sinks is considered one of the efficient and cost-effective strategies to mitigate the hotspot problem in wireless sensor networks (WSNs). Although sink mobility is beneficial in many ways, these benefits are not without its new challenges. A major concern is achieving a good balance between sensors energy consumption and message delivery latency. The unique characteristics and requirements of wireless sensor networks make this task a significant challenge. Another major challenge is coping with the changing topology caused by the sink mobility. The sensor nodes are required to maintain fresh routes toward the latest sink location for efficient data delivery. This paper proposes data gathering schemes to address these two major issues in WSNs by using a virtual overlay structure built over the existing physical network. Simulation results reveal a reduced route reconstruction cost, and a good trade-off between network lifetime and data delivery latency.
    Keywords: data gathering; message delivery; data delivery latency; energy-delay optimization; mobile sink; multihop communication; network lifetime; virtual overlay; wireless sensor networks;.

  • TEPaaS: Test Execution Platform as-a-Service: Applied in The Context of e-Health   Order a copy of this article
    by Mariam Lahami 
    Abstract: Runtime testing of large scale systems running in dynamic and distributed environments is a costly and a resource consuming task. With the aim of handling such runtime validation activity in a cost effective manner, we introduce in this paper a scalable test execution platform deployed on the cloud, called TEPaaS (Test Execution Platform as-a-Service). The latter offers various testing capabilities provided as services like automatic test component deployment, test execution and test evaluation. A proof-of-concept prototype is developed and deployed on the Google Cloud Platform and also evaluated through several experiments. Based on this prototype, we validate an e-health case study implemented using Web service technology and also deployed on the cloud.
    Keywords: Distributed testing; Service-based systems; Cloud testing; Testing as-a-service; e-Health.

  • Design and implementation of A CATV Network Management System based on a General-Purpose Agent   Order a copy of this article
    by Wenbo Zhang, Nan Bai, Guangjie Han, Yongxin Feng 
    Abstract: Many cable television (CATV) devices, which cannot be feasibly monitored using a simple network management protocol, are used in CATV networks. It is difficult to remotely monitor these devices online because different protocols are used in different devices. In this paper, we design and implement a general-purpose network management agent that can communicate efficiently with different devices. Furthermore, data obtained from devices can be transmitted effectively to users. The simulation results show that this general-purpose agent can effectively respond to user requests, such as configuration requests and search requests. Moreover, the agent can maintain steady, stable device performance parameters while supporting concurrent multi-user operation.
    Keywords: CATV Network; Network Management Agent; General-purpose Agent.

  • Design of an Autonomic Communication System   Order a copy of this article
    by Jose Aguilar, Kristell Aguilar, José Torres 
    Abstract: In modern communication systems, it is necessary to develop new approaches to optimize them. To achieve this objective, new paradigms are necessary. The present work proposes the conception of an autonomic communication system, which is based on a Bayesian network and on an ontology, to take reconfiguration decisions in the system. The ontology provides the knowledge about the performance factors and their relationships in the communication networks, to configure the structure of the Bayesian network. The Bayesian network is the stochastic reasoning mechanism used by the decision-making system. We present several tests on the NS2 simulator, and we observe an improvement in the system performance, for scenarios with high reconfiguration requirements.
    Keywords: autonomic communication system; autonomous systems; Bayesian network; ontology.

  • Performance of $L$-SC Receiver over Generalized $K$-fading Channels   Order a copy of this article
    by Pampee Das, Rupaban Subadar 
    Abstract: Fading is a phenomenon which is highly degrading the quality of the wireless signal. Shadowing is also an event due to which the receive quality of the signal degrades considerably even if the receiver is closed to the transmitter. Both this phenomena is happening together in a wireless environment. However, very little work has carried out to analyze the joint effect of these two phenomena. The KG fading model describes accurately composite multipath/shadowing fading channels and the analytical results are highly matching with the experimentally obtained results due to more accurate statistical modeling of the channels. Analysis of selection combining (SC) diversity receiver has been presented in this paper considering an arbitrary number of diversity branches. The receiver performance have been studied based on the numerical evaluation of the obtained expressions of average bit error rate and ergodic capacity. The presented analysis will assist the design people to optimize their system in an environment where both fading and shadowing effect is prominent.
    Keywords: Fading/Shadowing channels; $K_G$ fading channels; SC receiver; ABER; Channel capacity.

  • Computing modes-based task processing for Industrial Internet of Things   Order a copy of this article
    by Juan Wang, Di Li 
    Abstract: The Industrial Internet of Things (IIoT) is facing enormous challenges, including limited computing resources and network bandwidth and high energy consumption. To facilitate the realization of IIoT-enabled manufacturing, several problems concerning computing modes and interaction patterns among fog nodes and the cloud should be clarified: what the typical computing modes are; what their advantages and drawbacks are; and how the tasks are calculated in different computing modes. The above-listed problems are the focus of this paper. Four computing modes are listed accordingly, namely, local computing, remote computing, cloud computing and fog computing. The system model is established for each kind of computing mode, and the models for delay and energy consumption are formulated. A task processing experiment platform is set up in simulation software. The experimental results show that compared with other computing modes, fog computing exhibits better performance in terms of delay and energy consumption.
    Keywords: Industrial Internet of Things (IIoT); task processing; cloud computing; fog computing.

  • Research and Realization of Realtime Ethernet Protocol for Networked Motion Control System   Order a copy of this article
    by Shouting Feng, Zhongshuo Zhuo, Daru Pan 
    Abstract: In PC-based motion control system, networking is the trend. Since the host is running a non-real-time operating system, the existing real-time Ethernet protocol cannot be implemented directly on the host. Existing control cards typically use non-real-time Ethernet protocols, such as TCP/IP, making it difficult to achieve multi-axis synchronization between control cards. A practical scheme is proposed in this paper to solve this problem. In this scheme, the internal clocks of control cards are adjusted to the same value by the sync frames periodically sent by the host, so that in effect all axes seem to be driven by the same clock. The jitter of the sync frame has very little impact on the consistency of the clocks of all control cards. This alleviates the real-time performance requirements of the host, and thus reduces the cost and design difficulty. In addition, all synchronous or asynchronous frames are unified into a cluster frame model, which simplifies the processing of the frames to fly-read or fly-write, making it easy to implement in hardware such as FPGAs. This real-time Ethernet protocol has been implemented in a large-scale motion control chip. And the test results showed that this scheme achieves expected performance, and the shorter the period of the sync frames, the higher the accuracy of synchronization motion control.
    Keywords: Real-Time; Ethernet; protocol; synchronization; Motion Control; CNC.

  • A Novel Zero Knowledge Proof of Retrievability   Order a copy of this article
    by Dexin Yang, Liming Liu 
    Abstract: Proof of retrievability is a cryptographic tool which interacts between the data user and the server,and the server proves to the data user the integrity of data which he will download.It is a crucial problem in outsourcing storage such as cloud computing. In this paper,a novel scheme called the zero knowledge proof of retrievability is proposed,which combines proof of retrievability and zero knowledge proof.It has lower computation and communication complexity and higher security than the previous schemes.
    Keywords: Outsourced Storage;Zero Knowledge Proof;Proof of Retrievability;Cloud Computing.

  • Chaotic discrete bat algorithm for capacitated vehicle routing problem   Order a copy of this article
    by Yanguang Cai, Yuanhang Qi, Hao Cai, Helie Huang, Houren Chen 
    Abstract: This paper presents a chaotic discrete bat algorithm for addressing the capacitated vehicle routing problem. The proposed algorithm presents new parameters and operations for the bat algorithm, and uses a penalty function method to address the constraint conditions. The proposed algorithm also introduces a chaotic initialisation for bat populations, and adopts a local search strategy which is combined with a two-opt strategy, insert strategy and exchange strategy to expand the local search space. Experimental results show that: the proposed algorithm is better than alternative algorithms in terms of optimisation capability, robustness and time consumption, and there are significant differences between the proposed algorithm and alternative algorithms.
    Keywords: discrete bat algorithm; chaotic optimisation algorithm; capacitated vehicle routing problem; CVRP; vehicle routing problem.
    DOI: 10.1504/IJAACS.2019.10018408
     
  • A multi-level generic multi-agent architecture for supervision of collective cyber-physical systems   Order a copy of this article
    by Michel Occello, Jean-Paul Jamont, Choukri-Bey Ben-Yelles, Thi Thanh Ha Hoang 
    Abstract: Cyber-physical systems like networked embedded systems or ambient sensors networks are called large-scale artificial complex systems. They are difficult to supervise because of their numerous components in interaction relying upon physical devices, their extension and their openness. A multi-scale organisation can be a solution to make them more accessible. Multi-agent systems (MAS) are well suited for modeling large complex systems, as multi-agent organisational capabilities allow introducing multi-level observation. This paper proposes a multi-level multi-agent mechanism based on recursion for supervision and observation of large-scale artificial complex systems. It is developed as a free framework that is a decentralised application allowing truly physically decentralised MAS to communicate with abstract multi-agent layers. As an illustration, the framework is applied to a wireless sensor network supervision system.
    Keywords: multi-agent system; collective intelligence; multi-level; scalability; collective cyber-physical system; wireless sensor network; monitoring.
    DOI: 10.1504/IJAACS.2019.10018409
     
  • A matching-game-based satisfactory spectrum leasing for cognitive-radio-empowered 5G   Order a copy of this article
    by Sara Handouf, Hamid Bouassam, Essaid Sabir, Mohamed Sadik 
    Abstract: Cognitive radio allows flexible self-organising solution for spectrum scarcity management. It can be used to improve spectrum utilisation while protecting larger range of coexisting users. In this article, we present a new spectrum leasing solution using the matching theory. Based on this Nobel Prize winning framework, a novel distributed scheme, for joint resource management and business side, is built. Yet, we exhibit a new scheme, whereby multiple primary users (PUs) and secondary users (SUs) interact with one another to select their best possible partner optimising their own benefits. To efficiently use available spectrum, each SU seeks to be allocated a channel with sufficient bandwidth and low cost. Numerical investigations illustrate how stable the matching scheme and how it outperforms standard resource allocation. It is also compared with flat rate multiple access scheme via implementing the two schedulers in terms of network size, SUs' QoS demand and bandwidth fee.
    Keywords: 5G networks; cognitive radio; licensed user; unlicensed user; matching game theory; distributed algorithm; multiple access scheme.
    DOI: 10.1504/IJAACS.2019.10018413
     
  • Impulsive noise reduction techniques in power line communication: a survey   Order a copy of this article
    by Samir Laksir, Abdelaali Chaoub, Ahmed Tamtaoui 
    Abstract: Power line communication (PLC) is a technology that permits data transmission using the electrical networks. In the last few years, research in the area of efficient wired home-networking services and smart grid has received a great interest thanks to the already-existing electrical networks and the ubiquitous sockets (outlets). However, the power line channel presents a challenging task and provides drastic medium for multimedia (audio, image and video) transmission. In fact, over the last decades, there has been an intense research in the area of impulsive noise reduction in PLC environments and numerous error-mitigation strategies have been proposed, thus the need for such a broad survey. To this end, this paper presents a comprehensive overview, with major emphasis on identifying strengthens and weaknesses of the state-of-the-art techniques, and discusses some challenges and future research directions thorough consolidation of related works on PLC signal protection strategies against impulsive noise effects.
    Keywords: power line communication; PLC; wired home networking services; smart grid; multimedia transmission; electrical networks; power line channel; impulsive noise reduction; error-mitigation strategies.
    DOI: 10.1504/IJAACS.2019.10018415