Forthcoming and Online First Articles

International Journal of Ad Hoc and Ubiquitous Computing

International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Ad Hoc and Ubiquitous Computing (10 papers in press)

Regular Issues

  • Spectrum Sensing with Energy Harvesting From a Water Flow   Order a copy of this article
    by Faisal Alanazi 
    Abstract: In this paper, we derive the Detection Probability (DP) of spectrum sensing using the energy detector when Primary User (PU) harvests power from a water flow PU signal is received at a Secondary User (SU) where spectrum sensing is performed We also derive a lower bound of the DP when PU harvests power from a water flow The harvested power is proportional to the power of three of water speed being modeled by a Gaussian random variable and depends also on water density, plate length and width We show that the DP improves as the number of symbols K used in spectrum sensing increases We also study the effect of false alarm probability As the harvesting time increases as the harvested energy at PU increases and the DP decreases The study is extended when there are L relays harvesting power from a water flow.
    Keywords: Spectrum sensing; relays; Energy harvesting; ICRN Rayleigh and Nakagami channels.
    DOI: 10.1504/IJAHUC.2023.10061826
     
  • Throughput Enhancement of NOMA Systems with Energy harvesting   Order a copy of this article
    by Nadhir Ben Halima, Sajid M. Sheikh 
    Abstract: This paper propose an optimal energy harvesting time, users pairing and resource allocation (OHUPRA) for non-orthogonal multiple access (NOMA). The base station (BS) harvests power from the radio frequency (RF) signal of node A over F seconds where 0 < <1 is the harvesting time and F is frame duration. Then, it transmits data to KL users over L bands during (1 )F seconds where transmission to the ith set of K users is performed using NOMA on the ith band. We optimise , the set of NOMA users (users pairing) and the allocated NOMA powers. The performance of OHUPRA is compared to NOMA, NOMA with optimal harvesting time (NOMA OH), NOMA with optimal user pairing and resource allocation (OUPRA). OHUPRA offers up to 12 dB, 16 dB and 20 dB versus OUPRA, NOMA OH and NOMA. The main contribution and innovation of this paper are to optimise harvesting time, users pairing and resource allocation to maximise the throughput.
    Keywords: NOMA; Energy harvesting; Rayleigh channels; OHUPRA; power allocation.
    DOI: 10.1504/IJAHUC.2023.10062155
     
  • Analysis of Mean Delay in Small Cell Networks with Dynamic Traffic and FIFO scheduling   Order a copy of this article
    by Ying Wang, Angran Liu, Yiyang Ni, Yingjie Hong, Lin Chen 
    Abstract: Different network applications may have different delay requirements. How to evaluate the delay performance numerically is important for network design. Although the delay performances of random scheduling (RS) and round robin (RR) are known in literature. The accurate delay expression of first-input first-output (FIFO) scheduling remains to be discovered. In this paper, by combining stochastic geometry and queueing theory, we derive the accurate and tractable mean delay expression for FIFO, which accounts for the impact of random traffic arrivals and queuing interactions. The coupling relation between the success transmission probability and the network active probability is captured. Based on this, we further derive the mean packet delay of the whole network. The simulation verifies the accuracy of the analytical expressions. We find that for light traffic, it is best to choose FIFO from the delay aspect, and for heavy traffic, choosing RR is best. We also obtain the critical packet arrival rate for different scheduling selections.
    Keywords: first-input first-output; FIFO; delay performance; scheduling scheme; stochastic geometry; queueing theory.
    DOI: 10.1504/IJAHUC.2023.10062162
     
  • Certificateless Searchable Attribute Based Encryption Approach for Cloud Data Based on Blockchain   Order a copy of this article
    by Monisha Privthy Jeba J, Vivekrabinson K, B. Shanmuga Raja, N. Sundareswaran, M. Vijay 
    Abstract: Searchable encryption is a method which permits cloud servers to recover consumers’ requested data even when the contents are encrypted. However, many current searchable encryption algorithms only offer single keyword recovery and are subject to keyword guessing attacks. This work presents a blockchain-based multi-keyword searchable encryption technique based on a certificateless approach. Further, we employ attribute-based encryption to protect sensitive information and a certificateless cryptosystem to encode keywords. The encrypted files are uploaded to the cloud, whereas the encoded keyword indexes are kept on the blockchain, assuring the encrypted indexes’ tamper resistance. Our approach also supports multi-keyword search over encrypted data. We created a fair payment smart contract to support the exchange of service costs with the owner of the information and the cloud service provider in the event of successful search results. The study reveals that our technique outperforms other related techniques in terms of computing efficiency.
    Keywords: blockchain; certificateless; cryptography; multi-keyword; searchable encryption.
    DOI: 10.1504/IJAHUC.2023.10062227
     
  • Adolescent Identity Search Algorithm with Video-Based Activity Classification using Hierarchical Auto- Associative Polynomial Convolutional Neural Network optimised   Order a copy of this article
    by Kaavya Kanagaraj, Shiju George, Asha Joseph, Sushanth H. Gowda 
    Abstract: In this manuscript, video-based Activity Classification using Hierarchical Auto-associative Polynomial Convolutional Neural Network Optimized with Adolescent Identity Search Algorithm is proposed (V-AC-HA-APCNN). Initially, the input action data are taken from Weizmann Action Data set. The input data is pre-processed with the help of trilateral filter. Then these pre-processed data are given to Force-Invariant Improved Feature extraction (FII-FE) approaches for extracting the necessary features of the video data. These extracted features are given to Hierarchical Auto-associative Polynomial Convolutional Neural Network (HA-APCNN) for classifying the human activities such as walk, run, bend, skip. Adolescent Identity Search Algorithm (AISA) is considered to enhance the HA-APCNN weight parameters. The performance of the proposed V-AC-HA-APCNN approach attains 32.3%, 56.6%, 65.5% higher accuracy, 34.4%, 43.2%, 32.1% higher ROC compared with existing methods. The intention of this paper is to examine the deep learning methods for the classifications of video-based anomalous activity and focused on anomaly classification.
    Keywords: Weizmann Action Dataset; trilateral filter; Force-Invariant Improved Feature extraction; Hierarchical Auto-associative Polynomial Convolutional Neural Network; Adolescent Identity Search Algorithm.
    DOI: 10.1504/IJAHUC.2024.10062932
     
  • Decentralised Ontology Based Access Control in Internet of Things using Social Context   Order a copy of this article
    by Surendra Tyagi, Devesh C. Jinwala, Subhasis Bhattacharjee 
    Abstract: In internet of things (IoT), the context awareness in resolving the access control aids to finer resolution in deciding whether to grant access or not. In this paper, our focus is on the context aware access control for IoT devices; specifically on decentralised access control mechanism. We are taking the smart home as a use case for this application. However, the mechanism to implement a context aware access control requires the information about the context of the subjects in such an application. This information can best be shared using the ontologies. Motivated by the same, we propose here an ontology for decentralised context aware access control for smart home. To the best of our knowledge, this is a unique attempt to propose the design of an ontology for decentralised context-aware access control in the loT. We validate our proposed design by simulation using Protege.
    Keywords: internet of things; IoT; social-context; context-aware; access control; ontology; decentralised.
    DOI: 10.1504/IJAHUC.2024.10063002
     
  • Privacy-preserving double auction for resource allocation in satellite MEC   Order a copy of this article
    by Chuanling Chen, Lu Li 
    Abstract: Mobile edge computing (MEC) can deploy applications at the edge of the network in real-time and adapt to diverse service scenarios. In recent years, resource allocation auction in MEC has received widespread attention. Most studies only focus on improving computational efficiency and social welfare, but they neglect the potential security and privacy breaches in resource allocation auctions, which may have a great impact on the authenticity of auction results. In this paper, by combining garbled circuit and homomorphic encryption, we propose a privacy-preserving double auction for resource allocation (PDARA) in satellite MEC, which uses dynamic programming and monotone FPTAS (MFPTAS) algorithm for resource allocation. We propose secure subroutines secure division and oblivious selection, which can serve as building blocks for other applications. Then, we theoretically analysed the complexity and effectiveness of the system and demonstrated that our system is sufficiently secure in a semi-honest adversary model. Finally, evaluate the performance of our system through a quantity of simulation experiments.
    Keywords: privacy-preserving; double auction; resource allocation; garbled circuits; secure two-party computation; mobile edge computing; MEC.
    DOI: 10.1504/IJAHUC.2023.10062502
     
  • Impact: a mission-driven, human-centric, super-smart service orchestration scheme for Society 5.0 and Industry 4.0 application execution over CPSS enhanced 6G networks   Order a copy of this article
    by Mahfuzulhoq Chowdhury 
    Abstract: To ensure better living for humans through different collaborative systems/services, a human-centred Society 5.0 has emerged. Society 5.0 can balance economic and social sustainability via the high integration of cyber-physical-social systems (CPSS). The literary works on CPSS-based task execution did not examine a suitable mission-driven/super-smart service orchestration strategy by taking both Society 5.0 and Industry 4.0 tasks, multi-task to resource mapping, task impact, appropriate worker and communication resource selection with minimum delivery delay, energy, financial expense, and service requirements, into account. To master the challenges, this paper presents a task impact-based service orchestration scheme that selects appropriate resources for Society 5.0 task execution over a CPSS-enhanced network by examining distinguished tasks, resources, requirements, and minimum latencies. The simulation outcome ensures that up to 44.32% service delivery delay and 39.79% social welfare gain are obtained in the proposed impact-based scheme over existing schemes.
    Keywords: cyber-physical-social systems; CPSS; Society 5.0; Industry 4.0; resource scheduling; mobile edge computing; MEC; metaverse; digital twin; 6G; blockchain; effective throughput; energy expense; financial expense; service delivery delay.
    DOI: 10.1504/IJAHUC.2023.10059943
     
  • FC-CACPHS: fog-cloud assisted context-aware framework for cyber-physical healthcare system   Order a copy of this article
    by Prabal Verma, Aditya Gupta, Ramraj Dangi, Gaurav Choudhary, Nicola Dragoni, Ilsun You 
    Abstract: The advancements in cyber-physical systems (CPS) have brought significant changes to the healthcare industry, especially in the exchange of information. Medical CPS integrates smart data collection devices with cyberspace components for data analytics and decision making. However, this integration poses challenges such as event location, computation overhead, and ubiquitous access. To address these challenges, a scalable, context-aware multilayered MCPS framework based on the fog-cloud paradigm is proposed. The proposed naïve Bayes classifier is experimented with in simulated settings. The results of the naïve Bayes classification component are also compared with the results obtained using several state-of-the-art classification algorithms namely artificial neural networks (ANN), decision trees (DT), and k-nearest neighbour (k-NN). The results reveal that the naïve Bayes classifier outperforms other classification algorithms with the resulting accuracy of 96.7% and specificity, sensitivity, and f-measure of 97.5%, 95.6, %, and 92.86% respectively. The results show that it performs better than these algorithms on typical benchmark datasets.
    Keywords: medical cyber-physical systems; internet of things; IoT; principal component analysis; PCA; fog computing.
    DOI: 10.1504/IJAHUC.2023.10060647
     
  • An electromagnetic bandgap structure assisted MIMO antenna with an optimisation driven hybrid beam forming model   Order a copy of this article
    by Minal K. Pawar, Suhas S. Patil 
    Abstract: This article brings a novel antenna design capability to produce high beam-forming with low mutual coupling (MC) by maximising bandwidth for 5G technology. The proposed antenna is designed with an 'a' shaped 4-port MIMO having a square-shaped patch above the substrate. This research proposes a novel enhanced social ski-driver algorithm with a linear searching-analog phase alignment (ESSDA-LSAPA) method for optimising the beam-forming angles and phases. The outcome obtained from previous optimised angle and beam forming phases is inputted into the proposed HFSS software. Finally, an optimised beam angle and phases are obtained from the proposed 4-port MIMO antenna. The radiation efficiency obtained by the proposed antenna design is about 94%. Furthermore, the proposed antenna design obtains the return loss (< -10 dB), the gain of 9.4 dB, envelope correlation coefficient (ECC < 0.5), total active reflection coefficient (TARC< -10 dB), diversity gain (DG > 9.9 dB), channel capacity loss (CLL < 0.4) and mean effective gain (MEG < -3 dB) at 31 GHz.
    Keywords: multiple input multiple outputs; 5G applications; enhanced social ski-driver algorithm; linear searching-analog phase alignment; split-ring-resonators; SRR; electromagnetic bandgap structure.
    DOI: 10.1504/IJAHUC.2024.10062506