Forthcoming articles

 


International Journal of Internet Protocol Technology

 

These articles have been peer-reviewed and accepted for publication in IJIPT, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

 

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

 

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

 

Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

 

Register for our alerting service, which notifies you by email when new issues of IJIPT are published online.

 

We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.

 

International Journal of Internet Protocol Technology (13 papers in press)

 

Regular Issues

 

  • Vertical Handover Decision Algorithm in Heterogeneous Wireless Networks   Order a copy of this article
    by Wafa Benaatou 
    Abstract: With the recent progress in the area of cellular communication the issue of inter cells handover without dropping an on-going connection with the base station has arisen. In this paper, the focus is on the performance of vertical handover. Various proposed interconnection architectures for vertical handover in heterogeneous networks were studied. To achieve the aim the vertical handover process between different networks (WLAN, UMTS, WiMAX, LTE and LTE-A) was implemented and simulated. Two different algorithms to make the decision on when and to which network perform a handover were considered. In the first of them the decision is based on the received signal strength (RSS). In the second one a fuzzy logic system that uses RSS, bandwidth, battery power and packet loss as the input parameters is proposed. The simulation results show that the algorithm based on fuzzy logic leads to a reduction of the number of handovers and a minimization of the power consumption as compared to the first algorithm used here and the existing algorithms.
    Keywords: Vertical handover; WLAN; WIMAX; UMTS; LTE; LTE-A; Received signal strength (RSS); Heterogeneous networks; Fuzzy logic; Simulation.

  • Study on Cooperative Emergency Medical Service System and Mobile App Development   Order a copy of this article
    by Pingjia Xie, Yuliang Tang, Le Xu 
    Abstract: Emergency medical treatment is an important component of public health, and its service quality is directly related to peoples health and safety. But in the traditional emergency medical service mode, the relevant departments are relatively isolated and dispersive, which results in vital information cant be shared in real time. This study argues the application architecture and framework of a new Cooperative Emergency Medical Service System (CEMSS). The system enables effective information communication among Emergency Command Center (ECC), ambulances and the hospital dispatching center, and makes doctors in the ambulances with experts of the hospital related departments work in synergy. The mobile app based on Android operating system is developed to promote convenience and flexibility. The proposed system can help doctors shorten the treatment time, improve the service quality and reduce the damage for patients.
    Keywords: Cooperative Emergency Medical Service System; Session Initiation Protocol (SIP); Android.

  • Probability Based Measure to Calculate Reliability of Multi-layer Web Applications   Order a copy of this article
    by Hammad Majeed, Zia Ul Qamar, Raihan Rasool 
    Abstract: Distributed environments like, cloud computing and web services, comprise of multiple layers and interacting components. Each component needs to be reliable and dependable for a smooth functioning of the system. Calculating reliability of a system is a complex problem due to non-standardization of its definition and nonavailability of metrics for computing it. This paper proposes a probabilistic model for calculating reliability of multi- layer architecture based web applications. It is based on Hidden Markov Model and takes user count and events generated by the users as input and calculates the failure probability of an event at browser and server levels. The results show that the proposed model accurately depicts the reliability of the system and identifies the scenarios with high probability of failure. This is particularly useful for the decision makers to develop a reliable web applications.
    Keywords: Reliability; Grid Computing; Cloud Computing; Probabilistic Modeling; Multi-tier architecture; Web 2.0 reliability; Web applications.

  • System Security Model Based on Trusted Access Control under Cloud Computing Environment   Order a copy of this article
    by Fengqi Wang 
    Abstract: It has become a hot spot of cloud security to provide good service for legal user, and prevent access from illegal user or illegal access from legal user. Therefore, it is urgent to design a reasonable access control security model under cloud computing. This paper discusses trust definition and computation in cloud computing environment and uses scientific methods to compute comprehensive trust degree. Then based on RBAC model the conception of trust is introduced to form a trust-based access control model. The security model satisfies the design for access control mechanism in opened system, by establishing indirect user-role distribution relation and context constrain which reflecting context information. The formal definition and access control policies of the model are explained. The scheme can dynamically determine the authorization according to the user's trust value, so it can detect the user's abnormal behavior at any time and respond in a timely manner. The simulations shows this model can effectively help users in cloud service to make choices on security and reliability, and it also shows better dynamic property to prevent abnormal behaviors of the users.
    Keywords: security; access control; trust degree; context; RBAC.

  • Addressing for 6LoWPAN based on multi-hop clusters   Order a copy of this article
    by Xiaonan Wang, Dong Wang 
    Abstract: 6LoWPAN is a multi-hop network, so the address configuration standards commonly used in single-hop IP networks cannot directly be applied in 6LoWPAN. In this situation, some addressing solutions for 6LoWPAN are proposed. Since these solutions employ the stateless strategy such as duplicate address detection (DAD) or the stateful strategy such as a remote server, the addressing cost and latency are relatively high. This paper proposes an addressing scheme based on multi-hop clusters and aims to reduce the total addressing cost and delay. In this scheme, a cluster covers a multi-hop area, so the frequency of a node performing the addressing is lowered and the total addressing cost and delay are reduced. Moreover, a node employs beacons to obtain a unique address from a neighbor without DAD, so the addressing cost and delay are further reduced. This scheme is evaluated, and the data results show that the average addressing success rate is increased and the total addressing cost and delay are reduced.
    Keywords: 6LoWPAN; addressing; cluster; cluster head; cluster member.

  • Broadcasting Algorithm Based on Successful Broadcasting Ratio and Energy Balance of Nodes in Mobile Ad Hoc Networks   Order a copy of this article
    by Yanping Yu, Long Li, Keyan Liu, Yichen Deng, Xue Su 
    Abstract: Blind flooding in mobile ad hoc networks could result in a large number of redundant packets, which causes the broadcast storm problem and broadcast unreliability, leading to overall network performance degradation. In order to mitigate the broadcast storm, improve the broadcasting reliability and prolong the lifetime of networks, we propose a Broadcasting algorithm based on Successful broadcasting Ratio and Energy Balance of nodes (BSREB) in mobile ad hoc networks. In BSREB, each node in the network calculates its own forwarding probability according to its successful broadcasting ratio and its own residual energy. Then, the node retransmits the received packets with the forwarding probability. The usual ways to deal with broadcast problem generally use local topology information, for example, the number of neighbors. However, heavy traffic will aggravate the broadcast problem. Thus, we introduce the successful broadcasting ratio which reflects both local topology and traffic to determine the forwarding probability. To prolong the network lifetime, energy balance strategy is adopted by using residual energy to determine the forwarding probability. Since the forwarding probability of each node is determined by its own successful broadcasting ratio and residual energy, which can be acquired without extra packet exchanging and complex calculation, BSREB is simple and easy to implement. The simulation results show that BSREB can achieve a lower latency and higher reachability. Meanwhile, the BSREB algorithm has a strong adaptability to node mobility.
    Keywords: mobile ad hoc networks; broadcast storm; broadcast unreliability; successful broadcasting ratio; energy balance; forwarding probability.

  • Wireless sensor network node deployment based on multi-objective immune algorithm   Order a copy of this article
    by Shanshan Li 
    Abstract: Wireless sensor network (WSN) is made up of a large number of low-cost wireless sensor nodes, which can collect all types of data in its lifetime. Node deployment of WSN is a NP complete problem, and it can significantly influence the network coverage and energy consumption in WSN. In this paper, we try to exploit multi-objective immune algorithm to solve the node deployment problem in WSN. The proposed node deployment algorithm aims to maximize the degree of network coverage and minimize the energy consumption. In the proposed multi-objective immune algorithm, each antibody refers to a candidate solution in node deployment process, and the antibodies are randomly initialized with a specific range. In addition, we design a fitness function by two ranking modes. Finally, experiments are conducted to test the performance of the proposed algorithm. Experimental results demonstrate that the proposed can both enhance the network coverage degree and reduce the energy consumption by minimizing the moved distance.
    Keywords: Wireless sensor network; Node deployment algorithm; Multi-objective immune algorithm; Network coverage; Energy consumption.

  • An Improved Routing Algorithm in Communication Network Based on Cloud Computing Technology   Order a copy of this article
    by Shuaiqiu Xiang, Dongsheng Cheng, Zhenjia Zhu 
    Abstract: Traditional communication network routing algorithm mostly takes the distance between the nodes as the weight coefficient, completing the routing selection based on the shortest distance between the source node and the target node without considering the problem of energy consumption between nodes. This algorithm is not suitable for communication network. This paper proposed a research of communication network routing algorithm based on cloud computing technology. Our research designed cloud computing platform which applies to big data through the introduction of different types of routing protocols. The optimal routing selection of communication network and node energy balanced load provided the data storage and computing environment. In the route optimization stage, this research used pheromone anycast mechanism for selecting route on the basis of the importance of heuristic factor on the path and the residual pheromone, avoiding the algorithm fall into local optimum. Taking the energy consumption of nodes as weight for the routing updates and adjustment in nodes-cluster, we controlled the energy consumption of inter-nodes at the optimal level. Simulation results show that the proposed communication network routing algorithm has low average error rate of network data, high link reliability and good energy saving effect.
    Keywords: Cloud computing technology; Communication network; Routing algorithm.

  • Research on Mobile Internet Big Data Detecting Method for the Redundant Data   Order a copy of this article
    by Guanghua Yu 
    Abstract: To address the low efficiency of the traditional cleaning method, this paper presents a bulid path tree clean method based on split method for identification of the redundant data, Through the traditional mobile Internet big data cleaning process for identifying the redundant data is analyzed, by using median filtering algorithm, the features of redundant data are extracted. Redundant data is classified by support vector machine (SVM), and the redundant data is identified by self-organizing feature map. Based on this, the redundant data identification model is built, which can clean the redundant data in mobile internet big data. Comparing with the classical methods, the simulation results show that the improved method is effective for the redundant data clean.
    Keywords: Mobile Internet; Big Data; Redundant Data; Detection; Cleaning Methods; Optimization.

  • Research and Realization of Similar Information High Precision Purification and Mining Technology   Order a copy of this article
    by Ruiling Zhou 
    Abstract: Similar information purification and mining methods in the past are generally of low precision and weak usability. Therefore, we propose a method to dynamically update time series, that is, a similar information high precision purification and mining method based on time series updating. The method is used to implement regional linear time similar information time series by using rise analysis and linear regression analysis. Extreme value standardization method is used to collate linear region so that the data in time series can be compared in parallel and the description of similar information feature is realized. Vertically align the two head-ends of time series to be purified; high precision purification is achieved by calculating the similarity of characteristics similarity displacement representation between two segments of similar information. Experimental verification shows that compared with previous methods, the recall value is the highest among different methods for 5 data set, and the time cost of the proposed method is shorter than other methods. It was believed that .purification and mining performance of the proposed method is stronger with shorter time cost.
    Keywords: Similar information purification; Mining; Time series; Linear regression analysis; Extreme value standardization.

  • Security Access Control Policy of Information System under Multi-domain Mode   Order a copy of this article
    by Jun Dong 
    Abstract: The research of this article is ensuring the security implementation of multi-domain secure access control behavior, through the study on unified description language for security policy, strategy conflict classification and strategy conflict detection. Based on current related technologies and combined with the feature of multi-domain system, the framework of access control strategy management is proposed, which specified the content of access control management. We adopt XACML that has better across-platform and scalability to describe the policy uniformly. Then access control policy description template based on XACML is provided and the security policy conflict is classified reasonably according to the factors causing conflict. Then we put forward a model to detect the inconsistency of RBAC and RH in time and space constraint, to design an access control model which needs pruning and collection. It uses logic analysis to strength the conflict detection for developing security policy integration. The simulation shows our work can provide filter on quantities of irrelevant policy and return potential policies to solute the conflict.
    Keywords: access control; multi-domain; XACML; conflict detection; inconsistency; RBAC.

  • An Improved Hybrid Genetic Algorithm for Multi-User Scheduling in 5G Wireless Networks   Order a copy of this article
    by Mohamed Saad 
    Abstract: Motivated by the importance of allowing simultaneous user transmissions, especially in fifth-generation (5G) systems, this papers addresses the problem of maximizing the number of links that can be activated simultaneously in a wireless network. Solving this problem under the physical signal-to-noise-plus-interference (SINR) model has been demonstrated to be NP-hard. Most previous studies focused on approximation algorithms with guaranteed performance ratios. Although such algorithms have tremendous theoretical value, their surprisingly low approximation ratios limit their practicality. Therefore, some recent studies introduced alternative solutions based on meta-heuristics, such as the genetic algorithm. This paper improves upon a previously proposed genetic algorithm by incorporating problem-specific knowledge into the algorithm. This results in a novel hybrid genetic algorithm that activates almost the same number of links as compared to the original one, while reducing the running time by more than 97%.
    Keywords: Link scheduling; wireless network capacity; hybrid genetic algorithms.

  • Extended Common Information Model for Distribution Network Production Repair Platform   Order a copy of this article
    by Jun Ma, Hua Leng, Jiran Zhu, Haiguo Tang 
    Abstract: In order to optimize the process of fault repairs for distribution network, it is necessary to realize standardization and integration of information for different IT systems in DMS (Distribution Management System) through CIM (Common Information Model) . According to the demand of information integration for fault repairs in distribution network, the paper puts forward CIM extensions for feeder model, assert model, fault handling model etc. in compliance with IEC61968. The proposed CIMs have been used for the information integration between the DNPRP (Distribution Network Production Repair Platform) and other IT systems. And it is illustrated how to use the integration platform based on CIM to carry out the repair business and improve the quality and efficiency of the distribution network repair. Practical applications of these extension CIMs show that the extension CIMs are reliable, efficient and convenient to exchange information.
    Keywords: Common information model; IEC61970/61968; information integration; Distribution Network Production Repair Platform.