Forthcoming articles

International Journal of Autonomous and Adaptive Communications Systems

International Journal of Autonomous and Adaptive Communications Systems (IJAACS)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Autonomous and Adaptive Communications Systems (10 papers in press)

Regular Issues

  • Design and implementation of A CATV Network Management System based on a General-Purpose Agent   Order a copy of this article
    by Wenbo Zhang, Nan Bai, Guangjie Han, Yongxin Feng 
    Abstract: Many cable television (CATV) devices, which cannot be feasibly monitored using a simple network management protocol, are used in CATV networks. It is difficult to remotely monitor these devices online because different protocols are used in different devices. In this paper, we design and implement a general-purpose network management agent that can communicate efficiently with different devices. Furthermore, data obtained from devices can be transmitted effectively to users. The simulation results show that this general-purpose agent can effectively respond to user requests, such as configuration requests and search requests. Moreover, the agent can maintain steady, stable device performance parameters while supporting concurrent multi-user operation.
    Keywords: CATV Network; Network Management Agent; General-purpose Agent.

  • Design of an Autonomic Communication System   Order a copy of this article
    by Jose Aguilar, Kristell Aguilar, José Torres 
    Abstract: In modern communication systems, it is necessary to develop new approaches to optimize them. To achieve this objective, new paradigms are necessary. The present work proposes the conception of an autonomic communication system, which is based on a Bayesian network and on an ontology, to take reconfiguration decisions in the system. The ontology provides the knowledge about the performance factors and their relationships in the communication networks, to configure the structure of the Bayesian network. The Bayesian network is the stochastic reasoning mechanism used by the decision-making system. We present several tests on the NS2 simulator, and we observe an improvement in the system performance, for scenarios with high reconfiguration requirements.
    Keywords: autonomic communication system; autonomous systems; Bayesian network; ontology.

  • Performance of $L$-SC Receiver over Generalized $K$-fading Channels   Order a copy of this article
    by Pampee Das, Rupaban Subadar 
    Abstract: Fading is a phenomenon which is highly degrading the quality of the wireless signal. Shadowing is also an event due to which the receive quality of the signal degrades considerably even if the receiver is closed to the transmitter. Both this phenomena is happening together in a wireless environment. However, very little work has carried out to analyze the joint effect of these two phenomena. The KG fading model describes accurately composite multipath/shadowing fading channels and the analytical results are highly matching with the experimentally obtained results due to more accurate statistical modeling of the channels. Analysis of selection combining (SC) diversity receiver has been presented in this paper considering an arbitrary number of diversity branches. The receiver performance have been studied based on the numerical evaluation of the obtained expressions of average bit error rate and ergodic capacity. The presented analysis will assist the design people to optimize their system in an environment where both fading and shadowing effect is prominent.
    Keywords: Fading/Shadowing channels; $K_G$ fading channels; SC receiver; ABER; Channel capacity.

  • Computing modes-based task processing for Industrial Internet of Things   Order a copy of this article
    by Juan Wang, Di Li 
    Abstract: The Industrial Internet of Things (IIoT) is facing enormous challenges, including limited computing resources and network bandwidth and high energy consumption. To facilitate the realization of IIoT-enabled manufacturing, several problems concerning computing modes and interaction patterns among fog nodes and the cloud should be clarified: what the typical computing modes are; what their advantages and drawbacks are; and how the tasks are calculated in different computing modes. The above-listed problems are the focus of this paper. Four computing modes are listed accordingly, namely, local computing, remote computing, cloud computing and fog computing. The system model is established for each kind of computing mode, and the models for delay and energy consumption are formulated. A task processing experiment platform is set up in simulation software. The experimental results show that compared with other computing modes, fog computing exhibits better performance in terms of delay and energy consumption.
    Keywords: Industrial Internet of Things (IIoT); task processing; cloud computing; fog computing.

  • Research and Realization of Realtime Ethernet Protocol for Networked Motion Control System   Order a copy of this article
    by Shouting Feng, Zhongshuo Zhuo, Daru Pan 
    Abstract: In PC-based motion control system, networking is the trend. Since the host is running a non-real-time operating system, the existing real-time Ethernet protocol cannot be implemented directly on the host. Existing control cards typically use non-real-time Ethernet protocols, such as TCP/IP, making it difficult to achieve multi-axis synchronization between control cards. A practical scheme is proposed in this paper to solve this problem. In this scheme, the internal clocks of control cards are adjusted to the same value by the sync frames periodically sent by the host, so that in effect all axes seem to be driven by the same clock. The jitter of the sync frame has very little impact on the consistency of the clocks of all control cards. This alleviates the real-time performance requirements of the host, and thus reduces the cost and design difficulty. In addition, all synchronous or asynchronous frames are unified into a cluster frame model, which simplifies the processing of the frames to fly-read or fly-write, making it easy to implement in hardware such as FPGAs. This real-time Ethernet protocol has been implemented in a large-scale motion control chip. And the test results showed that this scheme achieves expected performance, and the shorter the period of the sync frames, the higher the accuracy of synchronization motion control.
    Keywords: Real-Time; Ethernet; protocol; synchronization; Motion Control; CNC.

  • A Novel Zero Knowledge Proof of Retrievability   Order a copy of this article
    by Dexin Yang, Liming Liu 
    Abstract: Proof of retrievability is a cryptographic tool which interacts between the data user and the server,and the server proves to the data user the integrity of data which he will download.It is a crucial problem in outsourcing storage such as cloud computing. In this paper,a novel scheme called the zero knowledge proof of retrievability is proposed,which combines proof of retrievability and zero knowledge proof.It has lower computation and communication complexity and higher security than the previous schemes.
    Keywords: Outsourced Storage;Zero Knowledge Proof;Proof of Retrievability;Cloud Computing.

  • SDN Replaced Deployment and Real-Time QoS Provisioning Based on Network Models   Order a copy of this article
    by Junhua Zhang 
    Abstract: From industrial communications to real-time internet applications, end-to-end delay guarantee is one of the most important aspects of quality of service (QoS). As a new networking paradigm, software-defined networking (SDN) exposes an opportunity to provide this guarantee. In exploiting SDN, We can replace the legacy network devices to SDN Forwarding Units (SDN-FUs) gradually. This paper focuses on the SDN replaced deployment problem, striving for providing real-time QoS provisioning in a network meanwhile. Utilizing previous works originated from network calculus, we first propose the candidate nodes selection methods for upgrading legacy nodes to SDN-FUs, and then present a routing algorithm located on SDN Controller to direct the running of SDN-FUs. Via a simulation about a small network, we show that the delay of a flow passing through a network can reduce significantly with the usage of SDN.
    Keywords: quality of service (QoS); software-defined networking (SDN); network models; network calculus; real-time.

  • Fault-Resilient and QoS Centric Dynamic Network Sensitive Routing Protocol for Mobile-WSNs   Order a copy of this article
    by GANESH DR, KIRAN KUMARI PATIL, SURESH L 
    Abstract: The exponential rise in the demand of wireless communication has revitalized academia-industry to achieve more efficient networking solution. To meet these demands Wireless Sensor Networks (WSNs) have always been the dominating solution, however static node and network characteristics confine its suitability for applications under dynamic topology. Strengthening WSN with fault-resilient route decision by exploiting dynamic network parameters such as current congestion probability, buffer availability, and packet injection rate can ensure reliable and Quality of Service (QoS) communication over WSNs under dynamic network topology. With this motivation, in this paper multiple network parameters based Fault-resilient and QoS centric Dynamic Network Sensitive Routing Protocol (FQ-DNSRP) is developed. FQ-DNSRP exploits network parameters at the different layers of the IEEE 802.15.4 protocol stack, i.e., Application Layer, Network Layer, MAC Layer, and PHY Layer to derive a Node Rank Matrix that helps in identifying best forwarding node for deadline sensitive and reliable data transmission. Some of the key novelties are service differentiation based data prioritization and resource allocation, pro-active node management, congestion awareness, dynamic link quality estimation, packet injection ratio estimation, deadline sensitive data prioritization, and physical switching that cumulatively ensures fault-resilient and QoS delivery over WSN. Simulation results revealed that the proposed FQ-DNSRP model exhibits satisfactory performance for real time data delivery over mobile-WSNs that can be significant for numerous applications, including IoT ecosystems.
    Keywords: Mobile-Wireless Sensor Network; Fault-resilient routing; Quality of Service; Network Aware Routing Protocol; Mission Critical Communication.

  • Adaptive embedded systems: a systematic review   Order a copy of this article
    by Fateh Boutekkouk 
    Abstract: Adaptive Embedded Systems (AES) are embedded systems whose behavior and architecture are adjusted in run time to fulfill changing requirements. Despite the huge effort furnished by researchers to develop design methodologies and their associated tools for AES, we can easily observe that none of the existing approaches provides a complete development process covering all development phases and supporting traceability between their produced artifacts. Furthermore, most existing tools are not interoperable. Thus, a standard or at least a domain-specific methodology will be needed for an effective cost/delay design of AES. In this paper, we review AES modeling techniques and design methodologies. At the end of the paper, we will illustrate the main challenges confronted by AES design and some future perspectives.
    Keywords: Adaptive embedded systems; control theory; bio-inspired approaches; agent; Model-based design.

  • SAMA: A Secure and Anonymous Mutual Authentication With Conditional Identity-Tracking Scheme in a Unified Car Sharing System   Order a copy of this article
    by Oladayo Olakanmi 
    Abstract: Development of an efficient anonymous authentication scheme for an effective car sharing system is not new, however, to developrna single key based authentication scheme for interservice in a unified cars sharing is a challenging issue. Although some existingrnschemes are capable of providing secure authentication in vehicular ad hoc network but majority of them are network-specific orrnprovider-specific with high computational latency incurred from their signatures and certificates verification processes. Apart fromrnthis, some of them could not guarantee confidentiality and integrity through a single private key, thus creating overheads throughrndifferent keys generation and storage.rnIn this paper, an effective anonymous authentication scheme, which is capable of detecting and preventing malicious entity fromrndisrupting the operations of the car sharing system is proposed. The scheme also provides a conditional identity-tracing approachrnto track and expose a malicious entity by revoking the privacy of the misbehaving entity. The scheme allows interoperations amongrnthe different car sharing service providers by allowing registered users of any provider to share cars of other providers aside fromrnthe one registered with. This enriches service provision for users.rnThe scheme is implemented and analysed, the experimental and analysis results show that our scheme is not only secure but alsornwith low computational latency.
    Keywords: Taxi-call System; Car sharing; Autonomous Vehicle; authentication; privacy preservation.