Search results

1 – 10 of 137
Article
Publication date: 3 January 2024

Miao Ye, Lin Qiang Huang, Xiao Li Wang, Yong Wang, Qiu Xiang Jiang and Hong Bing Qiu

A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.

Abstract

Purpose

A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.

Design/methodology/approach

First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between the root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to acquire global network state information in real time. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a network traffic state prediction mechanism is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time.

Findings

Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and open shortest path first (OSPF) routing methods.

Originality/value

Message transmission and message synchronization for multicontroller interdomain routing in SDN have long adaptation times and slow convergence speeds, coupled with the shortcomings of traditional interdomain routing methods, such as cumbersome configuration and inflexible acquisition of network state information. These drawbacks make it difficult to obtain global state information about the network, and the optimal routing decision cannot be made in real time, affecting network performance. This paper proposes a cross-domain intelligent SDN routing method based on a proposed MDRL method. First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to realize the real-time acquisition of global network state information. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a prediction mechanism for the network traffic state is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time. Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and OSPF routing methods.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 6 June 2023

Afnan Alkhaldi, Huda Alrashidi, Khawla Alhasan, Ahmad Alsadeeqi and Abdullah Alshami

The purpose of this study is to understand the public value of the government of Kuwait using blockchain technology to develop the capabilities of smart cities.

Abstract

Purpose

The purpose of this study is to understand the public value of the government of Kuwait using blockchain technology to develop the capabilities of smart cities.

Design/methodology/approach

Research was conducted in Kuwait, where the increased use of blockchain technology has been evidenced in both the private and public sectors. A total of seven IT managers were interviewed to gauge their responses to blockchain and its use in Kuwait ministries.

Findings

Blockchain technology offers many benefits for the development of smart cities in Kuwait. This is a statement that received almost mutual agreement amongst all the IT managers interviewed. However, as regards wider acceptance, the majority mentioned that a framework is necessary to better articulate the public value of using blockchain in smart cities in Kuwait.

Originality/value

This paper develops research hypotheses and a framework for articulating the public value of blockchain technology for smart cities in Kuwait.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 24 May 2023

Hadi Hussain, Jun Wen, Renai Jiang, Junaid Waheed, Waheed Ali and Nadeem Akhtar Khan

In light of the shift in focus from information communication technology (ICT) access (access divide) and skills (skills divide) to the tangible impacts of ICT use (impact…

Abstract

Purpose

In light of the shift in focus from information communication technology (ICT) access (access divide) and skills (skills divide) to the tangible impacts of ICT use (impact divide), a growing number of scholars have called for further investigation into the inter-territorial and multi-dimensional aspects of the digital divide in China. This study aims to address these gaps by examining the disparities across 31 provinces, particularly emphasizing the transition from the traditional access and skills divides to the impact divide.

Design/methodology/approach

Multivariate regression analysis extensively investigates the transition from the access and skills divides to the impact divide across 31 provinces. Additionally, ArcGIS software is used to analyze spatial agglomeration and the auto-correlation (Moran-i) and predict mapping patterns in the data corresponding to all three levels of the digital divide.

Findings

According to the study's findings, poverty is a significant factor in the digital divide between different regions in China. The research shows that provinces with advanced administrative systems, such as Guangdong, Shanghai, Beijing, Jiangsu, Shandon and Zhejiang, have high scores on the digital development index (DDI). However, regions with poverty-ridden and rural areas, primarily located in southwest, central and western China, tend to have lower DDI scores.

Originality/value

This study offers a novel contribution to the literature by presenting an innovative conceptual framework that explores the impact divide within China's provinces. The authors also address this lacuna in the literature by developing and testing two dimensions to examine the relationships statistically under a wide range of socioeconomic and ICT indicators.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 25 January 2024

Lin Kang, Jie Wang, Junjie Chen and Di Yang

Since the performance of vehicular users and cellular users (CUE) in Vehicular networks is highly affected by the allocated resources to them. The purpose of this paper is to…

Abstract

Purpose

Since the performance of vehicular users and cellular users (CUE) in Vehicular networks is highly affected by the allocated resources to them. The purpose of this paper is to investigate the resource allocation for vehicular communications when multiple V2V links and a V2I link share spectrum with CUE in uplink communication under different Quality of Service (QoS).

Design/methodology/approach

An optimization model to maximize the V2I capacity is established based on slowly varying large-scale fading channel information. Multiple V2V links are clustered based on sparrow search algorithm (SSA) to reduce interference. Then, a weighted tripartite graph is constructed by jointly optimizing the power of CUE, V2I and V2V clusters. Finally, spectrum resources are allocated based on a weighted 3D matching algorithm.

Findings

The performance of the proposed algorithm is tested. Simulation results show that the proposed algorithm can maximize the channel capacity of V2I while ensuring the reliability of V2V and the quality of service of CUE.

Originality/value

There is a lack of research on resource allocation algorithms of CUE, V2I and multiple V2V in different QoS. To solve the problem, one new resource allocation algorithm is proposed in this paper. Firstly, multiple V2V links are clustered using SSA to reduce interference. Secondly, the power allocation of CUE, V2I and V2V is jointly optimized. Finally, the weighted 3D matching algorithm is used to allocate spectrum resources.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 6 July 2023

Iqra Masroor and Jamshed Aslam Ansari

Compact and wideband antennas are the need of modern wireless systems that preferably work with compact, low-profile and easy-to-install devices that provide a wider coverage of…

Abstract

Purpose

Compact and wideband antennas are the need of modern wireless systems that preferably work with compact, low-profile and easy-to-install devices that provide a wider coverage of operating frequencies. The purpose of this paper is to propose a novel compact and ultrawideband (UWB) microstrip patch antenna intended for high frequency wireless applications.

Design/methodology/approach

A square microstrip patch antenna was initially modeled on finite element method-based electromagnetic simulation tool high frequency structure simulator. It was then loaded with a rectangular slit and Koch snowflake-shaped fractal notches for bandwidth enhancement. The fabricated prototype was tested by using vector network analyzer from Agilent Technologies, N5247A, Santa Clara, California, United States (US).

Findings

The designed Koch fractal patch antenna is highly compact with dimensions of 10 × 10 mm only and possesses UWB characteristics with multiple resonances in the operating band. The −10 dB measured impedance bandwidth was observed to be approximately 13.65 GHz in the frequency range (23.20–36.85 GHz).

Originality/value

Owing to its simple and compact structure, positive and substantial gain values, high radiation efficiency and stable radiation patterns throughout the frequency band of interest, the proposed antenna is a suitable candidate for high frequency wireless applications in the K (18–27 GHz) and Ka (26.5–40 GHz) microwave bands.

Details

Microelectronics International, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1356-5362

Keywords

Article
Publication date: 14 April 2023

Atul Varshney and Vipul Sharma

This paper aims to present the design development and measurement of two aerodynamic slotted X-bands back-to-back planer substrate-integrated rectangular waveguide (SIRWG/SIW) to…

Abstract

Purpose

This paper aims to present the design development and measurement of two aerodynamic slotted X-bands back-to-back planer substrate-integrated rectangular waveguide (SIRWG/SIW) to Microstrip (MS) line transition for satellite and RADAR applications. It facilitates the realization of nonplanar (waveguide-based) circuits into planar form for easy integration with other planar (microstrip) devices, circuits and systems. This paper describes the design of a SIW to microstrip transition. The transition is broadband covering the frequency range of 8–12 GHz. The design and interconnection of microwave components like filters, power dividers, resonators, satellite dishes, sensors, transmitters and transponders are further aided by these transitions. A common planar interconnect is designed with better reflection coefficient/return loss (RL) (S11/S22 ≤ 10 dB), transmission coefficient/insertion loss (IL) (S12/S21: 0–3.0 dB) and ultra-wideband bandwidth on low profile FR-4 substrate for X-band and Ku-band functioning to interconnect modern era MIC/MMIC circuits, components and devices.

Design/methodology/approach

Two series of metal via (6 via/row) have been used so that all surface current and electric field vectors are confined within the metallic via-wall in SIW length. Introduced aerodynamic slots in tapered portions achieve excellent impedance matching and tapered junctions with SIW are mitered for fine tuning to achieve minimum reflections and improved transmissions at X-band center frequency.

Findings

Using this method, the measured IL and RLs are found in concord with simulated results in full X-band (8.22–12.4 GHz). RLC T-equivalent and p-equivalent electrical circuits of the proposed design are presented at the end.

Practical implications

The measurement of the prototype has been carried out by an available low-cost X-band microwave bench and with a Keysight E4416A power meter in the microwave laboratory.

Originality/value

The transition is fabricated on FR-4 substrate with compact size 14 mm × 21.35 mm × 1.6 mm and hence economical with IL lie within limits 0.6–1 dB and RL is lower than −10 dB in bandwidth 7.05–17.10 GHz. Because of such outstanding fractional bandwidth (FBW: 100.5%), the transition could also be useful for Ku-band with IL close to 1.6 dB.

Details

World Journal of Engineering, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 25 July 2022

Sravanthi Chutke, Nandhitha N.M. and Praveen Kumar Lendale

With the advent of technology, a huge amount of data is being transmitted and received through the internet. Large bandwidth and storage are required for the exchange of data and…

Abstract

Purpose

With the advent of technology, a huge amount of data is being transmitted and received through the internet. Large bandwidth and storage are required for the exchange of data and storage, respectively. Hence, compression of the data which is to be transmitted over the channel is unavoidable. The main purpose of the proposed system is to use the bandwidth effectively. The videos are compressed at the transmitter’s end and reconstructed at the receiver’s end. Compression techniques even help for smaller storage requirements.

Design/methodology/approach

The paper proposes a novel compression technique for three-dimensional (3D) videos using a zig-zag 3D discrete cosine transform. The method operates a 3D discrete cosine transform on the videos, followed by a zig-zag scanning process. Finally, to convert the data into a single bit stream for transmission, a run-length encoding technique is used. The videos are reconstructed by using the inverse 3D discrete cosine transform, inverse zig-zag scanning (quantization) and inverse run length coding techniques. The proposed method is simple and reduces the complexity of the convolutional techniques.

Findings

Coding reduction, code word reduction, peak signal to noise ratio (PSNR), mean square error, compression percent and compression ratio values are calculated, and the dominance of the proposed method over the convolutional methods is seen.

Originality/value

With zig-zag quantization and run length encoding using 3D discrete cosine transform for 3D video compression, gives compression up to 90% with a PSNR of 41.98 dB. The proposed method can be used in multimedia applications where bandwidth, storage and data expenses are the major issues.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 16 November 2023

Audrey F. Falk, Martina Jordaan, Sameerah T. Saeed, Madasu Bhaskara Rao and Nour El Houda Chaoui

This program evaluation aimed to investigate the benefits and challenges of an international, intercultural, e-community-engagement experience involving youth and higher education…

Abstract

Purpose

This program evaluation aimed to investigate the benefits and challenges of an international, intercultural, e-community-engagement experience involving youth and higher education students. The authors sought to understand the meaning that participants would make of an international, intercultural, e-community-engagement experience.

Design/methodology/approach

The program evaluation component of this project was qualitative, participatory and action-oriented. It was composed of online reflection sessions with small, international groups of higher education students from Iraq, India, Morocco, South Africa and the USA immediately following each of five interactive exchange sessions with youth from South Africa. It also included one culminating reflection session to which all of the higher education student participants were invited and a written questionnaire that was completed by the youth participants at the conclusion of the project. The reflection sessions were recorded and transcribed. Transcripts and survey data were reviewed for emergent themes.

Findings

Cultural exposure emerged as the primary theme with participants valuing the opportunity to learn about different cultures and to connect with individuals from across the globe.

Research limitations/implications

This program evaluation was not designed as a generalizable study. This pilot initiative provides evidence of the potential value and importance of international, intercultural e-community-engagement experiences for youth and higher education students.

Practical implications

The potential value of technology to build exchange opportunities for young people is immense and largely untapped. International, intercultural e-community-engagement initiatives can be made available to students globally with relatively limited resources. A highly structured and focused plan provides clarity about expectations and requirements for students. A high level of commitment is required by all participants, including the faculty coordinators.

Social implications

Although the project was brief, exposure to numerous countries and cultures allowed participants to challenge their assumptions about different peoples and places in the world. The potential benefits for greater compassion and understanding of communities and cultures in an international context are high.

Originality/value

This program evaluation contributes to and extends the literature on the possibilities and challenges of international e-community-engagement; it demonstrates the potential for e-community-engagement across multiple countries to broaden students' exposure to and interest in global perspectives.

Details

Journal of Applied Research in Higher Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-7003

Keywords

Article
Publication date: 27 September 2021

Sagar Juneja, Rajendra Pratap and Rajnish Sharma

Propagation characteristics of millimeter wave (mmW) frequencies that are being explored for implementing 5G network are quite different from sub 3GHz frequencies in which 4G…

Abstract

Purpose

Propagation characteristics of millimeter wave (mmW) frequencies that are being explored for implementing 5G network are quite different from sub 3GHz frequencies in which 4G network is operating, and hence antenna design for mmW 5G network is going to be significantly different. The purpose of this paper is to bring forth the unique challenges and opportunities of planar antenna design for mmW 5G network.

Design/methodology/approach

A lot of notable contemporary work has been investigated for this study and reported in this paper. A comparison of 4G and 5G technologies has been carried out to understand the difference between the air interface of two technologies that governs the antenna design. Important research gaps found after collating the work already done in the field have been bullet pointed for the use by many researchers working in this direction.

Findings

Several antenna design considerations have been laid out by the authors of this work, and it has been claimed that mmW 5G antenna design must satisfy these design considerations. In addition, prominent research gaps have been identified and thoroughly discussed.

Originality/value

As research in the field of mmW antenna design for 5G applications is still evolving, a lot of work is currently being done in this area. This study can prove to be important in understanding different challenges, opportunities and current state-of-art in the field of mmW planar antenna design for 5G cellular communication.

Details

Circuit World, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0305-6120

Keywords

1 – 10 of 137