scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Interdisciplinary Telecommunications and Networking in 2013"


Journal ArticleDOI
TL;DR: In this paper, the authors present operation scenarios for the deployment of a 4G WiMAX system in a typical sub-Saharan African environment, where a total of 11 base stations have been suggested to provide coverage of -92dBm using 32 sectors 4 transmit 4 receive (4T4R) adaptive Multi-Input Multi-Output (MIMO) antenna configuration within the Accra and Tema municipality.
Abstract: Worldwide Interoperability for Microwave Access (WiMAX) technology has gained growing interest due to its applications and advantages. It is fast emerging as a last-mile problem solution for broadband access technology. This paper presents operation scenarios for the deployment of a Fourth Generation (4G) WiMAX system in a typical sub-Saharan African environment. This has been specified based on real world conditions considering the regulatory rules specified by the National Communication Authority (NCA) for radio frequency spectrum utilization in the 2.6GHz licensed band in Ghana. Appropriate propagation models and Network planning tools have been used to design the final radio network plan. Coverage prediction has been performed using Genex-U-Net to achieve the main aim of providing coverage in the predefined areas of Accra and Tema, Ghana. Simulation results for different downlink/uplink ratios with different frequency reuse schemes have been presented. A total of 11 base stations have been suggested to provide coverage of -92dBm using 32 sectors 4 transmit 4 receive (4T4R) adaptive Multi-Input Multi-Output (MIMO) antenna configuration within the Accra and Tema municipality. Finally the system performance is evaluated through field trial measurement and the results presented.

16 citations


Journal ArticleDOI
TL;DR: The possibility to implement proposed MAC and routing protocols for two different formation flying patterns are investigated and extensive simulations are used to evaluate the performance of the system using throughput, access delay and end-to-end delay.
Abstract: Small satellite technology has opened a new era in aerospace engineering by decreasing space mission costs, without greatly reducing the performance. The concept of formation flying using small satellites is becoming popular because of their potential to perform coordinated measurements of remote sensing space missions. The current state of art in satellite communications is a one hop link between satellite and ground station. Very little work has been done on inter-satellite communications. This paper aims to design and evaluate feasible MAC and routing layer protocols for distributed small satellite networks. The possibility to implement proposed MAC and routing protocols for two different formation flying patterns are investigated. To validate the authors’ proposed system model, they use extensive simulations to evaluate the performance of the system using throughput, access delay and end-to-end delay.

15 citations


Journal ArticleDOI
TL;DR: Results show that pattern of adherence has significant impact on the effective medication adherence, and higher levels of effective adherence can be achieved for more flexible medication regimen, such as those with higher values of maximum inter-dose time.
Abstract: Medication adherence has been studied extensively in the healthcare literature. Most of the studies focus on improving medication adherence using interventions, including those based on wireless and mobile technologies, and measure average medication adherence level. This is useful in differentiating between patients with high and low levels of adherence. In practice, the same average medication adherence could be achieved by patients with widely different adherence patterns. In this paper, the authors propose that in addition to average medication adherence level, the patterns of adherence should also be studied. The patterns of adherence can be obtained using wireless medication systems and set of actions/decisions can be communicated to these systems or mobile applications for medication management. The authors present a framework, some metrics including Effective Medication Adherence, and results related to the patterns of adherence. Their results show that pattern of adherence has significant impact on the effective medication adherence. Also, higher levels of effective adherence can be achieved for more flexible medication regimen, such as those with higher values of maximum inter-dose time. It is also possible for a patient with lower average adherence but a desirable pattern of adherence to have higher effective medication adherence than a patient with higher average adherence with less desirable pattern.

9 citations


Journal ArticleDOI
TL;DR: This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences, to traditional cost-benefit analysis CBA.
Abstract: Traditional cost-benefit analysis CBA quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-i-vis two typical network attacks, identity theft and intellectual property theft.

9 citations


Journal ArticleDOI
TL;DR: Using the documented case of applicants to several Ivy-league schools as a discussion point, a survey of U.S. students enrolled in information security and computer ethics classes is presented, asking at what point does modifying the URL become hacking, and atWhat point does it become unethical.
Abstract: While computer ethics and information security courses try to teach computer misuse and unauthorized access as clear black and white examples, when examining the use and potentially misuse of URLs the discussion becomes less clear. This paper examines a number of computer use ethical scenarios focusing on the modification of URLs within Web browsers. Using the documented case of applicants to several Ivy-league schools as a discussion point, this paper presents a survey of U.S. students enrolled in information security and computer ethics classes, asking at what point does modifying the URL become hacking, and at what point does it become unethical. The findings of this study are discussed.

9 citations


Journal ArticleDOI
TL;DR: A method to subjectively measure specific parameters in a wired or wireless network environment using the Simple Network Management Protocols for the purpose of improving Reliability, Maintainability, and Availability of the network devices.
Abstract: This research aims at describing a method to subjectively measure specific parameters in a wired or wireless network environment using the Simple Network Management Protocols for the purpose of improving Reliability, Maintainability, and Availability of the network devices. This is of importance in cases where the network is in remote or hard to access locations such as space, defense, or polar applications. Furthermore, the results can be used for troubleshooting and/or failure prediction of the network devices. Applications of health monitoring and prediction in network environments are expanding as are the networks.

9 citations


Journal ArticleDOI
TL;DR: The authors identify relevant security attacks in Wireless Cellular Network by conducting experiments in four different platforms such as Iphone, Android, Windows and Blackberry and give answers based on the data captured by conducting real-life scenarios.
Abstract: The importance of wireless cellular communication in our daily lives has grown considerably in the last decade. The smartphones are widely used nowadays, besides voice communication; the authors routinely use them to access the internet, conduct monetary transactions, send text messages and query a lot of useful information regarding the location of specific places of interest. The use of smartphones in their day-to-day communication raises many unresolved security and privacy issues. In this paper they identify relevant security attacks in Wireless Cellular Network. The authors conduct experiments in four different platforms such as Iphone, Android, Windows and Blackberry. The packets captured through Wireshark for approximately 24 minutes, giving them a lot of information regarding security and privacy issues involving the users. A lot of useful apps installed and used by the end-users have serious issues in terms of privacy and the information exposed. Which is the better platform comparing all four and what exactly do they expose from the user's information? What are the threats and countermeasures that the users should be aware of? The aim of the authors' paper is to give answers to the above questions based on the data captured by conducting real-life scenarios.

8 citations


Journal ArticleDOI
TL;DR: The authors examine the concept of mission assurance, discuss various factors which must be taken into account when describing military missions, analyze the four primary types of representations used to capture mission-to-cyber relationships, and highlight the complexities of documenting cyber dependencies for the purpose of achieving mission assurance.
Abstract: Virtually all modern organizations have embedded information and communication technologies into their core processes as a means to increase operational efficiency, improve decision quality, and reduce operational costs. However, this dependence can place the organizational mission at risk when an incident occurs that compromises a cyber resource critical to the success of the organizational mission. In this paper, the authors examine the challenges of developing and maintaining a mission-wide understanding of organizational mission risk within military environments. Specifically, they examine the concept of mission assurance, discuss various factors which must be taken into account when describing military missions, analyze the four primary types of representations used to capture mission-to-cyber relationships, and highlight the complexities of documenting cyber dependencies for the purpose of achieving mission assurance.

8 citations


Journal ArticleDOI
TL;DR: This paper presents results of quality and acceptability level tests, performed on similar groups of listeners with two years span in years 2008, 2010 and 2012, and shows shift in both quality andacceptability level.
Abstract: This paper presents results of quality and acceptability level tests, performed on similar groups of listeners with two years span in years 2008, 2010 and 2012. It shows shift in both quality and acceptability level and compares them. The tests were conducted according to P.800.

7 citations


Journal ArticleDOI
TL;DR: Weibull fading distribution was found to give the best description of fading experienced in Ghana, while Rician distribution, Nakagami-m distribution and lognormal distribution have more agreement with the measured data while Rayleigh fading distribution has much less agreement with measured data.
Abstract: Fading is the most observed and frustrating problem in transmitting and receiving radio signals. A Study in correlation properties of fading helps to design proper communication systems that are robust to it. In this work, received power signal was obtained by drive-test technique. The analysis was determined using distribution fitting tool in Matlab software 7.5.0 (R2007b). The following fading distributions were used, Rayleigh, Rician, Nakagami-m, Lognormal and Weibull. Weibull fading distribution was found to give the best description of fading experienced in Ghana.On the other hand, Rician distribution, Nakagami-m distribution and lognormal distribution have less agreement with the measured data while Rayleigh fading distribution has much less agreement with measured data. The obtained mean scale parameter and the mean shape parameter in the Weibull distribution for the environment considered were 133.76 and 15.93, respectively. Furthermore, the path loss exponents in the near and far fields were also calculated; and the standard deviation of shadowing fell in the range of 4.368dB to 6.180dB.

6 citations


Journal ArticleDOI
TL;DR: A formal framework that is based on the Continuous Time Markov Chain Model is proposed and validated using the SHARPE modeling tool and sensitivity analyses are performed to study the dynamic behavior of the proposed model with varying parameter values.
Abstract: A patch management model provides a framework with which a system's parameters and behavior can be tested and validated. The authors propose a formal framework that is based on the Continuous Time Markov Chain Model and validate the model using the SHARPE modeling tool. Furthermore, they perform sensitivity analyses to study the dynamic behavior of the proposed model with varying parameter values. A discussion on the results of our study and future research directions concludes the paper.

Journal ArticleDOI
TL;DR: An innovative multi-dimensional cross-disciplinary ICT framework should be developed, which uses sophisticated game mechanics to motivate behavior changes towards healthier lifestyles and supports three main functions: individual & environmental monitoring, including wearable sensors, mobile phones and multimedia diaries.
Abstract: Obesity and other lifestyle-related illnesses are among the top global healthcare challenges today. Obesity in young population is an alarming predictor for obesity in adulthood, but also entails different short term health complications. Knowing how to stay healthy is not enough to motivate young individuals to adopt healthy lifestyles. However, relevant progress can be achieved with use of incentives delivered through combination of processes and mobile technologies. Recognizing effectiveness of new healthcare model to prevent obesity in young population, an innovative multi-dimensional cross-disciplinary ICT framework should be developed, which uses sophisticated game mechanics to motivate behavior changes towards healthier lifestyles and supports three main functions: individual & environmental monitoring, including wearable sensors, mobile phones and multimedia diaries; feedback to users, presenting personalized healthy options for alternative lifestyles; and social connectivity, encouraging involvement in sharing experiences through social networks and social engagement. System development should be based on user-centered design, social and networking games and online education and supported by a wide stakeholder's ecosystem, including health authorities and research institutions, industries and academia from the ICT and healthcare sectors, as well as food companies and SMEs.

Journal ArticleDOI
TL;DR: The authors propose a new method for collecting the data from sensor field based on a biological inspired method adopted from tubular network formation behavior of slime mold, and show that the emergent network exhibits a widely observed property in natural topologies called scale-free which explains a lot of inherent characteristics in living creatures.
Abstract: Inspired by the nature, the interesting properties of natural organisms can be imitated in many different applications. The nature has been optimizing itself for billions of years and in many cases it simply introduces the most optimal approaches. On the other hand, the task of data collection and aggregation is critical in wireless sensor networks WSN. The information packets should traverse the network towards the aggregating center i.e. sink node. The problem of finding the best path to route the data has been long under investigation. The authors propose a new method for collecting the data from sensor field based on a biological inspired method adopted from tubular network formation behavior of slime mold where biological organisms efficiently self-organize unreliable and dynamically changing topology, to compensate for the failure of individual components while not relying on explicit central coordination. They show that the emergent network exhibits a widely observed property in natural topologies called scale-free which explains a lot of inherent characteristics in living creatures. At the end the authors show that the data collection time for a biologically inspired network is shorter than uniform channel capacity scheduling.

Journal ArticleDOI
TL;DR: The relationship between customer perceptions of call quality and actual, objective call quality is demonstrated, demonstrating the need for wireless service providers to continually improve the network quality to increase customer satisfaction and customer loyalty.
Abstract: This study demonstrates the relationship between customer perceptions of call quality and actual, objective call quality. This is important because the wireless industry invests substantially in network assets in the hopes of adding new wireless subscribers and retaining existing wireless subscribers. This research has contributed to a deeper understanding of the call quality / customer perception relationship demonstrating the need for wireless service providers to continually improve the network quality to increase customer satisfaction and customer loyalty.

Journal ArticleDOI
TL;DR: The authors' instrument was built on an extensive literature foundation and was validated with an expert panel assessment, and the relative weights of the three measures within the unified system authentication benchmarking index were reported.
Abstract: Network-based applications still rely heavily on password-based authentication methods to control access. In a recent study, a benchmarking instrument was used to assess authentication methods used in such systems. The authors' instrument was built on an extensive literature foundation and was validated with an expert panel assessment. This paper reports on the development of the instrument and the expert panel assessment. The initial draft of the instrument was derived from literature to assess 1 password strength requirements, 2 password usage methods, and 3 password reset requirements. Criteria within the index were evaluated by an expert panel, who also provided opinions on the relative weights of the criteria and measures. The expert panel results were analyzed using Multi-Criteria Decision Analysis MCDA techniques. Their results revealed that out of 100% allocation, Password Strength Measure PSM was the dominant factor in the aggregated perception of the panel of experts with weight of 43.1%, followed by Password Initialization and Reset Measure PIRM with weight of 29.2%, and Password Usage Measure PUM with weight of 27.7%. They concluded with discussions on how criteria were assembled, how the panel was conducted, and results from the panel. The results reported include the relative weights of the three measures within the unified system authentication benchmarking index.

Journal ArticleDOI
TL;DR: A new heuristic for simultaneously designing a backbone IP link topology for a metro area network, and routing these IP links over a given physical network.
Abstract: Massive increases in IP Internet Protocol traffic have led to rapid deployment of IP-based networks in metropolitan metro areas. In order to facilitate this deployment, computer-based design tools are needed. One of the most difficult decisions that engineers face in designing an IP network is choosing the IP link topology i.e., the set of router-to-router connections. This is especially complicated when it is also necessary to route these IP links over an underlying physical network of optical fibers. In this paper, the authors describe a new heuristic for simultaneously designing a backbone IP link topology for a metro area network, and routing these IP links over a given physical network. The IP network must be designed for survivability in the event of a network failure i.e., the loss of a physical link, router or IP link. Initially, they employ a Construction Heuristic that explicitly considers the number of router-to-router connections that would be carried over each physical link. In this way it seeks to minimize the impact of any single physical link failure. An optional Local Search routine then attempts to improve on the solution by a sequence of topology changes. IP link routings are adjusted at each topology change. This heuristic is readily able to be incorporated into an interactive design tool. Some computational experience is described.

Journal ArticleDOI
TL;DR: A Wireless Local Loop architecture employing the proposed CPMA technique on existing overlay video/television network is introduced and the advantages are corroborated.
Abstract: Light waves of different wavelengths and frequencies manifest in various colors. Color can be formulated electronically by video processing technologies for the purpose of multimedia, image processing and entertainment. Optoelectronic devices like DWDM use optical signals of various wave lengths for conveying data symbols from one end to other. The big question is: Is it feasible to implement color synthesized by the video systems for the purpose of telecommunications? In this paper we propose the 'Color Pixel Multiple Access' scheme for the radio access network and Color Pixel Multiplexing for core network, by implementing electronic color as a tool for addressing and bearing data overhead. The present day video systems that can generate millions of colors, in its electronic form have been utilized to set up a wireless network, serving mobile stations or computers as its nodes. The state of the art Wireless Local Loop deployments are based on the traditional cellular technologies. However there are limitations in terms of intricacy, cost and time to deploy.In this paper, the authors introduce a Wireless Local Loop architecture employing the proposed CPMA technique on existing overlay video/television network. Further we corroborate the advantages.

Journal ArticleDOI
TL;DR: Experimental Results shows that SVM can detect RF devices within the noise band, and can also identify RF devices using their UEEs.
Abstract: Radio Frequency RF devices produce some amount of Unintended Electromagnetic Emissions UEEs. UEEs are generally unique to a device and can be used as a signature for the purpose of detection and identification. The problem with UEEs is that they are very low in power and are often buried deep inside the noise band. The research herein provides the application of Support Vector Machine SVM for detection and identification of RF devices using their UEEs. Experimental Results shows that SVM can detect RF devices within the noise band, and can also identify RF devices using their UEEs.

Journal ArticleDOI
TL;DR: The authors show an automated method of converting XML documents to store in relational databases and compared performance to existing approach.
Abstract: Network management is a critical component in both wired and wireless network. In wireless networks, the network dynamics changes rapidly and the network management information needs to be updated frequently. Due to its structured form and ease of usage in communication, eXtensible Markup Language (XML) is preferred as a configuration and logging tool in network management. However, it is convenient to use relational databases such as SQL to store and process data of wireless network management where frequent updates are necessary. In this paper, the authors show an automated method of converting XML documents to store in relational. We have implemented a proof of concept and compared performance to existing approach.

Journal ArticleDOI
TL;DR: The concept of laboratories at home as the authors see it in the light of cloud computing era is presented, taking into account the existing norms and standards as well as achieve educational goals required for science and engineering laboratories with what can be referred to as Networked Smart Educational Devices.
Abstract: In developing nations where distance education is viewed with great interest, cloud computing provides a necessary solution in creating a 21st century educational environment. Cloud computing facilitates the use of open source in educational institutions in the online learning environment where the social web or software can be used to network institutions, libraries, and students in their homes. This approach enables remote laboratories for educational institutions, research, and industry. Combining this with a virtual platform will provide academic institutions the ability to provide instruction, and research establishment to conduct high level complex research. This paper presents the concept of laboratories at home as the authors see it in the light of cloud computing era, taking into account the existing norms and standards as well as achieve educational goals required for science and engineering laboratories with what can be referred to as Networked Smart Educational Devices.

Journal ArticleDOI
TL;DR: The relationship between the application design, implementation and memory resources required to run the service are explored using a stack analysis tool and the stack footprint to be measured.
Abstract: Wireless Sensor Networks and the smart applications designed to operate upon them have enjoyed a rapid increase in popularity over the last decade. The main challenge currently is the provision of real-time service delivery for wireless sensor networks to cater for new applications with guaranteed Quality of Service QoS requirements. However each application has a different service requirement. In order to deliver real-time services the dimensioning of such networks is important to service providers in order to meet these service requirements. If packets cannot be stored due to insufficient memory they are lost. Lost packets result in the resending of the packets and hence an increase in delay in delivery of the application traffic. It is this memory provisioning of these wireless sensor networks that is the focus of the work presented in this paper. More specifically the relationship between the application design, implementation and memory resources required to run the service are explored using a stack analysis tool. This stack analysis tool enables the stack footprint to be measured. Results of memory usage for two different WSN applications are presented. Recommendations based on this study for efficient memory provisioning and ultimately real-time service delivery are given.

Journal ArticleDOI
TL;DR: The retained-key model is presented as being a software application that handles the initiation of a secure communication channel between sender and receiver, and facilitates user authentication by a trusted third party-presumably, the software's vendor.
Abstract: This paper presents a synchronous encryption key management model that does not require the sender to disclose the encryption key in order to effect decryption. This eliminates the need for key exchange mechanisms, giving the sender improved control over their keys. The retained-key model is presented as being a software application that handles the initiation of a secure communication channel between sender and receiver, and facilitates user authentication by a trusted third party-presumably, the software's vendor. This model is not intended to replace public/private key-based mechanisms, as they serve an important role in message signing and authentication. Rather, it seeks to provide an alternative means of decrypting messages in a secure fashion while allowing the sender to avoid the need to disclose the message's key.

Journal ArticleDOI
TL;DR: Service quality of the service provider is found to be as the differentiating factor in churning decision, and discriminant analysis is used to understand the factors that best discriminate between switchers and non-switchers.
Abstract: Retaining existing customer has been considered to be one of the most critical challenges for telecommunication service providers than for attracting new ones. In telecommunication, the service offered is different from that of a general commodity sale as in the former case the service is considered to be a continuous process, wherein the service provider can offer the differentiated services throughout the customer's tenure. This differentiation in service offered creates a demarcation from the competitors and hence establishes competitive advantage for that service provider for attracting new customers and retaining the existing ones, which ultimately determines the profitability. In this paper, the author captures this differentiation factor by investigating customer switching behavior under Mobile Number Portability MNP in Indian telecommunication market. It is shown that only limited attention has been paid to the customer churn under MNP and none of the existing studies incorporated psychological constructs as the determinants of customer churn. In this context, the study used discriminant analysis to understand the factors that best discriminate between switchers and non-switchers and predict develop a churn prediction model the customer churn behavior through incorporating psychological constructs. The findings indicate that service quality, customer satisfaction, attachment, commitment and switching costs are the major factors differentiating the switching and non-switching decisions. Service quality of the service provider found to be as the differentiating factor in churning decision. The results of the study have implications for both academicians and relationship mangers; they are using psychological constructs to predict customer switching behavior.

Journal ArticleDOI
Rajarshi Sanyal1
TL;DR: The ISUP signalling aspects are examined to optimize the load sharing and streamline the performance of the traditional voice core networks and the dependencies of the Circuit Identification Code CIC selection process on ISUP load sharing are studied to derive conclusions.
Abstract: The state of the art Long Term Evolution LTE mobile core networks predominantly use Session Initiation Protocol SIP and Real-time Transport Protocol RTP for transporting voice across networks. Voice-over-LTE VoLTE designed for LTE network based on an Information Management System IMS framework is the key to enriched voice communication services for the next generation networks. Emerging technologies like Rich Communication Suite, Web Real-Time Communication WebRTC will impart a new dimension to voice communications and harmonise voice and value added services. Many of the mobile networks and voice carriers evolved their network from traditional Time-Division Multiplexing TDM / Asynchronous Transfer Mode ATM to Internet Protocol IP. Several interworking protocols have appeared for interexchange of Voice traffic between TDM and IP. SIP to ISDN User Part ISUP interoperability mechanisms have been devised. But, in spite of all the endeavours of the mobile networks move to the next generation, it will probably take some time for the networks to completely migrate from UMTS to LTE. As both the technologies will coexist, Circuit Switched Fallback CSFB and Single Radio Voice Call Continuity SRVCC are two of the most preferred options in the interim to switch from 4G to 3G when the coverage is lost. 3G networks rely still on circuit switching. It can be inferred that circuit switched networks piggybacking on ISUP for voice communication will continue. In this paper, we examine the ISUP signalling aspects to optimize the load sharing and streamline the performance of the traditional voice core networks. We will study the dependencies of the Circuit Identification Code CIC selection process on ISUP load sharing to derive our conclusions.