期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
SP-DSTS-MIMO Scheme-Aided H.266 for Reliable High Data Rate Mobile Video Communication
1
作者 Khadem Ullah Nasru Minallah +3 位作者 Durre Nayab Ishtiaque Ahmed jaroslav frnda Jan Nedoma 《Computers, Materials & Continua》 SCIE EI 2023年第1期995-1010,共16页
With the ever growth of Internet users,video applications,and massive data traffic across the network,there is a higher need for reliable bandwidth-efficient multimedia communication.Versatile Video Coding(VVC/H.266)i... With the ever growth of Internet users,video applications,and massive data traffic across the network,there is a higher need for reliable bandwidth-efficient multimedia communication.Versatile Video Coding(VVC/H.266)is finalized in September 2020 providing significantly greater compression efficiency compared to Highest Efficient Video Coding(HEVC)while providing versatile effective use for Ultra-High Definition(HD)videos.This article analyzes the quality performance of convolutional codes,turbo codes and self-concatenated convolutional(SCC)codes based on performance metrics for reliable future video communication.The advent of turbo codes was a significant achievement ever in the era of wireless communication approaching nearly the Shannon limit.Turbo codes are operated by the deployment of an interleaver between two Recursive Systematic Convolutional(RSC)encoders in a parallel fashion.Constituent RSC encoders may be operating on the same or different architectures and code rates.The proposed work utilizes the latest source compression standards H.266 and H.265 encoded standards and Sphere Packing modulation aided differential Space Time Spreading(SP-DSTS)for video transmission in order to provide bandwidth-efficient wireless video communication.Moreover,simulation results show that turbo codes defeat convolutional codes with an averaged E_(b)/N_(0) gain of 1.5 dB while convolutional codes outperformcompared to SCC codes with an E_(b)/N_(0) gain of 3.5 dBatBit ErrorRate(BER)of 10−4.The Peak Signal to Noise Ratio(PSNR)results of convolutional codes with the latest source coding standard of H.266 is plotted against convolutional codes with H.265 and it was concluded H.266 outperform with about 6 dB PSNR gain at E_(b)/N_(0) value of 4.5 dB. 展开更多
关键词 H.265 RSC turbo codes SCC SP-DSTS BP-CNN BER PSNR
下载PDF
Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications
2
作者 Usman Ali Mohd Yamani Idna Idris +6 位作者 jaroslav frnda Mohamad Nizam Bin Ayub Roobaea Alroobaea Fahad Almansour Nura Modi Shagari Insaf Ullah Ihsan Ali 《Computers, Materials & Continua》 SCIE EI 2022年第5期2515-2532,共18页
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unn... Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-relatedprocesses to attain more profits. However, such IoT based smart industriesneed internet connectivity and interoperability which makes them susceptibleto numerous cyber-attacks due to the scarcity of computational resourcesof IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoTenvironment. In this paper, we propose a hyperelliptic curve cryptography(HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with theaim of improving security while lowering computational and communicationoverhead in IIoT environment. HECC with 80-bit smaller key and parameterssizes offers similar security as elliptic curve cryptography (ECC) with 160-bitlong key and parameters sizes. We assessed the IIoT-CS scheme security byapplying formal and informal security evaluation techniques. We used Realor Random (RoR) model and the widely used automated validation of internet security protocols and applications (AVISPA) simulation tool for formalsecurity analysis and proved that the IIoT-CS scheme provides resistance tovarious attacks. Our proposed IIoT-CS scheme is relatively less expensivecompared to the current state-of-the-art in terms of computational cost andcommunication overhead. Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead,respectively, compared to the most recent protocol. 展开更多
关键词 IoT security authentication protocols hyperelliptic curve cryptography certificateless public key cryptography
下载PDF
Augmented Node Placement Model in t-WSN Through Multiobjective Approach
3
作者 Kalaipriyan Thirugnansambandam Debnath Bhattacharyya +2 位作者 jaroslav frnda Dinesh Kumar Anguraj Jan Nedoma 《Computers, Materials & Continua》 SCIE EI 2021年第12期3629-3644,共16页
In Wireless Sensor Network(WSN),coverage and connectivity are the vital challenges in the target-based region.The linear objective is to find the positions to cover the complete target nodes and connectivity between e... In Wireless Sensor Network(WSN),coverage and connectivity are the vital challenges in the target-based region.The linear objective is to find the positions to cover the complete target nodes and connectivity between each sensor for data forwarding towards the base station given a grid with target points and a potential sensor placement position.In this paper,a multiobjective problem on target-based WSN(t-WSN)is derived,which minimizes the number of deployed nodes,and maximizes the cost of coverage and sensing range.An Evolutionary-based Non-Dominated Sorting Genetic Algorithm-II(NSGA-II)is incorporated to tackle this multiobjective problem efficiently.Multiobjective problems are intended to solve different objectives of a problem simultaneously.Bio-inspired algorithms address the NP-hard problem most effectively in recent years.In NSGA-II,the Non-Dominated sorting preserves the better solution in different objectives simultaneously using dominance relation.In the diversity maintenance phase,density estimation and crowd comparison are the two components that balance the exploration and exploitation phase of the algorithm.Performance of NSGA-II on this multiobjective problem is evaluated in terms of performance indicators Overall Non-dominated Vector Generation(ONGV)and Spacing(SP).The simulation results show the proposed method performs outperforms the existing algorithms in different aspects of the model. 展开更多
关键词 Focused wireless sensor network m-coverage k-connectivity problem non-dominated sorting NSGA-II
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部