Scheduled System Maintenance
We are currently undergoing maintenance that may cause intermittent performance issues. We apologize for any inconvenience.

Journal of Communications and Networks

Issue 3 • June 2018

Filter Results

Displaying Results 1 - 17 of 17
  • Resource Allocation in Fog Networks 
  • Double-matching resource allocation strategy in fog computing networks based on cost efficiency

    Publication Year: 2018, Page(s):237 - 246
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    Fog computing is an advanced technique to decrease latency and network congestion, and provide economical gains for Internet of Things (IoT) networks. In this paper, we investigate the computing resource allocation problem in three-layer fog computing networks. We first formulated the resource allocation problem as a double two-sided matching optimization problem. Then, we propose a double-matchin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource allocation and distributed uplink offloading mechanism in fog environment

    Publication Year: 2018, Page(s):247 - 256
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1002 KB)

    Applying fog computing technology to the shared pattern has two problems to cope with. One is to formulate a rational mechanism for resource allocation, and the other is to design computation offloading strategy of tasks based on resource allocation result. For solving these problems, we construct a three-layer F-RAN architecture first, which consists of terminal layer, access layer and network la... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Machines in Fog Computing 
  • Mitigation technique for performance degradation of virtual machine owing to GPU pass-through in fog computing

    Publication Year: 2018, Page(s):257 - 265
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    As the size of data increases and computation becomes complicated in fog computing environments, the need for highperformance computation is increasing. One of the most popular ways to improve the performance of a virtual machine (VM) is to allocate a graphic processing unit (GPU) to the VM for supporting general purpose computing on graphic processing unit (GPGPU) operations. The direct pass-thro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual machine placement in cloudlet mesh

    Publication Year: 2018, Page(s):266 - 278
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB)

    In the era of Internet of Things (IoT), the concept of "cloudlet" was proposed, which can be considered as a "micro data center in a box" deployed at the edge of the mobile networks. The integration of cloudlet and wireless mesh networks gives rise to the idea of "cloudlet mesh", which offers services to a large number of IoT applications simultaneously. With virtualized servers in each cloudlet, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and Protection in Fog Services 
  • Fog-based file sharing for secure and efficient file management in personal area network with heterogeneous wearable devices

    Publication Year: 2018, Page(s):279 - 290
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB)

    In a personal area network (PAN) with wearable devices, the security of a file stored is an important concern. Secret sharing has received considerable attention for handling security, as it guarantees confidentiality and integrity even when some devices, whose count when taken together less than the minimum threshold, are compromised, lost, or stolen. However, because traditional secret sharing h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of cognitive fog computing for intrusion detection in Internet of Things

    Publication Year: 2018, Page(s):291 - 298
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB)

    Internet of things (IoT) is penetrating into every aspect of our lives including our body, our home and our living environment along with numerous security challenges. With rapidly growing number of connected devices in IoT, the scope for cyber-attack also increases exponentially. Therefore an effective intrusion detection system (IDS) is needed to efficiently detect the attack at faster rate in h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communication Theory and Systems 
  • Multi-carrier differential chaos-shift keying with repeated spreading sequence

    Publication Year: 2018, Page(s):299 - 308
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    This paper proposes a multi-carrier differential chaos-shift keying (MC-DCSK) system using repeated spreading sequence (RSS), namely RSS-MC-DCSK, for chaos-based wireless communications. In the proposed system, instead of transmitting the chaotic spreading sequence on a predefined subcarrier as in conventional MC-DCSK, a DCSK-modulated signal, of which each two-bit duration consisting of reference... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum stabilizer codes construction from Hermitian self-orthogonal codes over GF(4)

    Publication Year: 2018, Page(s):309 - 315
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    In order to construct quantum error correction code, we consider additive codes over Galois field GF(4), which are self-orthogonal with respect to a certain Hermitian product. In this paper, we first propose a new approach to the construction of Hermitian self-orthogonal linear codes, applying the extension to get a longer length, and prove the codes have good minimum distance. Then, we investigat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Communications 
  • Distributed synchronization algorithm for infrastructure-less public safety networks

    Publication Year: 2018, Page(s):316 - 324
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB)

    In this paper, we propose a distributed synchronization algorithm for infrastructure-less public safety networks. The proposed algorithm aims to minimize the number of out-of-sync user equipments (UEs) by efficiently forming synchronization groups and selecting synchronization reference (SyncRef) UEs in a distributed manner. For the purpose, we introduce a novel affinity propagation technique whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Networks and Services 
  • eff-HAS: Achieve higher efficiency in data and energy usage on dynamic adaptive streaming

    Publication Year: 2018, Page(s):325 - 342
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (650 KB)

    With the limited battery life of mobile devices and the full usage of shared network resources, mobile users are required to devise canny and amicable plans for energy and data consumption. In this paper, we propose an efficient chunk-scheduling strategy for adaptive video streaming which enhances per-power data utility. We first reveal that currently available chunk-scheduling strategies for adap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertisement

    Publication Year: 2018, Page(s): 344
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for papers

    Publication Year: 2018, Page(s): 343
    Request permission for commercial reuse | PDF file iconPDF (202 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Front cover

    Publication Year: 2018, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Back cover

    Publication Year: 2018, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Special issue on fog networks

    Publication Year: 2018, Page(s):233 - 236
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB)

    Fog computing as an extension of cloud computing is able to deploy data storage, computing and communication, control and management along the cloud to things continuum. From a systematic perspective, fog networks provide a distributed computing system with a hierarchical topology. Fog networks aim at meeting stringent latency requirements, reducing power consumption of end devices, providing real... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inside front cover

    Publication Year: 2018, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inside back cover

    Publication Year: 2018, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The Journal of Communications and Networks is published six times per year, and is committed to publishing high-quality papers that advance the state-of-the-art and practical applications of communications and information networks.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Anthony Ephremides
University of Maryland