This paper presents the design and development of a Linux based infrastructure and platform for a
wholesale service provider to offer SMS integrated services to retail providers for resale. The multi-tenant
platform, capable of providing multiple types of SMS integrated services, was designed and built mainly
with off-the-shelf components and open source software. The platform is highly reliable and flexible,
enabling fast provision of customisable services by integrating SMS, voice, VoIP, and web services in
innovative ways. This paper describes the design of the platform and presents four major application areas.
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...csandit
The aim of this paper is to present a new System on Chip (SoC) reconfigurable gateway
architecture for Voice over Internet Telephony (VOIP). Our motivation behind this work is
justified by the following arguments: most of VOIP solutions proposed in the market are based
on the use of a general purpose processor and a DSP circuit. In these solutions, the use of the
serial multiply accumulate circuit is very limiting for the signal processing. Also, in embedded
VOIP based DSP applications, the DSP works without MMU (memory management unit). This
is a serious limitation because VOIP solutions are multi-task based. In order to overcome these
problems, we propose a new VOIP gateway architecture built around the OpenRisc-1200-V3
processor. This last one integrates a DSP circuit as well as a MMU. The hardware architecture
is mapped into the VIRTEX-5 FPGA device. We propose a design methodology based on the
design for reuse and design with reuse concepts. We demonstrate that the proposed SoC
architecture is reconfigurable, scalable and the final RTL code can be reused for any FPGA or
ASIC technology. Performances measures, in the VIRTEX-5 FPGA device family, show that the
SOC-gateway architecture occupies 52% of the FPGA in term of slice LUT, 42% of IOBs, 60%
of bloc memory, 8% of integrated DSP, 16% of PLL and the total power is estimated at
4.3Watts.
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...csandit
The aim of this paper is to present a new System on Chip (SoC) reconfigurable gateway
architecture for Voice over Internet Telephony (VOIP). Our motivation behind this work is
justified by the following arguments: most of VOIP solutions proposed in the market are based
on the use of a general purpose processor and a DSP circuit. In these solutions, the use of the
serial multiply accumulate circuit is very limiting for the signal processing. Also, in embedded
VOIP based DSP applications, the DSP works without MMU (memory management unit). This
is a serious limitation because VOIP solutions are multi-task based. In order to overcome these
problems, we propose a new VOIP gateway architecture built around the OpenRisc-1200-V3
processor. This last one integrates a DSP circuit as well as a MMU. The hardware architecture
is mapped into the VIRTEX-5 FPGA device. We propose a design methodology based on the
design for reuse and design with reuse concepts. We demonstrate that the proposed SoC
architecture is reconfigurable, scalable and the final RTL code can be reused for any FPGA or
ASIC technology. Performances measures, in the VIRTEX-5 FPGA device family, show that the
SOC-gateway architecture occupies 52% of the FPGA in term of slice LUT, 42% of IOBs, 60%
of bloc memory, 8% of integrated DSP, 16% of PLL and the total power is estimated at
4.3Watts.
Grokking TechTalk #18B: VoIP Architecture For TelecommunicationsGrokking VN
Bài talk chia sẻ kiến thức, kinh nghiệm về kiến trúc VoIP cho các bạn dự định xây dựng hệ thống dựa trên nền tảng VoIP, lập trình phát triển ứng dụng CRM, ERP, POS...tích hợp Call & Contact Center, ứng dụng OTT tích hợp Mobile App và call out PSTN, tương tự dịch vụ Viber Out:
- VoIP Platform
- IP-PBX
- WebRTC Gateway & Client
- Use Cases
About Speaker:
Anh Đạt là cử nhân Toán - Tin học, Thạc sỹ Tài chính - Ngân hàng, hơn 10 năm kinh nghiệm triển khai hệ thống ERP/CRM trên nền tảng Oracle/SAP và triển khai các dịch vụ giá trị gia tăng trên nền viễn thông, Brand Name SMS, Call & Contact Center, VoIP Platform
Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, broadband telephony, and broadband phone service.
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks.
VoIP is short for Voice over Internet Protocol. VoIP is a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using IP rather than by traditional circuit transmissions of the PSTN.
Nowadays VoIP technologies have taken the upper hand offering many advantages compared to the traditional telephone network, but what are the security risks involved when voice and data networks come together. In this presentation, we will identify and evaluate these different security risks and their countermeasures both from a defensive as offensive position.
Mesh pull backup parent pools for video-on-demand multicast treesIJCNCJournal
Resilient multicast is a challenging issue for overlay trees particularly because of high churn. In this work,
we propose a mechanism that allows scalable video multicast. While the regular operation involves treepush
of the video, any node that looses its parent on the tree solicits video from a predetermined backup set
of nodes in a mesh-pull fashion. The main idea is to allocate less bandwidth for backup to improve
bandwidth utilization while maintaining the best possible video quality. The choice of essential design
parameters are studied together with seamlessness of the streaming under variety of fault scenarios.
Simulation results indicate the optimality of the proposed approach as far as resiliency, bandwidth
utilization, delay and video quality are concerned.
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionIJCNCJournal
Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation
cost: every node in the network has to code. Interested in minimizing resource consumption of network
coding while maintaining its performance, in this paper, we propose a practical network coder placement
algorithm which achieves comparable content distribution time as network coding, and at the same time,
substantially reduces the number of network coders compared to a full network coding solution in which all
peers have to encode, i.e. become encoders. Our algorithm is derived from two key elements. First, it is
based on the insight that coding at upstream peers eliminates information duplication to downstream peers,
which results in efficient content distribution. Second, our placement strategy exploits centrality
characteristics of the network topology to quickly determine key positions to place encoders. Performance
evaluation using various topology and algorithm parameters confirms the effectiveness of our proposed
method.
Grokking TechTalk #18B: VoIP Architecture For TelecommunicationsGrokking VN
Bài talk chia sẻ kiến thức, kinh nghiệm về kiến trúc VoIP cho các bạn dự định xây dựng hệ thống dựa trên nền tảng VoIP, lập trình phát triển ứng dụng CRM, ERP, POS...tích hợp Call & Contact Center, ứng dụng OTT tích hợp Mobile App và call out PSTN, tương tự dịch vụ Viber Out:
- VoIP Platform
- IP-PBX
- WebRTC Gateway & Client
- Use Cases
About Speaker:
Anh Đạt là cử nhân Toán - Tin học, Thạc sỹ Tài chính - Ngân hàng, hơn 10 năm kinh nghiệm triển khai hệ thống ERP/CRM trên nền tảng Oracle/SAP và triển khai các dịch vụ giá trị gia tăng trên nền viễn thông, Brand Name SMS, Call & Contact Center, VoIP Platform
Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, broadband telephony, and broadband phone service.
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks.
VoIP is short for Voice over Internet Protocol. VoIP is a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using IP rather than by traditional circuit transmissions of the PSTN.
Nowadays VoIP technologies have taken the upper hand offering many advantages compared to the traditional telephone network, but what are the security risks involved when voice and data networks come together. In this presentation, we will identify and evaluate these different security risks and their countermeasures both from a defensive as offensive position.
Mesh pull backup parent pools for video-on-demand multicast treesIJCNCJournal
Resilient multicast is a challenging issue for overlay trees particularly because of high churn. In this work,
we propose a mechanism that allows scalable video multicast. While the regular operation involves treepush
of the video, any node that looses its parent on the tree solicits video from a predetermined backup set
of nodes in a mesh-pull fashion. The main idea is to allocate less bandwidth for backup to improve
bandwidth utilization while maintaining the best possible video quality. The choice of essential design
parameters are studied together with seamlessness of the streaming under variety of fault scenarios.
Simulation results indicate the optimality of the proposed approach as far as resiliency, bandwidth
utilization, delay and video quality are concerned.
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionIJCNCJournal
Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation
cost: every node in the network has to code. Interested in minimizing resource consumption of network
coding while maintaining its performance, in this paper, we propose a practical network coder placement
algorithm which achieves comparable content distribution time as network coding, and at the same time,
substantially reduces the number of network coders compared to a full network coding solution in which all
peers have to encode, i.e. become encoders. Our algorithm is derived from two key elements. First, it is
based on the insight that coding at upstream peers eliminates information duplication to downstream peers,
which results in efficient content distribution. Second, our placement strategy exploits centrality
characteristics of the network topology to quickly determine key positions to place encoders. Performance
evaluation using various topology and algorithm parameters confirms the effectiveness of our proposed
method.
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsIJCNCJournal
In this paper, we proposed a particle swarm optimization (PSO) based partial transmit sequence (PTS)
technique in order to achieve the lowest Peak-to-Average Power Ratio(PAPR) in Multiple Input Multiple
Output- Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems. Our approach consist of
applying the PSO based PTS on each antenna of the system in order to find the optimal phase factors,
which is a straightforward method to get the minimum PAPR in such a system. The simulation results
demonstrate that the PSO based PTS algorithm when applied to MIMO-OFDM systems with a wide range
of phase factors, tends to give a high performance. In addition, there is no need to increase the number of
particles of the PSO algorithm to enhance the performance of the system. As a result of this, the complexity
of finding the minimum PAPR is kept at a reasonable level.
A Compact Dual Band Dielectric Resonator Antenna For Wireless ApplicationsIJCNCJournal
This paper presents the design of a dual band rectangular Dielectric Resonator Antenna (DRA)
coupled to narrow slot aperture that is fed by microstrip line. The fundamental TE111 mode and
higher-order TE113 mode are excited with their resonant frequencies respectively. These
frequencies can be controlled by changing the DRA dimensions. A dielectric resonator with high
permittivity is used to miniaturize the global structure. The proposed antenna is designed to have
dual band operation suitable for both DCS (1710 - 1880 MHz) and WLAN (2400 - 2484 MHz)
applications. The return loss, radiation pattern and gain of the proposed antenna are evaluated.
Reasonable agreement between simulation and experimental results is obtained.
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
Ad hoc networks are a collection of mobile nodes communicating via wireless channels without any fixed
infrastructure. Because of their ease and low cost of building, ad hoc networks have a lot of attractive
applications in different fields. The topology of ad hoc networks changes dynamically, and each node in the
network can act as a host or router. With the increase in the number of wireless devices and large amount
of traffic to be exchanged, the demand for scalable routing protocols has increased. This paper presents a
scalable routing protocol, based on AODV protocol, called the Extended Clustering Ad Hoc Routing
Protocol (ECRP). This is a hybrid protocol, which combines reactive and proactive approaches in routing.
The protocol uses the Global Positioning System to determine the position of certain nodes in the network.
The evaluation methodology and simulation results obtained show that the protocol is efficient and scales
well in large networks
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...IJCNCJournal
A Vehicular Ad Hoc Network (VANET) is a network formed purely among vehicles without presence of any
communication infrastructure as base stations and/or access point. Frequent topological changes due to
high mobility is one of the main issues in VANETs. In this paper we evaluate Ad-hoc On-Demand Distance
Vector (AODV) and Optimized Link State Routing (OLSR) routing protocols using 802.11a and 802.11p in
a realistic urban scenario. For this comparison, we chose five performance metrics: Path Availability, Endto-
End Delay, Number of Created Paths, Path Length and Path Duration. Simulation results show, that for
most of the metrics evaluated, OLSR outperforms AODV when 802.11p and that 802.11p is more efficient
in urban VANETs.
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationIJCNCJournal
NAT has been design to work with Internet client-server structure. The emerged of Peer-to-Peer (P2P)
networks and applications revealed the incompatibility between P2P applications and NAT. Many methods
has been developed and implemented to solve connectivity between peers behind NAT devices.
Nevertheless, various NATing types can’t communicate with one another. In this work, we are going to
study the impact of NAT types on the start-up delay time of peers in P2P streaming systems. We will
demonstrate the ability of NATing to expel peers in P2P live streaming systems. A new neighbour selecting
algorithm will be proposed. This algorithm will utilize NAT-types configurations as a parameter. We have
utilized NS2 simulator to show the performance of the new algorithm in increasing the connectivity,
reducing the number of expelled peers and implementing of locality.
Probability Density Functions of the Packet Length for Computer Networks With...IJCNCJournal
The research on Internet traffic classification and identification, with application on prevention of attacks
and intrusions, increased considerably in the past years. Strategies based on statistical characteristics of
the Internet traffic, that use parameters such as packet length (size) and inter-arrival time and their
probability density functions, are popular. This paper presents a new statistical modeling for packet length,
which shows that it can be modeled using a probability density function that involves a normal or a beta
distribution, according to the traffic generated by the users. The proposed functions has parameters that
depend on the type of traffic and can be used as part of an Internet traffic classification and identification
strategy. The models can be used to compare, simulate and estimate the computer network traffic, as well
as to generate synthetic traffic and estimate the packets processing capacity of Internet routers
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
As cloud computing is increasingly transforming the information technology landscape, organizations and
businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them
increase business agility and reduce their operational costs. They increasingly demand services that can
meet their functional and non-functional requirements. Given the plethora and the variety of SaaS
offerings, we propose, in this paper, a framework for SaaS provisioning, which relies on brokered Service
Level agreements (SLAs), between service consumers and SaaS providers. The Cloud Service Broker (CSB)
helps service consumers find the right SaaS providers that can fulfil their functional and non-functional
requirements. The proposed selection algorithm ranks potential SaaS providers by matching their offerings
against the requirements of the service consumer using an aggregate utility function. Furthermore, the CSB
is in charge of conducting SLA negotiation with selected SaaS providers, on behalf of service consumers,
and performing SLA compliance monitoring
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
MANET is a temporary connection of mobile nodes via wireless links having no centralized base station.
We developed a protocol with an enhanced route discovery mechanism that avoids the pre-transmission
delay. When a source node wants to communicate with another node, it broadcast RREQ. EAODV give
priority to the source node of real time transmission. When RREQ packet send to neighbor node, for real
time transmission it accept route request on priority basis and the drop ratio of packets decreased, then
throughput increases by receiving more packets at destination and delivery ratio also increased through
these QOS improved.
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGIJCNCJournal
The rapid growth of users on the cloud service and number of services to the user increases the load on the
servers at cloud datacenter. This issue is becoming a challenge for the researchers. And requires used
effectively a load balancing technique not only to balance the resources for servers but also reduce the
negative impact to the end-user service. The current, load balancing techniques have solved the various
problems such as: (i) load balancing after a server was overloaded; (ii) load balancing and load forecast
for the allocation of resources; iii) improving the parameters affecting to load balancing in cloud. The
study of improving these parameters have great significance to improving system performance through
load balancing. From there, we can propose more effective methods of load balancing, in order to increase
system performance. Therefore, in this paper we researched some parameters affecting the performance
load balancing on the cloud computing.
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over NetworkIJCNCJournal
Scheduling real time and non real time packets at network nodes has an important impact by reducing the
processing overhead, queuing delay and response time. Most of the existing packet scheduling algorithms
used in network based on First-In First-Out (FIFO), non-preemptive priority, and preemptive priority
scheduling. However, these algorithms incur a large processing overhead, queuing delay and response
time and are not dynamic to the data traffic changes. In this paper, we present a new hierarchical
scheduling algorithm to assign priority, Hierarchical Hybrid EDF/FIFO which can not only serve the real
time traffic but also provide best effort service to non real time traffic. To examine our approach for
scheduling, we realized our analytical study to express the worst case queuing delay and the worst case
response time for different traffics. The simulation results showed that the Hierarchical hybrid EDF/FIFO
achieved the minimum packet delay and adequate loss packet for non real time traffic when compared with
Hierarchical FIFO. In general, the performances of our approach draw near to Hierarchical EDF which
confirms the effectiveness of this approach.
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is
designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, shortrange,
low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture,
industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide
autonomous Quality of Service (QoS) to the sensor nodes in one-hop QoS retransmission group and two
QoS groups in WSNs where the source nodes do not have receiver circuits. Hence, they can only transmit
data to a sink node, but cannot receive any control signals from the sink node. The proposed protocol
GORMA provides QoS to the nodes which work independently on predefined time by allowing them to
transmit each packet an optimal number of times within a given period. Our simulation results shows that
the performance of GORMA protocol, which maximize the delivery probability of one-hop QoS group and
two QoS groups and minimize the energy consumption.
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...cscpconf
The aim of this paper is to present a new System on Chip (SoC) reconfigurable gateway architecture for Voice over Internet Telephony (VOIP). Our motivation behind this work is
justified by the following arguments: most of VOIP solutions proposed in the market are based on the use of a general purpose processor and a DSP circuit. In these solutions, the use of the serial multiply accumulate circuit is very limiting for the signal processing. Also, in embedded VOIP based DSP applications, the DSP works without MMU (memory management unit). This is a serious limitation because VOIP solutions are multi-task based. In order to overcome these
problems, we propose a new VOIP gateway architecture built around the OpenRisc-1200-V3 processor. This last one integrates a DSP circuit as well as a MMU. The hardware architecture is mapped into the VIRTEX-5 FPGA device. We propose a design methodology based on the design for reuse and design with reuse concepts. We demonstrate that the proposed SoC architecture is reconfigurable, scalable and the final RTL code can be reused for any FPGA or ASIC technology. Performances measures, in the VIRTEX-5 FPGA device family, show that the SOC-gateway architecture occupies 52% of the FPGA in term of slice LUT, 42% of IOBs, 60% of bloc memory, 8% of integrated DSP, 16% of PLL and the total power is estimated at 4.3Watts
The success of today’s organizations and enterprises highly depends on reliable and secure connectivity. Enterprise connectivity exists between different branches, between a central offi ce and geographically widespread points of activity and between an enterprise and the public internet. The connectivity enables faster, more secure transactions and improved productivity by sharing information between entities,
no matter where they are.
The presentation deals with evolution of telecommunication from basic analog to new age LTE /IMS IP based technology.
It provides easy to follow step by step solution description of migration from PSTN / circuit switched / softswtch solution to IP based IMS .
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In a hyperconnected economy, businesses need tools that empower employees to work together and get more done, anytime, anywhere, using the devices they prefer. SIP Trunking enhances mobility and presence, and provides end-to-end unified communications applications, among other advantages. This paper explains how companies can simplify company-wide business communications using SIP-to energize communications, productivity, collaboration, and business growth.
Session Border Controllers presontation by Jonathan Richards - VON 2005
SBCs control real-time session traffic at the signaling, call-control, and packet layers as they cross a packet-to-packet network border between networks or between network segments
SBCs are critical to the deployment of VOIP networks because they address the inability of real-time session traffic to cross network address translation (NAT) device or firewall boundaries
The objective of study is to guarantee QoS for multiple service class traffic in a multiple connection environment and to examine a case of QoS deployment over a cellular WiMAX network. In particular, the thesis compares the performance how much bandwidth for voip
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Leading Change strategies and insights for effective change management pdf 1.pdf
A multi tenant platform for sms integrated services
1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
A MULTI-TENANT PLATFORM FOR SMS
INTEGRATED SERVICES
Ka Ching Chan1 and David Tien2
1
Department of Computer Science and Computer Engineering, La Trobe University,
Bendigo, Victoria, Australia
2
School of Computing and Mathematics, Charles Sturt University,
Bathurst, New South Wales, Australia
ABSTRACT
This paper presents the design and development of a Linux based infrastructure and platform for a
wholesale service provider to offer SMS integrated services to retail providers for resale. The multi-tenant
platform, capable of providing multiple types of SMS integrated services, was designed and built mainly
with off-the-shelf components and open source software. The platform is highly reliable and flexible,
enabling fast provision of customisable services by integrating SMS, voice, VoIP, and web services in
innovative ways. This paper describes the design of the platform and presents four major application areas.
KEYWORDS
Short Message Service, SMS, GSM, Mobile Service
1. INTRODUCTION
Short Message Service (SMS) has proven to be popular worldwide in sending and receiving
alphanumeric messages on mobile phones, and is supported by all mobile phones from the early
GSM mobile handsets to the latest smart phones [1]-[3]. A single SMS message has the length
limitation of 160 characters and is delivered within a short time in general. SMS messages can
also be delivered internationally. In addition to the common messaging and broadcasting
applications, there is a vast amount of research literature published on specialised SMS
applications such as diabetes management [4], [5], asthma control [6], [7], weight control [8],
mobile payment [9], [10] and other health care applications [11], [12], to name a few. There is a
high demand of similar types of low volume, but highly customisable integrated communication
services that require some forms of integration of SMS messaging with voice, VoIP, and web
applications.
Building on our previous extensive experience in developing custom SMS integrated solutions in
the service provider industry, we aimed to design and build a generic platform that meets the
demand of this niche market. The presented platform is a wholesale multi-tenant platform that
enables fast provision of flexible services to multiple providers for resell to their customer bases.
The types of services range from simple outbound SMS broadcasting to any innovative SMS
integrated applications. The infrastructure and platform have been built mainly with off-the-shelf
components and open source software. Application programming interfaces (HTTP APIs) have
been developed to enable internal system communications and external interconnections with
customers’ systems. A centralized database has been built to support all the system configuration,
multi-tenant management, real-time service operations, and billing functions.
DOI : 10.5121/ijcnc.2013.5613
205
2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
Figure 1. Infrastructure of the SMS integrated multi-tenant platform
2. SYSTEM ARCHITECTURE
In this section, we present the overall system infrastructure and development platform on which
the wholesale SMS service platform was designed and developed. The infrastructure, involving
the integration of various types of servers to offer multiple functionalities and capabilities,
enables innovative applications to be built on easily and quickly.
The main systems include a Linux based GSM gateway, a MySQL database server, an Apache
web server, and a number of applications servers. The network diagram is given in Figure 1. The
GSM gateway, MySQL database server, and application servers are configured with private IP
addresses unless public IP addresses are required for communicating with retail providers via the
Internet. In the following sections, we will describe the hardware used in our development in
more details. For simplicity, equipment used for redundancy and high availability is not included
in the diagram.
2.1. GSM/SMS Gateway
Direct interconnection with Mobile Network Operators (MNO) is a very high cost approach due
to the high charges imposed by the MNOs. Most MNOs will charge a very high setup fee, and
recurring monthly fee. This high cost makes it financially unviable for most smaller or new
players to enter into any SMS related business. Our approach aims to provide an alternative path
for smaller players to enter into the markets, without the need to interconnect with MNOs.
206
3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
A GSM gateway provides mobile voice and SMS connectivity to the mobile carrier’s GSM
network. To build a highly reliable system at the lowest possible cost, we purchased high quality
off-the-shelf components and assemble the system ourselves. A special purpose add-on card, the
OpenVox G400P GSM modem card, which supports up to four SIM cards, was installed in a
dedicated server to build the GSM gateway. This gives us a capacity of up to four simultaneous
inbound and/or outbound messages. The G400P is a 32-bit PCI 2.2 compliant card that can be
inserted in any PCI slot. Designed for the open source VoIP application Asterisk, G400P enables
developers to build powerful and innovative communication applications by integrating the GSM
network with the data, VoIP, and PSTN network, on the Asterisk platform.
The device driver for the G400P GSM card, chan_extra, is an open source project supported by
OpenVox. The name chan_extra stands for channel driver – the Extended Telephony Technology
for Asterisk. It is a software component providing similar functions like chan_sip, chan_zap, and
chan_dahdi. As an independent channel driver, chan_extra makes use of the zaptel/DAHDI
interface, and adds only necessary components (such as opvxg4xx) without modifying the
original zaptel/DAHDI codes. This approach makes it easier to maintain as the need to patch
Asterisk every time a new version released is eliminated. The chan_extra and opvxg4xx provides
voice and SMS support through the G400P card.
2.2. Voice/VoIP Telephony Gateways
The Voice/VoIP telephony gateways are used to interconnect to upstream voice providers or
telephone operators for voice termination. They are critical components in the infrastructure in
supporting services that require voice communication, such as SMS-to-call or SMS-to-broadcast.
Telephony gateways are physical devices that send calls to upstream providers either via PSTN
phone lines, or via VoIP through Internet or private data networks. An upstream provider can be a
traditional incumbent PSTN telephone operator or VoIP provider. Both Cisco and Asterisk
gateways support PSTN and VoIP, and therefore, enable us to send calls to both PSTN and VoIP
providers.
There are two types of voice gateways, the Cisco 5350/5400 series gateways and custom built
Asterisk gateways, in our backend infrastructure. The Cisco 5350/5400 gateway offers extremely
high reliability whilst Asterisk offers high reliability at a significantly lower cost. The Asterisk
gateway was built using a Digium PRI card inserted into a PCI slot of a PC server running the
open source Asterisk VoIP application. Using a mix of Cisco and Asterisk gateways allows us to
achieve high reliability and redundancy at a reduced cost. Both Cisco 5350 and Asterisk gateway
supports direct PSTN connection using ISDN PRI, and VoIP.
In the telecommunications industry SIP and H323 are the main VoIP protocols used for
interconnection. Both the Cisco 5350 telephony gateways and the Asterisk VoIP servers support
SIP and H323; therefore enabling us to connect to VoIP providers worldwide. In general, the
voice quality of VoIP is more prone to fluctuation, especially when sent via the open Internet.
However, the capability to send VoIP calls gives us a large choice of potential providers, offering
us voice termination at various quality levels and price points. For residential or business grade
connections, usernames and passwords are usually required to register end points (i.e. IP phone,
or ATA, or softphone) to the providers’ SIP servers. For wholesale interconnections, SIP trunks
are frequently used. They are direct connections authenticated by IP address. SIP trunks can be
setup as private or public connections. For private connections, bandwidth is unlikely an issue and
codecs such as G711 alaw or G711 ulaw could be used for the best possible voice quality. G711
alaw and G711 ulaw are uncompressed codecs. For public Internet connections, most providers
support G729 and G723 codecs. G729 and G723 are compressed codecs and require only 8K and
6.3K bandwidth respectively.
207
4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
Due to the interoperability of the Cisco and Asterisk gateways, calls can be made and bridged
between the same as well as different protocols. It is possible to make an end-to-end call made up
of multiple call legs of PSTN and VoIP (H323 and SIP). In addition, the call legs may use the
same or different voice codecs. The Cisco and Asterisk gateways are able to perform codec
translations in real time. Selection of the right codecs appropriate for the network environment is
important in achieving high voice quality. It is sometimes preferable to use the same codec endto-end if possible, to minimize loss due to compression and decompression as a call traverses
multiple voice switches and gateways.
2.3. Database Servers, Web Servers, and Email Servers
The platform consists of a number of physical and virtual servers, including a number of VMware
ESXi virtualization servers hosting email, web, and application servers as virtual machines, and a
number of physical servers. All servers were custom design and built, and most of them ran on
the CentOS Linux operating system. In general, virtual servers are preferred except in cases
where special hardware is required or there is performance issue. For reliability, redundant
network attached servers (NAS), connected to the VMware servers via iSCSI, were built using the
open source software Openfiler. All virtual machines are stored and run directly from the
Openfiler servers.
The main purpose of the web server is to allow retail providers to connect to our wholesale
platform via HTTP API requests. Our platform is flexible and different groups of APIs were
developed for different types of service offerings. Service web portals, linked to backend
databases, have also been developed for retail providers to setup and manage their own services.
MySQL Database servers were built on dedicated servers rather than as virtual machines for
performance reasons. The database servers are the key systems to which other servers link up for
information and decision making. The database servers hold information in relation to service
configurations, call routing information, service related information such as broadcast lists, user
account details, logs, billing details, and call details records, etc. The integrated development
environment MySQL Workbench was heavily used in the design, development and maintenance
of the databases.
We have custom made a billing system, based on the open source billing software A2Billing and
MySQL, to bill retail providers. This billing system enables us to bill once off, recurrent, and
usage charges, for different service types. For voice and SMS related services, A2Billing provides
great flexibility and a powerful rating engine capable of least cost routing, multi-country support,
multi-currency support, inbound and outbound billing, per call/SMS and per time block billing, to
name a few.
Email servers are also integral parts in the infrastructure. As email is now one of the standards for
the corporate world and personal communications, integrating emails in the wholesale platform
opens up many opportunities for innovative applications.
2.4. Networking Equipment
The platform was built on a commercial Internet service provider’s existing network
infrastructure, which was built using Cisco routers and switches. This includes a number of Cisco
7206 routers multi-homed to a number of upstream IP-transit providers with BGP, and a number
of Cisco Catalyst series switches for LAN switching and interconnections with retail providers
using VLANs. Redundant equipment was setup in two separate data centers in Sydney, linked up
with a dark fiber, for high availability. Retail providers who have a presence in one of our data
centres may interconnect with us directly using low cost Ethernet, Fast Ethernet, or Gigabit
208
5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
Ethernet. Private VLANs and private IP addresses are usually used for these types of connections.
Retail providers who are not collocated in the same data centre can still connect to our platform
via Internet, with data encryption and proper firewall setup on both sides. Both private and public
connections use the same HTTPS API for communications.
3. SMS INTEGRATED SERVICES
In this section, we are providing four main types of SMS integrated services that we have
supplied on the wholesale platform in the past. These examples demonstrate that the platform is
highly flexible enabling service providers to custom design and build their innovative SMS
integrated applications for their customer bases.
3.1. Monitoring and Data Collection Applications
One of the most popular SMS application areas is monitoring and data collection. In e-health
research, SMS has been widely used in diabetic, asthma, and weight, and appointment
management systems [4]-[8]. Figure 2 below shows the infrastructure and integral systems in
building this type of applications.
As an example, an online diabetes monitoring and management system where patients’ blood
sugar levels are received as SMS messages or via the website, and stored in a common backend
MySQL database. In general, the platform supports any websites that may require data collection
via SMS messages. Examples include SMS based voting systems, sports ladder systems, betting
systems, and lucky draw systems.
Figure 2. Configuration for monitoring and data collection applications
3.2. Voice and VoIP Applications
Figure 3 below shows the infrastructure and systems that are required to offer integrated
voice/VoIP and SMS services. In this setup, the Cisco and Asterisk voice/VoIP gateways are
essential for making voice calls to the PSTN network. A typical application is SMS-to-call in
which a customer sends a SMS message to request a call back. As an example, when our system
209
6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
receives a SMS message, e.g. “bankX homeloan”, the voice/VoIP gateway will first make a call
to bankX’s call center responsible for home loan enquiries. Once an operator answers the phone,
the gateway immediately makes a call to the customer’s mobile phone to bridge the two call legs
to establish a telephone conversation.
The integration of voice capability to other services was through the use of Asterisk call files.
When a HTTP API request to make a scheduled call is received, the Apache web server will
immediately generate and transfer a call file to the Asterisk server. Asterisk call files are
structured text files which, when moved to the appropriate directory, are able to automatically
place calls. The Asterisk call file can therefore be considered as the key element in bridging the
data world to the voice world.
Figure 3. Configuration for voice and VoIP applications
The following services can also be provided via this setup:
•
•
•
•
•
SMS-to-follow-me, e.g. a user sends a SMS message for an enquiry, our platform will
ring multiple telephone numbers one by one (call hunting), or simultaneously (ring all)
until an operator answers the call. The phone numbers are preset in the database via web
portals. This service can also be used by frequent international travelers or mobile
workforce whose phone numbers change frequently.
Click-to-call or web callback service [13], e.g. a user clicks on a button on a website to
enter a phone number to receive a call back from the website operator. This service is
similar to SMS-to-call except the calls are activated through a website instead of SMS.
Our wholesale platform provides a HTTP API to support both the SMS-to-call and clickto-call services.
SMS and IVR payment services. Payment instructions are received via SMS or IVR with
PIN authentication.
SMS-to-speech, where a SMS text message is converted to speech or voice prompts for
broadcasting or replay as IVRs using the voice/VoIP gateways. Our system supports male
and female voices, and American, British, and Indian accents.
Other voice/VoIP enabled services such as call recording, IVR, and follow-me.
3.3. Transaction Verification Applications
Figure 4 shows the configuration of the wholesale platform for e-commerce transaction
verification applications. For this type of applications, the website owner generates a random
210
7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
string or verification code, extracts the mobile phone number of the user requesting the online
transaction from the database, and passes them to our platform via a HTTP API. As the wholesale
provider, we do not have any private information in relation to the end user. This information is
usually collected via the website under the control of the retail provider. All our platform does is
to send the verification code to the mobile phone number using the GSM gateway, and to keep
records for billing purpose. Once the SMS verification code is received, the end user can enter
that to complete the online transaction. Typical applications include online registrations and
payment transfer. In general, this configuration can be used to support any kind of online
transactions and e-commerce that require SMS verifications. Similarly, it can be used for any
online process to withhold and send certain key information via SMS for better security.
Figure 4. Configuration for e-commerce transaction verification applications
3.4. International SMS and Broadcast Applications
Figure 5 below shows the infrastructure needed to offer services that sending outbound domestic
and international SMS messages is required. Due to the limited capacity of the GSM gateway, our
platform interconnects with a number of upstream SMS carriers to terminate outbound SMS
traffic. Interconnection with upstream carriers can be established easily via HTTP API requests
through Internet. These carriers can provide international SMS termination on per message sent
basis. Depending on the destinations, the rates vary and can be expensive.
A typical HTTP request will include a number of parameters, such as username, password, sender
mobile number, receiver mobile number, and the message content. The HTTP requests may be
unencrypted or encrypted depending on the type of connections. It is possible to schedule a SMS
by adding a date/time parameter. After a text message is sent, the upstream carrier will reply with
a delivery receipt as an email or HTTP response with message ID, status, and error message if
any, to one of our Apache web servers. Following is a typical HTTP request:
http://www.smsproviderx.com/api.php?mode=sendsms&username=xxx&password=xyz&from=6
14xxxxxxxx&to=614yyyyyyyy&textmsg=Hey%20Jude&sendtime=2013-0818%2018%3A18%3A18
211
8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
Figure 5. Configuration for broadcast applications
As a wholesale provider, the role is to receive and relay the SMS messages to upstream providers
for termination. A few applications making use of this configuration are given below:
•
•
•
•
•
•
•
Information delivery via SMS, e.g. a car sales website sending seller and car details via
SMS when a potential buyer clicks on a hyperlink.
Single or bulk SMS-to-SMS, e.g. a soccer coach sending a SMS with the content “grade1
match cancelled” to notify all first grade players that the match is cancelled.
Single or bulk web-to-SMS, e.g. emergency services using a web portal to enter and
broadcast messages to residents of certain areas. Upstream SMS termination providers are
used for high volume message broadcasts.
Single
or
bulk
email-to-SMS,
e.g.
a
user
sends
an
email
to
phone_noX@email2sms.isp.com and the owner of phone_noX receives the email as a
SMS message. For broadcasting an email is sent to groupX@email2sms.isp.com for a
pre-defined list of phone numbers associated with groupX.
Single or bulk SMS-to-email. This type of services costs much less due to email rather
than SMS delivery.
SMS marketing with QR codes. When a potential customer scans a QR code, his/her
phone number and the pre-written text message will be sent back to the marketer.
SMS reminder and notification systems.
4. CONCLUSIONS
In this paper, we have presented a wholesale platform for service providers to develop and offer
SMS integrated services. A wide range of innovative services have been developed and offered
by a number of service providers. The platform has been proven to be flexible, scalable and
reliability.
212
9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
ACKNOWLEDGEMENTS
The authors would like to thank the Australian Government, Department of Innovation Industry,
Science and Research, AusIndustry for its financial support through the Innovation Australia
R&D Tax Concession scheme.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
J. Brown, B. Shipman, and R. Vetter, “SMS: The short message service,” Computer, IEEE, vol.
40, no. 12, pp. 106-110, December, 2007.
G. Peersman, P. Griffiths, H. Spear, S. Cvetkovic, and C. Smythe, “A tutorial overview of the
short message service within GSM,” Computing & Control Engineering Journal, vol. 11, no. 2,
April 2000, pp. 79-89.
M. R. Power and D. Power, “Everyone here speaks TXT: Deaf people using SMS in Australia and
the rest of the world,” Journal of Deaf Studies and Deaf Education, vol. 9, no. 3, 2004, pp. 333343.
H. S. Kwon, J. H. Cho, H. S. Kim, J. H. Lee, B. R. Song, and J. A. Oh, et al., “Development of
web-based diabetic patient management system using short message service (SMS),” Diabetes
Research
and
Clinical
Practice,
vol.
66S,
pp.
S133-S137,
2004,
doi:10.1016/j.diabres.2003.10.028.
K. C. Chan, L. Wong, and D. B. Chan, “Design of a large scale community based selfmanagement system for diabetes mellitus,” in Studies in Health Technology and Informatics, vol.
182, pp. 58-66, November, 2012, doi:10.3233/978-1-61499-152-6-58.
J. Anhøj and C. Møldrup, “Feasibility of collecting diary data from asthma patients through mobile
phones and SMS (short message service): response rate analysis and focus group evaluation from a
pilot study,” Journal of Medical Internet Research, vol. 6, no. 4, December, 2004,
doi:10.2196/jmir.6.4.e42.
V. Ostojic, B. Cvoriscec, S. B. Ostojic, D. Reznikoff, A. Stipic-Markovic, and Z. Tudjman,
“Improving asthma control through telemedicine: a study of short-message service,” Telemedicine
Journal and E-Health, vol. 11, no. 1, 2005, pp. 28-35.
N. S. Joo and B. T. Kim, “Mobile phone short message service messaging for behaviour
modification in a community-based weight control programme in Korea,” Journal of Telemedicine
and Telecare, vol. 13, no. 8, 2007, pp. 416-420.
S. Fong and E. Lai, “Mobile mini-payment scheme using SMS-credit,” in Computational Science
and Its Applications – ICCSA 2005. Lecture Notes in Computer Science (3481), Berlin,
Heidelberg: Springer, 2005, pp. 1106-1114.
H. Harb, H. Farahat, and M. Ezz, “SecureSMSPay: Secure SMS Mobile Payment model,” in Proc.
2nd Int. Conf. Anti-Counterfeiting, Security and Identification, 2008, pp. 11-17.
B. S. Fjeldsoe, A. L. Marshall, and Y. D. Miller, “Behavior change interventions delivered by
mobile telephone short-message service,” American journal of preventive medicine, vol. 36, no. 2,
2009, pp. 165-173.
R. T. Lester, P. Ritvo, E. J. Mills, A. Kariri, S. Karanja, and M. H. Chung, el al., “Effects of a
mobile phone short message service on antiretroviral treatment adherence in Kenya (WelTel
Kenya1): a randomised trial,” The Lancet, vol. 376, no. 9755, November 2010, pp. 1838-1845.
K. C. Chan, “A wholesale web callback service,” in Proc. 8th Int. Conf. Information Technology
and Applications (ICITA 2013), IEEE, Sydney, Australia, 1-4 July, 2013.
213
10. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
Authors
Ka Ching Chan received his BASc in Engineering Science and MASc in Mechanical
Engineering from the University of Toronto, Canada, and his PhD in Manufacturing
Engineering from the University of New South Wales, Australia. He was previously a Senior
Lecturer at the University of New South Wales, and a Visiting Assistant Professor at the
Hong Kong University of Science and Technology. Dr. Chan also had extensive industry
experiences as founders and CTOs in growing technology companies from startups to public companies.
Dr. Chan is currently a Lecturer in Information Technology at La Trobe University and a Visiting Fellow in
Mechatronics at the University of New South Wales. He is currently serving as the Secretary of the IEEE
Computer Society, NSW Chapter.
David Tien received his undergraduate, master's and Ph.D. degrees in Computer Science,
Pure Mathematics and Electrical Engineering from Harbin, Chinese Science Academy, the
Ohio State University, and the University of Sydney, respectively. Prior to joining the School
of Computing and Mathematics, Charles Sturt University in 2000, he had 20 years'
experience researching and lecturing at the University of Sydney, Ohio State University and
Singapore. Currently, his major research interests are GIS, image and signal processing,
telecommunication, education theory, and biomedical engineering. During the past 25 years, David served
as the Chairman, Secretary, Treasurer and Chairman of the IEEE Sections in Australia and Singapore, and
is currently the Chairman of NSW Computer Chapter. David also served as an elected member of the
Charles Sturt University Council. David enjoys working and travelling. Currently, he has one child, one
wife, and one dog who rules the house.
214