International Journal of Information and Communication Sciences

Volume 6, Issue 2, June 2021

  • Theoretical and Practical Experiences in the Use and Appreciation of the Audiovisual Aids by Professionals in Education

    Abel Alfonso Castro, Yuri Belén Ramírez, Carmen Rosa Seijas Bagué, Ana María Reyes Suárez, Edward Peter Kardas

    Issue: Volume 6, Issue 2, June 2021
    Pages: 22-29
    Received: 6 February 2021
    Accepted: 26 March 2021
    Published: 20 April 2021
    Downloads:
    Views:
    Abstract: The gradual incorporation of information and communication technologies influences all sectors of society, and education is not immune to this phenomenon, which has led to the use of various technological resources, including audiovisual aids. Their adoption poses constant challenges, since it requires knowledge and mastery of skills, so all actors... Show More
  • Distributed Decision Fusion with M-ary Signaling and k-bit Transmission on Sensor Observation in Wireless Sensor Networks

    Victor Wen-Kai Cheng, Tsang-Yi Wang

    Issue: Volume 6, Issue 2, June 2021
    Pages: 30-37
    Received: 13 March 2021
    Accepted: 30 March 2021
    Published: 7 May 2021
    Downloads:
    Views:
    Abstract: Multi-level decisions on sensor detection is able to improve the detection performance on the final decision made at the fusion center (FC) in wireless sensor networks (WSN). In this paper, the performance analysis of an M-ary signaling (MS) scheme using analog transmission and a k-bit transmission (KB) scheme is both examined for distributed binar... Show More
  • Speculative Packet Dispatch for Virtual Output Queuing Architecture Using LSTM Recurrent Neural Network

    Alex Sumarsono, Mario Rodriguez

    Issue: Volume 6, Issue 2, June 2021
    Pages: 38-45
    Received: 27 April 2021
    Accepted: 17 May 2021
    Published: 27 May 2021
    Downloads:
    Views:
    Abstract: Virtual Output Queuing (VOQ) is an architecture widely employed in modern networking products. Traffic from every ingress port is stored in a set of queues mirroring the structure of the egress ports. This architecture allows congestion on one egress port to be isolated from the other ports. A request-grant protocol is used to route packets from in... Show More
  • Introduction Risk Assessment Method Threatening Letters: A Structured Approach for Disturbing and Threatening Letters

    Margaret Diekhuis-Kuiper

    Issue: Volume 6, Issue 2, June 2021
    Pages: 46-54
    Received: 12 May 2021
    Accepted: 4 June 2021
    Published: 16 June 2021
    Downloads:
    Views:
    Abstract: The Risk Assessment Method Threatening Letters (RAT in brief) provides assessors such as forensic psychologists working for law enforcement and justice departments with a structured assessment method for threatening letters. On the basis of an assessment framework and guidelines, threatening letters will be analysed according to eighteen characteri... Show More