SlideShare a Scribd company logo
1 of 34
Download to read offline
OOccttoobbeerr 22002200:: TToopp RReeaadd
AArrttiicclleess iinn AAccaaddeemmiiaa ffoorr IIJJCCNNCC
International Journal of Computer
Networks & Communications (IJCNC)
ISSN 0974 - 9322 (Online) ; 0975 - 2293
(Print)
http://airccse.org/journal/ijcnc.html
Contact US: ijcnc@airccse.org
AN EFFICIENT DATA COLLECTION PROTOCOL FOR UNDERWATER
WIRELESS SENSOR NETWORKS
Khaled Day1
, Faiza Al-Salti2
, Abderezak Touzene1
and Nasser Alzeidi1
1
Department of Computer Science, Sultan Qaboos University, Muscat, Oman
2
Muscat College, Muscat, Oman
Abstract
This paper presents the design and evaluation of a new data collection protocol for Underwater
Wireless Sensor Networks called the Data Collection Tree Protocol (DCTP). It uses an efficient
distributed algorithm to proactively construct and maintain a data collection tree rooted at the
sink node. The preconstructed and maintained data collection tree allows the efficient selection
of a single forwarding node at each hop when routing a data packet. We prove the correctness of
the constructed data collection tree and we show that under some stability conditions, the
constructed tree converges to an optimal shortestpath tree. Results of extensive simulations show
a big improvement in terms of packet delivery ratio, endto-end delay and energy consumption
compared to the well-known VBF protocol. The simulated cases show increases in the packet
delivery ratio between 20% and 122%, reductions in the average end-to-enddelay between 15%
and 55% and reductions in the energy consumption between 20% and 50%. These results clearly
demonstrate the attractiveness of the proposed DCTP protocol.
Keywords:
Underwater Wireless Sensor Networks, Data Collection, Routing Protocols, Performance
Evaluation
Orginal Source URL: https://aircconline.com/ijcnc/V12N5/12520cnc01.pdf
Volume Link: http://airccse.org/journal/ijc2020.html
References
[1] K. Chen, M. Ma, E. Cheng, F. Yuan, and W. Su, A Survey on MAC Protocols for
Underwater Wireless Sensor Networks, IEEE Comm. Surveys & Tut., vol. 16, no. 3, pp. 1433–
1447, 2014.
[2] G. Tuna, G andV.C. Gungor, A Survey on Deployment Techniques, Localization Algorithms,
and Research Challenges for Underwater Acoustic Sensor Networks. Int. J. Commun. Syst., Vol.
30, Issue 17, pp. 1-21, 2017.
[3] Z. Wang,X. Feng, G. Han, Y. Sui, and H. Qin, EODL: Energy Optimized Distributed
Localization Method in 3DUnderwater Acoustic Sensors Networks. Computer Networks 2018,
141, 179–188.
[4] F. Al Salti, N. Alzeidi, and B. Arafeh, EMGGR: An Energy-Efficient Multipath Grid-Based
Geographic Routing Protocol for Underwater Wireless Sensor Networks, Wireless Networks,
volume 23, no. 4, pp. 1301–1314, May 2017.
[5] R. Gomathi andJ.M.L. Manickam, Energy Efficient Shortest Path Routing Protocol for
Underwater Acoustic Wireless Sensor Network. Wireless Personal Commun. 2018, 98, 843–856.
[6] S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, Void-Handling Techniques for Routing
Protocols in Underwater Sensor Networks: Survey and Challenges. IEEE Communications
Surveys Tutorials 19, 2 (Secondquarter 2017), 800–827, 2017.
[7] Z. H. Jiang, Underwater Acoustic Networks-Issues and Solutions, International Journal of
Intelligent Control and Systems, vol. 13, no. 3, pp.152–161, 2008.
[8] M. Ahmed, Routing Protocols for Underwater Wireless Sensor Network Based on Location:
A Survey, Ad Hoc & Sensor Wireless Networks, 38:67-101, 2018.
[9] T. Islam, andY. K. Lee, A Comprehensive Survey of Recent Routing Protocols for
Underwater Acoustic Sensor Networks. Sensors, 19(19), 4256. doi:10.3390/s19194256.
[10] G. Han, J. Jiang, N. Bao, L. Wan, and M. Guizani, Routing Protocols for Underwater
Wireless Sensor Networks, IEEE Communications Magazine, pp. 72-78, November 2015.
[11] P. Xie, J.-H. Cui, and L. Lao, VBF: Vector-Based Forwarding Protocol for Underwater
Sensor Networks, in Proceedings of IFIP Networking'06, Coimbra, Portugal, 2006, pp. 1216–
1221.
[12] H. Yan, Z. J. Shi, and J.-H. Cui, Depth Based Routing for Underwater Sensor Networks, in
Proc. 7th International IFIP-TC6 Networking Conference on Ad-Hoc and Sensor Networks,
Wireless Networks, Next Generation Internet, Singapore, 2008, pp. 72-86.
[13] J. M. Jornet, M. Stojanovic, and M. Zorzi, Focused Beam Routing Protocol for Underwater
Acoustic Networks, I Proc. International Conference on Mobile Computing and Networking,
ACM International Workshop on Underwater Networks, San Francisco, 2008. pp. 75–82.
[14] Y.-S. Chen, T.-Y. Juang, Y.-W. Lin, and I.-C. Tsai, A Low Propagation Delay Multi-Path
Routing Protocol for Underwater Sensor Networks,J. of Int. Technology, vol. 11, no. 2, 153–165,
2010.
[15] P. Xie et al., Aqua-Sim: An NS-2 Based Simulator for Underwater Sensor Networks, in
Proceedings of MTS/IEEE Biloxi - Marine Technology for Our Future: Global and Local
Challenges (OCEANS 2009), 2009, pp. 1–7.
[16] LinkQuest: Underwater Acoustic Modem Models. [Online]. Available:
http://www.linkquest.com/html/models1.htm. [Accessed: 10-Apr-2018].
[17] J.-H. Cui, J. Kong, M. Gerla, and S. Zhou, The challenges of building mobile underwater
wireless networks for aquatic applications, IEEE Networks, vol. 20, no. 3, pp. 12–18, May 2006.
[18] Z. S. Peng Xie, Zhong Zhou, Zheng Peng, Jun-hong Cui, Void Avoidance in Mobile
Underwater Sensor Networks, in WUWNet’07, 2007.
[19] X. Hong, M. Gerla, G. Pei, and C.-C. Chiang, A Group Mobility Model for Ad Hoc
Wireless Networks, in Proceedings of the 2nd ACM International Workshop on Modeling,
Analysis and Simulation of Wireless and Mobile Systems - MSWiM ’99, 1999, pp. 53–60.
[20] Z. Zhou, Z. Peng, J.-H. Cui, Z. Shi, and A. Bagtzoglou, Scalable Localization with Mobility
Prediction for Underwater Sensor Networks, IEEE Trans. Mob. Comput., vol. 10, no. 3, pp. 335–
348, Mar. 2011.
[21] Faiza Al-Salti, Nasser Alzeidi , Khaled Day , Abderezak Touzene, An Efficient and Reliable
GridBased Routing Protocol for UWSNs by Exploiting Minimum Hop Count, Computer
Networks 162 (2019) 106869.
A SECURE DATA COMMUNICATION SYSTEM USING
CRYPTOGRAPHY AND STEGANOGRAPHY
Saleh Saraireh
Department of Communications and Electronic Engineering, Philadelphia University,
Amman,Jordan.
Abstract
The information security has become one of the most significant problems in data
communication. So it becomes an inseparable part of data communication. In order to address
this problem, cryptography and steganography can be combined. This paper proposes a secure
communication system. It employs cryptographic algorithm together with steganography. The
jointing of these techniques provides a robust and strong communication system that able to
withstand against attackers. In this paper, the filter bank cipher is used to encrypt the secret text
message, it provide high level of security, scalability and speed. After that, a discrete wavelet
transforms (DWT) based steganography is employed to hide the encrypted message in the cover
image by modifying the wavelet coefficients. The performance of the proposed system is
evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results
show that, the proposed system provides high level of security.
Keywords:
Steganography, Cryptography, DWT, Filter bank, PSNR.
Orginal Source URL: http://airccse.org/journal/cnc/5313cnc10.pdf
Volime Link: http://airccse.org/journal/ijc2013.html
References
[1 ] Obaida Mohammad Awad Al-Hazaimeh, (2013) "A New Approach for Complex Encrypting
and Decrypting Data" International Journal of Computer Networks & Communications (IJCNC)
Vol.5, No.2.
[2] Katzenbeisser, S. and Petitcolas, F.A.P. 2000, Information Hiding Techniques for
Steganography and Digital Watermarking. Artech House, Inc., Boston, London.
[3] Xinpeng Zhang and Shuozhong Wang, (2005), "Steganography Using MultipleBase
Notational System and Human Vision Sensitivity", IEEE signal processing letters, Vol. 12, No.
1.
[4] Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE signal processing letters, Vol.
13, No. 5.
[5] Piyush Marwaha, Paresh Marwaha, (2010), "Visual Cryptographic Steganography in
images", IEEE, 2nd International conference on Computing, Communication and Networking
Technologies.
[6] G.Karthigai Seivi, Leon Mariadhasan and K. L. Shunmuganathan, (2012), " Steganography
Using Edge Adaptive Image " IEEE, International Conference on Computing, Electronics and
Electrical Technologies.
[7] Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, (2012), " A Secure and
High Capacity Image Steganography Technique", Signal & Image Processing : An International
Journal (SIPIJ) Vol.4, No.1.
[8] Tong L.and Zheng-ding, Q, (2002), "DWT-based color Images Steganography Scheme",
IEEE International Conference on Signal Processing, 2:1568-1571.
[9] Mandal J.K. and Sengupta M., (2010), “Authentication/Secret Message Transformation
Through Wavelet Transform based Subband Image Coding (WTSIC).”, Proceedings of
International Symposium on Electronic System Design, IEEE Conference Publications, pp 225 –
229.
[10] Septimiu F. M., Mircea Vladutiu and Lucian P., (2011),"Secret data communication system
using Steganography, AES and RSA", IEEE 17th International Symposium for Design and
Technology in Electronic Packaging.
[11] H. Tian, K. Zhou, Y. Huang, D. Feng, J. Liu, (2008), "A Covert Communication Model
Based on Least Significant Bits Steganography in Voice over IP", IEEE The 9th International
Conference for Young Computer Scientists, pp. 647-652.
[12] Y. Huang, B. Xiao, H. Xiao, (2008), "Implementation of Covert Communication Based on
Steganography", IEEE International Conference on Intelligent Information Hiding and
Multimedia Signal Processing, pp. 1512-1515.
[13] Cheddad, A, Condell, Joan, Curran, K and McKevitt, Paul,(2008), "Securing Information
Content using New Encryption Method and Steganography", IEEE Third International
Conference on Digital Information Management.
[14] Rasul E., Saed F. and Hossein S, (2009), " Using the Chaotic Map in Image
Steganography", IEEE, International Conference on Signal Processing Systems.
[15] Majunatha R. H. S. and Raja K B, (2010), "High Capacity and Security Steganography
using Discrete Wavelet Transform", International Journal of Computer Science and Security
(IJCSS), Vol. 3: Issue (6) pp 462-472.
[16] Saraireh S. and Benaissa M., (2009), “A Scalable Block Cipher Design using Filter Banks
and Lifting over Finite Fields” In IEEE International Conference on Communications (ICC),
Dresden, Germany.
[17] El Safy, R.O, Zayed. H. H, El Dessouki. A, (2009), “An adaptive steganography technique
based on integer wavelet transform,” ICNM International Conference on Networking and Media
Convergence, pp 111-117.
JAMMING DETECTION BASED ON DOPPLER SHIFT ESTIMATION IN
VEHICULAR COMMUNICATIONS SYSTEMS
Javad Afshar Jahanshahi
Universidad Católica Los Ángeles de Chimbote, Instituto de Investigación, Chimbote, Perú
Abstract
Since Doppler shift is one of the most important parameters in wireless propagation, the
evaluation of the Doppler shift at the base station (BTS) in vehicular communications improves
BTS in many aspects such as channel varying rate, jamming detection, and handover operations.
Therefore, in this study, we propose a novel method at a base station based on the received user
signal to estimate the channel Doppler shift seen by BTS. Utilizing the inherent information
existed in common receivers, a level crossing rate (LCR) based Doppler shift estimation
algorithm is developed without any excessive hardware. Moreover, a jamming detection
algorithm is improved based on the proposed Doppler shift estimation scheme. The performance
of the proposed scheme is evaluated in a Terrestrial Trunked Radio (TETRA) network, and
comprehensive experimental results have shown superior performance in a wide range of
velocities, signal to noise ratios and jammers.
Keywords:
Jamming Detection, Vehicular Communications, Level Crossing Rate, Mobile Communication,
TETRA (Terrestrial Trunked Radio).
Orginal Source URL: https://aircconline.com/ijcnc/V12N5/12520cnc02.pdf
Volime Link: http://airccse.org/journal/ijc2020.html
References
[1] Sampath, A., &Holtzman, J. M. (2003, May). Estimation of maximum Doppler frequency for
handoff decisions.In IEEE 43rd Vehicular Technology Conference (pp. 859-862).IEEE.
[2] Merwaday, A., &Güvenç, I. (2016). Handover count based velocity estimation and mobility
state detection in dense HetNets. IEEE Transactions on Wireless Communications, 15(7), 4673-
4688.
[3] Baddour, K. E., & Beaulieu, N. C. (2015). Robust Doppler spread estimation in nonisotropic
fading channels. IEEE Transactions on Wireless Communications, 4(6), 2677-2682.
[4] Bellili, F., Selmi, Y., Affes, S., &Ghrayeb, A. (2017). A low-cost and robust maximum
likelihood joint estimator for the Doppler spread and CFO parameters over flat-fading Rayleigh
channels. IEEE Transactions on Communications, 65(8), 3467-3478.
[5] Anim-Appiah, K. D. (1999). On generalized covariance-based velocity estimation. IEEE
Transactions on Vehicular Technology, 48(5), 1546-1557.
[6] Zhang, H., &Abdi, A. (2009). Nonparametric mobile speed estimation in fading channels:
Performance analysis and experimental results. IEEE transactions on wireless communications,
8(4), 1683-1692.
[7] Holtzman, J. M., &Sampath, A. (2005). Adaptive averaging methodology for handoffs in
cellular systems. IEEE Transactions on Vehicular Technology, 44(1), 59-66.
[8] Zemen, T., &Molisch, A. F. (2012). Adaptive reduced-rank estimation of nonstationary time-
variant channels using subspace selection. IEEE Transactions on Vehicular Technology, 61(9),
4042-4056.
[9] Tepedelenlioğlu, C., Abdi, A., Giannakis, G. B., &Kaveh, M. (2011). Estimation of Doppler
spread and signal strength in mobile communications with applications to handoff and adaptive
transmission. Wireless Communications and Mobile Computing, 1(2), 221-242.
[10] Engdahl, K., &Andersson, L. (2010).Detection of high velocity movement in a
telecommunication system.U.S. Patent No. 7,647,049. Washington, DC: U.S. Patent and
Trademark Office.
[11] Austin, M. D., &Stuber, G. L. (2004). Velocity adaptive handoff algorithms for
microcellular systems. IEEE Transactions on Vehicular Technology, 43(3), 549-561.
[12] Klein, T. E., Leung, K. K., &Zheng, H. (2007).Method and apparatus for scheduling
transmissions in wireless data networks.U.S. Patent No. 7,283,814. Washington, DC: U.S. Patent
and Trademark Office.
[13] Mottier, D., &Castelain, D. (2009, September). A Doppler estimation for UMTS-FDD
based on channel power statistics. In Gateway to 21st Century Communications Village.VTC
1999-Fall. IEEE VTS 50th Vehicular Technology Conference (Cat. No. 99CH36324) (Vol. 5,
pp. 3052-3056).IEEE.
[14] Liu, Q. Y., Wang, M., &Zhong, Z. D. (2011). Statistics of capacity analysis in high speed
railway communication systems. Tamkang Journal of Science and Engineering, 14(3), 209-215.
[15] Tepedelenlioğlu, C., Abdi, A., Giannakis, G. B., &Kaveh, M. (2011). Estimation of Doppler
spread and signal strength in mobile communications with applications to handoff and adaptive
transmission. Wireless Communications and Mobile Computing, 1(2), 221-242.
[16] Zhang, C., Fan, P., Dong, Y., &Xiong, K. (2015). Service‐based high‐speed railway base
station arrangement. Wireless Communications and Mobile Computing, 15(13), 1681-1694.
[17] Jingyu, H., Xiaohu, Y., Bin, S., & Kim, Y. H. (2014, May). A Scheme for the Doppler shift
estimation despite the Power control in Mobile Communication Systems. In 2004 IEEE 59th
Vehicular Technology Conference.VTC 2004-Spring (IEEE Cat.No. 04CH37514) (Vol. 1, pp.
284- 288).IEEE.
[18] Shu, M. L., Hua, J. Y., Li, F., Xu, Z. J., & Wang, D. M. (2014, November). Doppler shift
estimation exploiting iterative processing in mobile communications. In 2014 International
Workshop on High Mobility Wireless Communications (pp. 53-56). IEEE.
[19] Austin, M. D., &Stuber, G. L. (2004). Eigen-based Doppler estimation for differentially
coherent CPM. IEEE transactions on Vehicular Technology, 43(3), 781-785.
[20] Choi, Y. S., &Alamouti, S. (2010).Doppler frequency determination for mobile wireless
devices.U.S. Patent No. 7,801,084. Washington, DC: U.S. Patent and Trademark Office.
[21] Jinyu, H., Han, H., Qingmin, M., &Xiaohu, Y. (2014, September). A scheme for the SNR
estimation and its application in Doppler shift estimation of mobile communication systems.In
IEEE 60th Vehicular Technology Conference, 2004.VTC2004-Fall.2004 (Vol. 1, pp. 24-
27).IEEE.
[22] Ke, X. Q., Yuan, F., Gao, C. X., & Cheng, E. (2018, December). A robust and efficient
digital FM underwater acoustic voice communication system based on SNR estimation.In
Proceedings of the Thirteenth ACM International Conference on Underwater Networks &
Systems (pp. 1-5).
[23] Krasny, L., Arslan, H., Koilpillai, D., &Chennakeshu, S. (2011). Doppler spread estimation
in mobile radio systems. IEEE communications letters, 5(5), 197-199.
[24] Veluppillai, M., Sangary, N. T., Simmons, S. B., &Jarmuszewski, P. (2013).Method, device
and system for detecting the mobility of a mobile device.U.S. Patent No. 8,442,447. Washington,
DC: U.S. Patent and Trademark Office.
[25] Narasimhan, R., & Cox, D. C. (2009). Speed estimation in wireless systems using wavelets.
IEEE Transactions on Communications, 47(9), 1357-1364.
[26] Rezende, C., Boukerche, A., Pazzi, R. W., Rocha, B. P., &Loureiro, A. A. (2011). The
impact of mobility on mobile ad hoc networks through the perspective of complex networks.
Journal of Parallel and Distributed Computing, 71(9), 1189-1200.
[27] Sha, Y., Yao, N., &Xu, X. (2008, October). Improvement and Performance Analysis of A
Scheme for the Maximum Doppler Frequency Estimation. In 2008 4th International Conference
on Wireless Communications, Networking and Mobile Computing (pp. 1-4).IEEE.
[28] Nanda, S., Rezaiifar, R., &Yavuz, M. (2014).Method and apparatus for interference
management, U.S. Patent No. 8,923,212. Washington, DC: U.S. Patent and Trademark Office.
[29] Cho, M. G., & Hong, D. (2016).Velocity Estimation Apparatus and Method Using Level
Crossing Rate.U.S. Patent No. 7,120,440. Washington, DC: U.S. Patent and Trademark Office.
[30] Forenza, A., & Perlman, S. G. (2017).System and method for managing inter-cluster
handoff of clients which traverse multiple DIDO clusters, U.S. Patent No. 9,826,537.
Washington, DC: U.S. Patent and Trademark Office.
[31] Mark, S., Rafael, C., & Salomon, S. (2013). Transceivers and method for use in radio
communications. European Patent Application, EP, 1(304), 895.
[32] Gorokhov, A., Khandekar, A., Tingfang, J. I., &Bhushan, N. (2015).System and method to
enable resource partitioning in wireless networks.U.S. Patent No. 9,179,469. Washington, DC:
U.S. Patent and Trademark Office.
[33] Moscovitz, Y., Deperini, F., &Locatelli, M. (2010).Method and User Equipment for
Jamming Detection and Signaling in a Mobile Telecommunications Network,U.S. Patent No.
7,680,450. Washington, DC: U.S. Patent and Trademark Office.
[34] Breuer, V., &Wehmeier, L. (2019). Method of detecting a jamming transmitter affecting a
communication user equipment. U.S. Patent No. 10,263,726. Washington, DC: U.S. Patent and
Trademark Office.
[35] Kurhila, M., &Torvinen, M. (2014). Base station. United State Patent, 203423, A1.
[36] Shepard, C., Yu, H., Anand, N., Li, E., Marzetta, T., Yang, R., &Zhong, L. (2012, August).
Argos: Practical many-antenna base stations. In Proceedings of the 18th annual international
conference on Mobile computing and networking (pp. 53-64).
[37] Jover, R. P., &Murynets, I. (2016). U.S. Patent No. 9,295,028. Washington, DC: U.S. Patent
and Trademark Office.
[38] Bereziński, P., Szpyrka, M., Jasiul, B., & Mazur, M. (2016, September). Network anomaly
detection using parameterized entropy.In IFIP International Conference on Computer
Information Systems and Industrial Management (pp. 465-478).Springer, Berlin, Heidelberg.
[39] Behal, S., & Kumar, K. (2017). Detection of DDoS attacks and flash events using novel
information theory metrics. Computer Networks, 116, 96-110.
[40] Waskita, A. A., Suhartanto, H., &Handoko, L. T. (2016, October). A performance study of
anomaly detection using entropy method.In 2016 International Conference on Computer,
Control, Informatics and its Applications (IC3INA) (pp. 137-140). IEEE.
[41] Spuhler, M., Giustiniano, D., Lenders, V., Wilhelm, M., & Schmitt, J. B. (2014). Detection
of reactive jamming in DSSS-based wireless communications. IEEE Transactions on Wireless
Communications, 13(3), 1593-1603.
[42] Vijayakumar, K. P., Ganeshkumar, P., Anandaraj, M., Selvaraj, K., &Sivakumar, P. (2018).
Fuzzy logic–based jamming detection algorithm for cluster-based wireless sensor network.
International Journal of Communication Systems, 31(10), e3567.
[43] Hamamoto, A. H., Carvalho, L. F., Sampaio, L. D. H., Abrão, T., &ProençaJr, M. L. (2018).
Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Systems
with Applications, 92, 390-402.
[44] Khan, M. A., Khan, S., Shams, B., &Lloret, J. (2016). Distributed flood attack detection
mechanism using artificial neural network in wireless mesh networks. Security and
Communication Networks, 9(15), 2715-2729.
[45] Rappaport, T. S. (2006). Wireless communications: principles and practice (Vol. 2). New
Jersey: prentice hall PTR.
[46] Lin, L., So, H. C., & Chan, Y. T. (2013). Accurate and simple source localization using
differential received signal strength. Digital Signal Processing, 23(3), 736-743.
CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO
PREDICT STUDENT PERFROMANCE
Mital Doshi 1
, Dr.Setu K Chaturvedi, Ph.D 2
1
Mtech. Research Scholar Technocrats Institute of Technology Bhopal, India
2
Professor & HOD (Dept. of CSE) Technocrats Institute of Technology Bhopal, India
Abstract
Education data mining is an emerging stream which helps in mining academic data for solving
various types of problems. One of the problems is the selection of a proper academic track. The
admission of a student in engineering college depends on many factors. In this paper we have
tried to implement a classification technique to assist students in predicting their success in
admission in an engineering stream.We have analyzed the data set containing information about
student’s academic as well as sociodemographic variables, with attributes such as family
pressure, interest, gender, XII marks and CET rank in entrance examinations and historical data
of previous batch of students. Feature selection is a process for removing irrelevant and
redundant features which will help improve the predictive accuracy of classifiers. In this paper
first we have used feature selection attribute algorithms Chi-square.InfoGain, and GainRatio to
predict the relevant features. Then we have applied fast correlation base filter on given features.
Later classification is done using NBTree, MultilayerPerceptron, NaiveBayes and Instance based
–K- nearest neighbor. Results showed reduction in computational cost and time and increase in
predictive accuracy for the student model
Keywords:
Chi-square, Correlation feature selection, IBK, Infogain, Gainratio, Multilayer perceptron,
NaiveBayes, NBTree
Orginal Source URL: http://airccse.org/journal/cnc/6314cnc15.pdf
Volime Link: http://airccse.org/journal/ijc2014.html
References
[1] Ladha L. and Deepa T., "Feature Selection Methods and Algorithms", International Journal
on Computer Science and Engineering (IJCSE), 2011.
[2] R. Kohavi. “Scaling Up the Accuracy of Naive-Bayes Classifiers: a Decision-Tree Hybrid”
Proceedings of the Second International Conference on Knowledge Discovery and Data Mining,
1996
[3] Baker, R.S.J.D. (2010). Data Mining for Education. In B. McGaw, P. Peterson, E. Baker
(eds.), International Encyclopaedia of Education (3rd edition), (pp. 112-118). Oxford, UK:
Elsevier
[4] Pathom Pumpuang, Anongnart Srivihok , Prasong Praneetpolgrang, “Comparisons of
Classifier Algorithms: Bayesian Network, C4.5, Decision Forest and NBTree for Course
Registration Planning Model of Undergraduate Students”, 1-4244-2384-2/08/ 2008 IEEE
[5] Miren Tanna, “Decision Support System for Admission in Engineering Colleges based on
Entrance Exam Marks”, IJCA(0975 – 8887) Volume 52– No.11, August 2012
[6] Malaya Dutta Borah, Rajni Jindal, Daya Gupta Ganesh Chandra Deka, “Application of
knowledge based decision technique to predict student enrollment decision”, 978-1-4577-0792-
6/11 2011 IEEE
[7] Qasem A. Al-Radaideh, Ahmad Al Ananbeh, and Emad M. Al-Shawakfa, “A classification
model for predicting the suitable study track for school students”, Vol8
Issue2/IJRRAS_8_2_15.pdf, August 2011
[8] Hany M. Harb1, Malaka A. Moustafa, “Selecting optimal subset of features for student
performance model”, IJCSI Vol. 9, Issue 5, No 1, September 2012, 1694-0814
[9] Lei Yu leiyu,Huan Liu, “Feature Selection for High-Dimensional Data: A Fast Correlation-
Based Filter Solution”, (ICML-2003), Washington DC, 2003.
[10] B. K. Bharadwaj and S. Pal. "Mining Educational Data to Analyze Students' Performance",
International Journal of Advance Computer Science and Applications (IJACSA), Vol. 2, No. 6,
pp.63-69, 2011.
[11] S. T. Hijazi, and R. S. M. M. Naqvi, "Factors affecting student's performance: A Case of
Private Colleges", Bangladesh e-Journal of Sociology, Vol. 3, No. 1, 2006.
[12] Z. N. Khan, "Scholastic achievement of higher secondary students in science stream",
Journalof Social Sciences, Vol. 1, No. 2, pp. 84-87, 2005.
[13] Z. J. Kovacic, “Early prediction of student success: Mining student enrollment
data”,Proceedings of Informing Science & IT Education Conference 2010
[14] Blum & Langley, 1997; Kohavi &John, 1997
[15] Hall, M. (1999). Correlation based feature selection for machine learning. Doctoral
dissertation, Universityof Waikato, Dept. of Computer Science.
[16] WEKA,http://www.cs.waikato.ac.nz/ml/weka, Last access, 8 April 2008.
WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN
MULTIPLE ACCESS ENVIRONMENT
Y. –J. Lee
Department of Technology Education, Korea National University of Education, Cheongju, South
Korea
Abstract
This paper addresses web object size which is one of important performance measures and
affects to service time in multiple access environment. Since packets arrive according to Poission
distribution and web service time has arbitrary distribution, M/G/1 model can be used to describe
the behavior of the web server system. In the time division multiplexing (TDM), we can use
M/D/1 with vacations model, because service time is constant and server may have a vacation.
We derive the mean web object size satisfying the constraint such that mean waiting time by
round-robin scheduling in multiple access environment is equal to the mean queueing delay of
M/D/1 with vacations model in TDM and M/H2/1 model, respectively. Performance evaluation
shows that the mean web object size increases as the link utilization increases at the given
maximum segment size (MSS), but converges on the lower bound when the number of
embedded objects included in a web page is beyond the threshold. Our results can be applied to
the economic design and maintenance of web service.
Keywords:
M/D/1 with vacations, M/H2/1, mean waiting time, multiple web access
Orginal Source URL: http://airccse.org/journal/cnc/6414cnc01.pdf
Volime Link: http://airccse.org/journal/ijc2014.html
References
[1] S. Ross, Introduction to probability model, Academic press, NewYork, 2010, p. 538, USA.
[2] W. Shi, E. Collins, and V. Karamcheti, “Modeling Object Characteristics of Dynamic Web
Content,” Journal of Parallel and Distributed Computing, Elsevier Science, pp. 963-980, 1998.
[3] R. Khayari, R. Sadre and B. R. Haverkort, “Fitting world-wide web request traces with the
EMalgorithm, Performance Evaluation,” Vol. 52, pp. 175-191, 2003.
[4] A. Riska, V. Diev and E. Smirni, “Efficient fitting of long-tailed data sets into hyper-
exponential distributions,” Proc. of IEEE Global Telecommunications Conference
(GLOBECOM 2002), Vol. 3, pp. 2513-2517, 2002.
[5] Y. Lee, “Mean waiting delay for web service perceived by end-user in multiple access
environment,” Natural Science , vol. 2, Natural Science Institute of KNUE, pp. 55-58, 2012.
[6] S. K. Bose, “M/G/1 with vacations,” http://
www.iitg.ernet.in/skbose/qbook/Slide_Set_7.PDF, pp. 1-7, 2002.
[7] N. Tian and Z. G. Zhang, Vacation Queueing Model, Springer Science and Business Media,
pp. 10-11, 2006.
[8] E. Modiano, “Communication systems engineering,” MIT OpenCourseWare,
http://ocw.mit.edu, pp. 1-19, 2009.
[9] S. W. Fuhrmann, “Technical Note—A Note on the M/G/1 Queue with Server Vacations,”
Operations Research, Vol. 32, No. 6, pp. 1368-1373, 1984.
[10] D. Bertsekas and R. Gallager, Data Networks, Prentice Hall, New Jersey, pp. 186-195,
2007.
[11] M. S. Obaidat and N. A. Boudriga, Fundamentals of Performance Evaluation of Computer
and Tele-communication Systems, Wiely, pp. 156-157, 2010.
[12] Y. Lee, “Mean waiting time of an end-user in the multiple web access environment,” Proc.
of the Sixth International Conference on Communication Theory, Reliability, and Quality of
Service (CTRQ-2013), pp. 1-4, 2013.
ZIGBEE TECHNOLOGY AND ITS APPLICATION IN WIRELESS HOME
AUTOMATION SYSTEMS: A SURVEY
Thoraya Obaid, HaleemahRashed, Ali Abou-Elnour, Muhammad Rehan, Mussab Muhammad
Saleh, and Mohammed Tarique
Department of Electrical Engineering, Ajman University of Science and Technology P.O. Box 2202,
Fujairah, United Arab Emirates (UAE)
Abstract
Wireless home automation systems have drawn considerable attentions of the researchers for
more than a decade. The major technologies used to implement these systems include Z-Wave,
Insteon, Wavenis, Bluetooth, WiFi, and ZigBee. Among these technologies the ZigBee based
systems have become very popular because of its low cost and low power consumption. In this
paper ZigBee based wireless home automation systems have been addressed. There are two main
parts of this paper. In the first part a brief introduction of the ZigBee technology has been
presented and in the second part a survey work on the ZigBee based wireless home automation
system has been presented. The performances of the ZigBee based systems have also been
compared with those of other competing technologies based systems. In addition some future
opportunities and challenges of the ZigBee based systems have been listed in this paper.
Keywords:
Home automation, ZigBee, Z-Wave, Insteon, Waveins,PAN, voice control, energy management,
assistive homes, industrial automation
Orginal Source URL: http://airccse.org/journal/cnc/6414cnc11.pdf
Volime Link: http://airccse.org/journal/ijc2014.html
References
[1] A.J. Bernheim Brush, Bongshin Lee, Ratul Mahajan, Sharad Agrawal, Stefan Saroiu, Collin
Dixon,(2011) ,“Home Automation in the Wild: Challenges and Opportunities”, Proceedings of
ACM CHI Conference on Human Factors o Computing System, May 7-12, Vancouver, BC,
Canada
[2] ABI Research on home automation available at http://www.abirearch.com
[3] Richard Harper, “ Inside the Smart Home”, Springer-Verlag London Limited (2003)
[4] Juile A Kietz, Shwetak N. Patel, Brian Jones, Ed Price, Elizabeth D. Mynatt, Greogory A.
Abowd, (2008) “The Georgia Tech aware Home”, The 26th CHI Conference, April 5-10,
Florence, Italy, pp. 3675-3680
[5] TiiuKoskela and Kaosa-vaananen-vainio-Mattila, (2004) “Evolution towards smart home
environments:empirical evaluation of three users interfaces, International Journal of Personal and
Ubiquitous Computing, July, Vol. 8, No. 3-4, pp. 234-240
[6] Daine J. Cook and Sajal K. Das, (2005) “Smart Home Environments: Technology, Protocols,
andapplications”, Wiley series of Parallel and Distributed Computing (kindle Edition, pp. 273-
294
[7] Tom Rodden and Steve Benford,(2003) “ The evolution of buildings and implications for the
design of ubiquitous domestic environments”, Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems, April 5-10, Fort Lauderdale, Florida, pp. 9-16
[8] Home security systems, home security products, and home alarm systems available at
http://www.adt.com
[9] W. Keith Edwards, Rebecaa E. Grinter, Ratul Mahajan, and David Wetherall,(2011)“
Advancing thestate of home networking”, Communication of ACM, Vol. 5, No.6, July, pp. 62-
71
[10] Forest and Sullivan, “North American Home Automation Market”, available at
http://www.forest.com/sublib
[11] Intile S.S., (2002) “Designing a home of the future”, IEEE Pervasive Computing, Vol. 1,
No.2, pp. 76- 82
[12] Scott Davidoff, Min Kyung Lee, Charles Yiu, John Zimmerman, and Anind K. Dey,(2006)
“ Principlesof smart home control”, Proceedings of the 8th International Conference on
Ubiquitous Computing, 17-21 September, pp. 19-34.
[13] Carles Gomez and Joseph Paradells,(2010) “Wireless Home Automation Networks: A
survey of Architectural and Technologies”, IEEE Communication Magzine, June, pp. 92-101
[14] A.J. D. Rathnayaka, V.M. Poddar, (2011)“ Evaluation of Wireless Home Automation
Technologies”, Proceedings of the 5th International Conference on Digital Ecosystems and
Technologies, May 31, 2011, Daejeon, Korea, pp. 76-81
[15] Frost and Sullivan, “Innovation and Affordability open up home automation to alarge
audience” available at http://www.frost.com/prod/servlet/press-release-pag?docid=273090581
[16] The Z-Wave technology available at http://www.z-wavealliance.org/technology
[17] P. Darbee, “ INSTEON: The Details”, 2005-2013 available at www.insteon.com
[18] http://www.radiocomms.com.au/products/42985-Wavenis-Open-Standard-Alliance
[19] https://www.bluetooth.org [20] http://www.wi-fi.org/ [21] https://www.zigbee.org/
[22] The IEEE 802.15.4 standard available at
http://standards.ieee.org/getieee802/download/802.15.4d2009.pdf
[23] IPv6 over Low power WPAN (6lowpan) available at http://datatracker.ietf.org/wg/6lowpan/
[24] http://www.enocean-alliance.org/en/home/
[25] http://www.thetrackit.com/library/UWB%20Defin.pdf
[26] Dechuan Chen and MeifangWabg,(2006) “A home security ZigBee network for remote
monitoring application”, Proceedings of IET International Conference on Wireless, Mobile, and
Multimedia networks”, November 6-9, Hangzhou , China, pp. 1-4
[27] ManaseePatil and S.R.N. Reddy, (2013) “Design and Implementation of Home/Office
Automation System based on Wireless Technologies”, International Journal of Computer
Application, Vol. 69,No.6, October , pp. 19-22
[28] V. Sathya Narayanan1 and S. Gayathri, “Design of Wireless Home automation and security
system using PIC Microcontroller”, International Journal of Computer Applications in
Engineering Sciences, Vol. 3, special issue, pp. 135-140
[29] Woo-Choo Park and Myung-Hyun Yoon, (2006)“ The Implementation of Indoor Location
System to Control ZigBee Home Network”, Proceedings of International Joint Conference
SICR-ICASE”, October 18-21, Busan, South Korea, pp. 2158-2161
[30] Kawamoto, R., Emon , T., Sakata, S., and Youasa, K., (2007)“ Energy efficient sensor
control scheme for Home Networks based on DLNA-ZigBee Gateway Architecture”,
Proceedings of the First International Global Information Infrastructure Symposium, July 2-6,
2007, Marrakech, Morocco, pp. 73-79
[31] Zhang Shunyang, Xu Du, Jiang Yongping,() Wang Riming, “ Realization of Home Remote
Controlnetworks based on ZigBee”, Proceedings of the 8th International Conference on
Electronic Measurements and Instrumentations, August 16-18, Xiang, China, pp. 4-344-4-348
[32] Jan Hou, Wu Cang dong, Zhongjia Yuan, Jiyuan Tan, “ Research of Intelligent Home
Security Surveillance System based on ZigBee”, Proceedings of the Initial Symposium on
Intelligent Information Technology Application Workshops, December 21-22, Shanghai, pp.
554-557
[33] Jianfeng Wu, and Hubin Qin, (2008)“ The deisgn of wireless intelligent home system based
on ZigBee”, Proceedings of the 11th IEEE International Conference on Communication
Technology, November 11-12, HagZhau, pp. 73-76
[34] Chunglong Zhang, Min Zhang, Young Sheng Su, and Weillian Wang, (2012) “ Smart home
design based on ZigBee wireless sensor network”, Proceedings of the 7th International ICST
Conference on Communications and networking, Kun Ming, pp. 463-466
[35] Jui-Yu Chang, Tao-Yuan, Min-Hsing Hung, and Yen-Wei Chang, (2007) “A ZigBee based
Power Monitoring System with Direct Load Control Capabilities”, Proceedings of IEEE
International Conference on Networking, Sensing, and Control, April 15-17, London, 2007, pp.
895-900
[36] Ying-Wen Bai and Chi-Huang Hang, “ Remote Power ON/OFF control and current
measurementfor home electric outlets based on a low-power embedded board and ZigBee
Communication”, Proceedings of IEEE International Symposium on Consumer Electronics,
April 14-16, Vilamoura, pp.1-4
[37] Jin Sung Byum, BoungjuJeon, Junyoung Noh, and Youngil Kim, “ An Intelligent self-
adjusting sensor for smart home services based on ZigBee Communiation”, IEEE Transaction on
Consumer Eletronics, Vol. 58, No. 3, pp. 799-802
[38] Chihhsiong Shih and Bwo-cheng Liang, “ A model driven software framework for ZigBee
based energy saving systems”, Proceedings of the 3rd International Conference on Intelligent
Systems, modeling and Simulation, February 8-10, Kota Kinabaiu, pp. 487-492
[39] Karia Deepak, JaypalBavisker, Raj Makwana and PanchatNiraj,(2013) “ Performance
analysis of ZigBee based load control and power monitoring system”, Proceedings of the
InternationalConference on Advances in Computing, Communications, and Informatics,
Myshore, August, 25, 2013, pp. 1779- 1484.
[40] Jieming Zhu, Xuecai, Yucang Yang, and Hang Li, (2010)“ Developing a voice control
system forZigBee based home automation”, Proceedings of IEEE International Conference on
network Infrastructure and Digital Content, September 24-26, Beijing, 2010, pp. 7737-741
[41] Y.B. Krishna and S. Nagendram,(2012)“ ZigBee Based Voice Control System for Smart
Home”, International Journal on Computer Technology and Applications, Vol. 3, no. 1 , pp. 163-
168
[42] Gananasekar, A.K., Jayarelu, P., and V. Nagrajan,(2012) “Speech recognition based
wireless automation of home with fault identification for physically challenged”, Proceedings of
International Conference on Communications and Signal Processing, April 4-5 2012, Chennai,
pp. 128- 132
[43] Al Shueili, H. and Sen Gupta G, Mukhopadhyaya, (2001)“ Voice recognition based wireless
home automation system”, Proceedings of the International Conference on Mechatronics , May
17-19, Kualalumpur, pp. 1-6
[44] Dhawan S. Thakur and Aditi Sharma,(2013)” Voice Recognition Wireless Home
Automation System based on ZigBee”IOSR Journal of Electronic and Communication
Engineering, Vol. 6, No. 1 May-June 2013, pp. 65-75.
[45] MitaliPatil, AshwiniBedare, and VarshaPacharne,(2013) “The Design and Implementation
of VoiceControlled Wireless Intelligent Home Automation System Based on ZigBee”,
International Journal of Advanced Research in Computer Science and Software Engineering,
Vol. 3, No. 4, April 2013, pp. 307-310
[46] T. Kirankumar, and B. Bhavani,(2013) ” A Sustainable Automated System for Elderly
People Using Voice Recognition and Touch Screen Technology”, International Journal of
Science andResearch (IJSR), Vol. 2, No. 8, August 2013, pp. 265-267
[47] Y.Usha Devi,(2012) “Wireless Home Automation System Using ZigBee”, International
Journal of Scientific & Engineering Research,Volume 3, Issue 8, August, 2012, pp. 1-5
[48] http://www.zigbee.org/About/FAQ.aspx
[49] Rathod K., Parikh, N., and Shah, V.,(2012) “Wireless automation using ZigBee protocols”,
Proceedings of the 9th International Conference on Wireless and Optical Communication,
lndere, September 20-22, 2012, pp.1-5
[50] http://www.skyworksinc.com/downloads/press_room/published_articles/
Microwave_Journal_082009.pdf
[51] http://www.engineerlive.com/content/19359
[52] Simek, M., Fuchs, M, Mraz, L., and Morvek, P.,(2011) “Measurement of LowPAN Network
coexistence with Home Microwave Appliances in Laboratory and Home Environments”,
Proceedings of International Conference on Broadband and Wireless Computing, October 26-28,
Bercelona, pp. 292-299
[53] Khusvinder Gill, Shuang-Hua Yang, Fang Yao, and Xin Lu, (2009) “A ZigBee-Based
Home Automation System”, IEEE Transaction on Consumer Electronics”, Vol. 55, No. 2, May
2009, pp. 422- 430
[54] Fei Ding, Guangming Song, Jianing Li, and Higuo Song, (2008) “ A ZigBee Based Mesh
Network forHome Control”, Proceedings of International Workshop on Geoscience and Remote
Sensing”, Shanghai, Vol. 1, pp. 744-740
[55] Cui Chenguyi, Zhao Guannan, and Jin Mingle,(2010) “ A ZigBee based embedded remote
control System”, Proceedings of the 2nd International Conference on Signal Processing Systems,
5-7 July, Dalian, pp. v3-373-376
[56] NausheenBelim, HarshadaBhambure, Priyanka Kumbhar, and SimranjitTuteja,(2013)
“Automate and Secure Your Home Using Zigbee Technology”, International Journal of
Innovative Research in Computer and Communication Engineering, Vol. 1, No. 1, March 2013,
pp. 63-66
[57] Meng-Shiuan Pan, Chia-Hung Tsai, Yu-Chee Tseng,(2009) “The Orphan Problem in
ZigBee WirelessNetworks”, IEEE Transaction of Mobile Computing,November 2009, Vol. 8 ,
No. 11, pp. 1573-1584
[58] Xiu-Wei Yang, Jinan, China ; Yuan Xu ; Shu-Bo Qiu,(2011) “A Solution of Orphan
Problem in ZigBee Tree Network”, Proceedings on the 7th International Conference on Wireless
Communication, Networking and Mobile Computing, September 2011, Wuhan, pp. 1-4
[59] Michael Varhola and Milos Drutorvsky,(2007) “ZigBee Based Home Automation Wireless
Sensor Networks”,ActaElectrotechnica et Informatics, Vol. 7, No. 4, 2007, pp. 1-8
[60] Napolean A., Karthik K., Kamalakannan M., Amarnath M., Nidhin A., (2013)
”Implementation of ZigBee based Home Automation System Using Voice Control”,
International Journal of Engineering Research and Technology, Vol. 2, No. 5, May, pp. 723-733
A DEEP LEARNING TECHNIQUE FOR WEB PHISHING DETECTION
COMBINED URL FEATURES AND VISUAL SIMILARITY
Saad Al-Ahmadi1
and Yasser Alharbi 2
1
College of Computer and Information Science, Computer Science Department, King Saud
University, Riyadh, Saudi Arabia
2
College of Computer and Information Science, Computer Engineering Department, King Saud
University, Riyadh, Saudi Arabia
Abstract
The most popular way to deceive online users nowadays is phishing. Consequently, to increase
cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper,
we propose an approach that rely on websites image and URL to deals with the issue of phishing
website recognition as a classification challenge. Our model uses webpage URLs and images to
detect a phishing attack using convolution neural networks (CNNs) to extract the most important
features of website images and URLs and then classifies them into benign and phishing pages.
The accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the
proposed model in detecting a web phishing attack.
Keywords:
Phishing detection, URL, visual similarity, deep learning, convolution neural network.
Orginal Source URL: https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf
Volime Link: http://airccse.org/journal/ijc2020.html
References
[1] H. Thakur, “Available Online at www.ijarcs.info A Survey Paper On Phishing Detection,”
vol. 7, no. 4, pp. 64–68, 2016.
[2] G. Varshney, M. Misra, and P. K. Atrey, “A survey and classification of web phishing
detection schemes,” Security and Communication Networks. 2016, doi: 10.1002/sec.1674.
[3] E. S. Aung, T. Zan, and H. Yamana, “A Survey of URL-based Phishing Detection,” pp. 1–8,
2019, [Online]. Available: https://db-event.jpn.org/deim2019/post/papers/201.pdf.
[4] S. Nakayama, H. Yoshiura, and I. Echizen, “Preventing false positives in content-based
phishing detection,” in IIH-MSP 2009 - 2009 5th International Conference on Intelligent
Information Hiding and Multimedia Signal Processing, 2009, doi: 10.1109/IIH-MSP.2009.147.
[5] A. K. Jain and B. B. Gupta, “Phishing detection: Analysis of visual similarity based
approaches,” Security and Communication Networks. 2017, doi: 10.1155/2017/5421046.
[6] A. Khan, A. Sohail, U. Zahoora, and A. S. Qureshi, “A Survey of the Recent Architectures of
Deep Convolutional Neural Networks,” pp. 1–68, 2019, doi: 10.1007/s10462-020-09825-6.
[7] J. Mao et al., “Phishing page detection via learning classifiers from page layout feature,”
Eurasip J. Wirel. Commun. Netw., 2019, doi: 10.1186/s13638-019-1361-0.
[8] I. F. Lam, W. C. Xiao, S. C. Wang, and K. T. Chen, “Counteracting phishing page
polymorphism: An image layout analysis approach,” in Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), 2009, doi: 10.1007/978-3-642- 02617-1_28.
[9] T. C. Chen, T. Stepan, S. Dick, and J. Miller, “An anti-phishing system employing diffused
information,” ACM Trans. Inf. Syst. Secur., vol. 16, no. 4, 2014, doi: 10.1145/2584680.
[10] A. S. Bozkir and E. A. Sezer, “Use of HOG descriptors in phishing detection,” in 4th
International Symposium on Digital Forensics and Security, ISDFS 2016 - Proceeding, 2016,
doi: 10.1109/ISDFS.2016.7473534.
[11] F. C. Dalgic, A. S. Bozkir, and M. Aydos, “Phish-IRIS: A New Approach for Vision Based
Brand Prediction of Phishing Web Pages via Compact Visual Descriptors,” ISMSIT 2018 - 2nd
Int. Symp. Multidiscip. Stud. Innov. Technol. Proc., 2018, doi: 10.1109/ISMSIT.2018.8567299.
[12] K. L. Chiew, E. H. Chang, S. N. Sze, and W. K. Tiong, “Utilisation of website logo for
phishing detection,” Comput. Secur., 2015, doi: 10.1016/j.cose.2015.07.006.
[13] K. L. Chiew, J. S. F. Choo, S. N. Sze, and K. S. C. Yong, “Leverage Website Favicon to
Detect Phishing Websites,” Secur. Commun. Networks, 2018, doi: 10.1155/2018/7251750.
[14] Y. Zhou, Y. Zhang, J. Xiao, Y. Wang, and W. Lin, “Visual similarity based anti-phishing
with the combination of local and global features,” in Proceedings - 2014 IEEE 13th
International Conference on Trust, Security and Privacy in Computing and Communications,
TrustCom 2014, 2015, doi: 10.1109/TrustCom.2014.28.
[15] A. P. E. Rosiello, E. Kirda, C. Kruegel, and F. Ferrandi, “A layout-similarity-based
approach for detecting phishing pages,” in Proceedings of the 3rd International Conference on
Security and Privacy in Communication Networks, SecureComm, 2007, doi:
10.1109/SECCOM.2007.4550367.
[16] J. Mao, P. Li, K. Li, T. Wei, and Z. Liang, “BaitAlarm: Detecting phishing sites using
similarity in fundamental visual features,” in Proceedings - 5th International Conference on
Intelligent Networking and Collaborative Systems, INCoS 2013, 2013, doi:
10.1109/INCoS.2013.151.
[17] S. Haruta, H. Asahina, and I. Sasase, “Visual Similarity-Based Phishing Detection Scheme
Using Image and CSS with Target Website Finder,” in 2017 IEEE Global Communications
Conference, GLOBECOM 2017 - Proceedings, 2017, doi: 10.1109/GLOCOM.2017.8254506.
[18] H. Zhang, G. Liu, T. W. S. Chow, and W. Liu, “Textual and visual content-based anti-
phishing: A Bayesian approach,” IEEE Trans. Neural Networks, 2011, doi:
10.1109/TNN.2011.2161999.
[19] E. Medvet, E. Kirda, and C. Kruegel, “Visual-similarity-based phishing detection,” Proc.
4th Int. Conf. Secur. Priv. Commun. Networks, Secur., no. September 2008, 2008, doi:
10.1145/1460877.1460905.
[20] S. G. Selvaganapathy, M. Nivaashini, and H. P. Natarajan, “Deep belief network based
detection and categorization of malicious URLs,” Inf. Secur. J., vol. 27, no. 3, pp. 145–161,
2018, doi: 10.1080/19393555.2018.1456577.
[21] Y. Ding, N. Luktarhan, K. Li, and W. Slamu, “A keyword-based combination approach for
detecting phishing webpages,” Comput. Secur., vol. 84, pp. 256–275, 2019, doi:
10.1016/j.cose.2019.03.018.
[22] H. huan Wang, L. Yu, S. wei Tian, Y. fang Peng, and X. jun Pei, “Bidirectional LSTM
Malicious webpages detection algorithm based on convolutional neural network and independent
recurrent neural network,” Appl. Intell., vol. 49, no. 8, pp. 3016–3026, 2019, doi:
10.1007/s10489-019-01433- 4.
[23] M. Zouina and B. Outtaj, “A novel lightweight URL phishing detection system using SVM
and similarity index,” Human-centric Comput. Inf. Sci., vol. 7, no. 1, pp. 1–13, 2017, doi:
10.1186/s13673-017-0098-1.
[24] S. Parekh, D. Parikh, S. Kotak, and S. Sankhe, “A New Method for Detection of Phishing
Websites: URL Detection,” Proc. Int. Conf. Inven. Commun. Comput. Technol. ICICCT 2018,
no. Icicct, pp. 949–952, 2018, doi: 10.1109/ICICCT.2018.8473085.
[25] H. Le, Q. Pham, D. Sahoo, and S. C. H. Hoi, “URLNet: Learning a URL Representation
with Deep Learning for Malicious URL Detection,” no. i, 2018, [Online]. Available:
http://arxiv.org/abs/1802.03162.
[26] J. Saxe and K. Berlin, “eXpose: A Character-Level Convolutional Neural Network with
Embeddings For Detecting Malicious URLs, File Paths and Registry Keys,” 2017, [Online].
Available: http://arxiv.org/abs/1702.08568.
[27] K. Shima et al., “Classification of URL bitstreams using bag of bytes,” 21st Conf. Innov.
Clouds, Internet Networks, ICIN 2018, pp. 1–5, 2018, doi: 10.1109/ICIN.2018.8401597.
[28] R. Vinayakumar, K. P. Soman, and P. Poornachandran, “Evaluating deep learning
approaches to characterize and classify malicious URL’s,” J. Intell. Fuzzy Syst., vol. 34, no. 3,
pp. 1333–1343, 2018, doi: 10.3233/JIFS-169429.
[29] O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing
detection from URLs,” Expert Syst. Appl., vol. 117, pp. 345–357, 2019, doi:
10.1016/j.eswa.2018.09.029.
[30] W. Wang, F. Zhang, X. Luo, and S. Zhang, “PDRCNN: Precise Phishing Detection with
Recurrent Convolutional Neural Networks,” Secur. Commun. Networks, 2019, doi:
10.1155/2019/2595794.
[31] S. Khan, H. Rahmani, S. A. A. Shah, and M. Bennamoun, “A Guide to Convolutional
Neural Networks for Computer Vision,” Synth. Lect. Comput. Vis., 2018, doi:
10.2200/s00822ed1v01y201712cov015.
[32] V. Karthikeyani and S. Nagarajan, “Machine Learning Classification Algorithms to
Recognize Chart Types in Portable Document Format (PDF) Files,” Int. J. Comput. Appl., 2012,
doi: 10.5120/4789- 6997.
[33] M. A. Adebowale, K. T. Lwin, and M. A. Hossain, “Deep learning with convolutional
neural network and long short-term memory for phishing detection,” 2019 13th Int. Conf.
Software, Knowledge, Inf. Manag. Appl. Ski. 2019, no. March 2019, doi:
10.1109/SKIMA47702.2019.8982427.
[34] C. Opara, B. Wei, and Y. Chen, “HTMLPhish: Enabling Phishing Web Page Detection by
Applying Deep Learning Techniques on HTML Analysis,” no. October 2018, 2019, [Online].
Available: http://arxiv.org/abs/1909.01135.
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS
BASED ON TRAFFIC PRIORITY IN WIRELESS BODY AREA
NETWORKS
Sabin Bhandari and Sangman Moh
Department of Computer Engineering, Chosun University, Gwangju, South Korea
Abstract
In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or
inside the human body. Given specific requirements, WBANs can significantly improve
healthcare, diagnostic monitoring, and other medical services. However, the existing standards
such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of
WBANs. Many medium access control (MAC) protocols have been studied so far, most of which
are derived from the IEEE 802.15.4 superframe structure with some improvements and
adjustments. However, the MAC protocols do not provide the required quality of service (QoS)
for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol
for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic
priority, providing the required QoS. According to the performance evaluation results, the
proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority-based MAC
in terms of transmission time, system throughput, energy efficiency, and collision ratio.
Keywords:
Wireless body area network; Medium access control, Energy efficiency; Quality of service;
Traffic priority; IEEE 802.15.4
Orginal Source URL: https://aircconline.com/ijcnc/V11N4/11419cnc02.pdf
Volime Link: http://airccse.org/journal/ijc2019.html
References
[1] D. Fernandes, A. G. Ferreira, R. Abrishambaf, J. Mendes, andJ. Cabral, (2018) “Survey and
taxonomy of transmissions power control mechanisms for wireless body area networks,” IEEE
Communications Surveys and Tutorials, vol. 20, no. 2, pp. 1292-1328
[2] IEEE, (2006) “IEEE Std.802.15.4: Wireless medium access control (MAC) and physical
layer (PHY) specifications for low data rate wireless personal area networks (WPAN),”
Piscataway, NJ, USA
[3] X. Yang, L. Wang, and Z. Zhang, (2018) “Wireless body area networks MAC protocol for
energy efficiency and extending lifetime,” IEEE Sensors Letters, vol. 2, no. 1, pp. 1-4
[4] B. Liu, Z. Yan, and C. W. Chen, (2017) “Medium access control for wireless body area
networks with QoS provisioning and energy efficient design,” IEEE Transactions on Mobile
Computing, vol. 16, no. 2, pp. 422-434
[5] S. Ullah, M. Chen, and K. Kwak, (2012) “Throughput and delay analysis of IEEE 802.15.6
based CSMA/CA protocol,” Journal of Medical Systems, vol. 36, no. 6, pp. 3875-3891
[6] S. Bhandari and S. Moh, (2015) “A survey of MAC Protocols for cognitive radio body area
networks,” Sensors, vol. 15, pp. 9189-9209
[7] E. Kartsakli, A. Lalos, A. Antonopoulos, S. Tennina, M. Renzo, L. Alonso, and C.
Verikoukis, (2014) “A survey on M2M systems for mHealth: A wireless communications
perspective,” Sensors, vol. 14, pp. 18009-18052
[8] R. Cavallari, F. Martelli, R. Rosini, C. Buratti, and R. Verdone, (2014) “A survey on wireless
body area networks: Technologies and design challenges,” IEEE Communications Surveys &
Tutorials, vol. 16, pp. 1635-1657
[9] T. Le and S. Moh, (2015) “Interference mitigation schemes for wireless body area sensor
networks: A comparative survey,” Sensors, vol. 15, pp. 13805-18838
[10] S. Mangold, S. Choi, G. R. Hiertz, O. Klein, and B. Walke, (2003) “Analysis of IEEE
802.11e for QoS support in wireless LANs,” IEEE Wireless Communications, vol. 10, No. 3, pp.
40-50
[11] N. F. Timmons and W. G. Scanlon, (2004) “Analysis of the performance of IEEE 802.15.4
for medical sensor body area networking,” in Proc. of 1st Annual IEEE Communications Society
Conference on Sensor and Ad Hoc Communications and Networks, pp. 16-24
[12] T. Falck, J. Espina, J. P. Ebert, and D. Dietterle, (2006) “BASUMA – The sixth sense for
chronically ill patients,” in Proc. of International Workshop on Wearable and Implantable Body
Sensor Networks, pp. 1-6
[13] G. Fang and E. Dutkiewicz, (2009) “BodyMAC: Energy efficient TDMA-based MAC
protocol for Wireless Body Area Network,” in Proc. of 9th International Symposium on
Communications and Information Technology, pp. 1455-1459
[14] Z. Yan and B. Liu, (2011) “A context aware MAC protocol for medical wireless body area
network,” in Proc. of 7th Int. Wireless Communication and Mobile Computing Conf. (IWCMC
2011), pp. 2133- 2138
[15] L. Huaming and T. Jindong, (2010) “Heartbeat-driven medium-access control for body
sensor networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1,
pp. 44-51
[16] C. Li, L. Wang, J. Li, B. Zhen, H.-B. Li, and R. Kohno, (2009) “Scalable and robust
medium access control protocol in wireless body area networks,” in Proc. of IEEE 20th
International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 2127-
2131
[17] W. Lee, S. H. Rhee, Y. Kim, and H. Lee, (2009) “An efficient multi-channel management
protocol for wireless body area networks,” in Proc. of International Conference on Information
Networking, pp.1-5
[18] I. Anjum, N. Alam, M. A. Razzaque, M. Mehedi Hassan, and A. Alamri, (2013) “Traffic
priority and load adaptive mac protocol for qos provisioning in body sensor networks,”
International Journal of Distributed Sensor Networks, vol. 2013, pp. 1-9
[19] K. S. Kwak and S. Ullah, (2010) “A traffic-adaptive MAC protocol for WBAN,” in Proc. of
IEEE GLOBECOM Workshops, pp. 1286-1289
[20] O. Md. Rahman, C. S. Hong, S. Lee, and Y.-C. Bang, (2011) “ATLAS: A traffic load aware
sensor MAC design for collaborative body area sensor networks,” Sensors, vol. 11, no.12, pp.
11560-11580
[21] M. M. Alam, O. Berder, D. Menard, and O. Sentieys, (2012) “TAD-MAC: traffic-aware
dynamic MAC protocol for wireless body area sensor networks,” IEEE Journal on Emerging and
Selected Topics in Circuits and Systems, vol. 2, no. 1, pp. 109-119
[22] B. Kim and J. Cho, (2012) “A novel priority-based channel access algorithm for contention-
based MAC protocol in WBANs,” in Proc. of 6th International Conference on Ubiquitous
Information Management and Communication (ICUIMC 2012), pp. 1-5
[23] S. Ullah, M. Imran, and M. Alnuem, (2014) “A hybrid and secure priority-guaranteed MAC
protocol for wireless body area network,” International Journal of Distributed Sensor Networks,
vol. 2014, pp. 1-7
[24] C. Li, B. Hao, K. Zhang, Y. Liu, and J. Li, (2011) “A novel medium access control protocol
with low delay and traffic adaptivity for wireless body area networks,” Journal of Medical
Systems, pp. 1265- 1275
[25] S. Jin, Z. Weixia, and Z. Zheng, (2013) “Priority-based adaptive timeslot allocation scheme
for wireless body area network,” in Proc. of 13th International Symposium on Communications
and Information Technologies, pp. 609-614
[26] Y. Zhang and G. Dolmans, (2010) “Priority-guaranteed MAC protocol for emerging
wireless body area networks,” Annals of Telecommunications, vol. 66, pp. 229-241
[27] X. Liang and I. Balasingham, (2007) “Performance analysis of the IEEE 802.15.4 based
ECG monitoring network,” in Proc. of 7th International Conferences on Wireless and Optical
Communications, pp. 99-104
[28] S. Bhandari, K. Singh, and S. Moh, (2017) “Traffic-Aware Medium Access Control
Protocol for Wireless Body Area Networks,” in Proc. of InfoWare 2017 Conference, pp. 1-6
INTRUSION PREVENTION/INTRUSION DETECTION SYSTEM
(IPS/IDS) FOR WIFI NETWORKS
Michal Korčák1
and Jaroslav Lámer2
and František Jakab3
1,2,3
Department of Computer and Informatics, Technical University of Košice, TUKE Košice,
Slovakia
Abstract
The nature of wireless networks itself created new vulnerabilities that in the classical wired
networks do not exist. This results in an evolutional requirement to implement new sophisticated
security mechanism in form of Intrusion Detection and Prevention Systems. This paper deals
with security issues of small office and home office wireless networks. The goal of our work is
to design and evaluate wireless IDPS with use of packet injection method. Decrease of attacker’s
traffic by 95% was observed when compared to attacker’s traffic without deployment of
proposed IDPS system.
Keywords:
Deauthentification, Intrusion detection, Intrusion prevention, Packet injection, WiFi
Orginal Source URL: http://airccse.org/journal/cnc/6414cnc07.pdf
Volime Link: http://airccse.org/journal/ijc2014.html
References
[1] Henry, Paul & Luo, Hui, (2002) “WiFi: what's next?”. Communications Magazine, IEEE,
40.12: 66- 72.
[2] Tews, Erik & Beck, Martin, (2009) “Practical attacks against WEP and WPA” In:
Proceedings of the second ACM conference on Wireless network security. ACM, p. 79-86.
[3] Gounaris, Georgios, (2014) “WiFi security and testbed implementation for WEP/WPA
cracking demonstration”.
[4] L. T. Heberlein & K. N. Levitt & B. Mukherjee, (1991) “A Method To Detect Intrusive
Activity in a Networked Environment”. In: 14th National Computer Security Conference.
Washington, D.C.: National Institute of Standards and Technology, National Computer Security
Center, pp. 362-371
[5] Karen, Scarfone & Peter Mell, (2007) “Guide To Intrusion Detection And Prevention
Systems (IDPS)”. Washington, D.C.: National Institute of Standards and Technology, Special
Publication 800- 94, 128 p.
[6] Michael Rash, (2007) “Linux Firewalls - Attack Detection And Response With Iptables”,
Psad And Fwsnort. San Francisco: No Starch Press, 388 p.
[7] Allen, Lee (2012) “Advanced Penetration Testing for Highly--Secured Environments: The
Ultimate Security Guide”. Birmingham: Packt Publishing Ltd., 414p.
[8] “Linux Wireless - Hostapd Linux Documentation Page”. [online]. [cit. 14. April. 2014].
Available online: .
[9] KAZIENKO, Przemyslaw; DOROSZ, Piotr. Intrusion detection systems (IDS) Part 2-
Classification; methods; techniques. WindowsSecurity. com, 2004.
[10] CARL, Glenn, et al. Denial-of-service attack-detection techniques. Internet Computing,
IEEE, 2006, 10.1: 82-89.
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL
CLUSTERING METHOD IN WIRELESS SENSOR NETWORK
Tran Cong Hung1
and Ly Quoc Hung2
1
Posts and Telecommunications Institute of Technology
2
Ho Chi Minh Technical and Economic College
Abstract
In the traditional clustering routing protocol of wireless sensor network, LEACH protocol (Low
Energy Adaptive Clustering Hierarchy) is considered to have many outstanding advantages in
the implementation of the hierarchy according to low energy adaptive cluster to collect and
distribute the data to the base station. The main objective of LEACH is: To prolong life time of
the network, reduce the energy consumption by each node, using the data concentration to reduce
bulletins in the network. However, in the case of large network, the distance from the nodes to
the base station is very different. Therefore, the energy consumption when becoming the host
node is very different but LEACH is not based on the remaining energy to choose the host node,
which is based on the number of times to become the host node in the previous rounds. This
makes the nodes far away from the base station lose power sooner. In this paper, we give a new
routing protocol based on the LEACH protocol in order to improve operating time of sensor
network by considering energy issues and distance in selecting the cluster-head (CH), at that
time the nodes with high energy and near the base station (BS) will have a greater probability of
becoming the cluster-head than the those in far and with lower energy.
Keywords:
LEACH, Life-time, Energy efficient, WSN, Matlab.
Orginal Source URL: https://aircconline.com/ijcnc/V8N5/8516cnc04.pdf
Volime Link: http://airccse.org/journal/ijc2016.html
References
[1] Trịnh Lương Miên (2014), "Tổng quan về mạng cảm biến không dây", Tạp chí tự động hóa
ngày nay, Số 157
[2] TS. Lê Nhật Thăng, and TS. Nguyễn Quý Sỹ (2007), "Các kỹ thuật phân nhóm trong các
mạng cảm biến vô tuyến", Tạp chí Bưu chính viễn thông, Số 301
[3] K. Sohraby, and D. Minoli and T Znati (2007), "Wireless Sensor Network Technology,
Protocol and Application" (John Wiley & Sons Ltd, 2007)
[4] Charka Panditharathne and Soumya Jyoti Sen (2009), "Energy Efficient Communication
Protocols for Wireless Sensor Networks"
[5] T. N. Qureshi, N. Javaid, A. H. Khan, A. Iqbal, E. Akhtar, and M. Ishfaq (2013), "Balanced
Energy Efficient Network Integrated Super Heterogenous Protocol for Wireless Sensor
Networks"
[6] W. B. Heinzelman, and A. P. Chandrakasan and H. Balakrishnan (2002), "An application-
specific protocol architecture for wireless microsensor networks", IEEE Transactions on
Wireless Communications", Vol 1, pp. 660-700
[7] Callaway, and Edgar H (2004), "Wireless Sensor Networks—Architectures and Protocols"
(CRC Press Company, 2004)
[8] W. Xinhua, and W. Sheng (2010), "Performance Comparison of LEACH and LEACH-C
Protocols by NS2", Ninth International Symposium on Distributed Computing and Applications
to Business"
[9] W R Heinzelman, and A P Chandrakasan and H Balakrishnan (2000), "Energy efficient
communication protocol for wireless microsensor networks"
[10] Alakesh Braman, and Umapathi G. R (2014), "A Comparative Study on Advances in
LEACH Routing Protocol for Wireless Sensor Networks: A survey.", Volume 3
[11] Jennifer Yick, Biswanath Mukhejee, and Dicpak Ghosal (2008), " Wireless sensor network
survey", Computer Networks 52, pp. 2292 2330
[12] Wendi RabinerHeinzelman, AnanthaChandrakasan, and HariBalakrishnan (2005), "Energy-
Efficient Communication Protocol for Wireless Micro-sensor Networks", pp. 79 - 194
[13] HolgerKarl, and AndreasWillig (2005), "Protocols and Architectures for wireless Sensor
Networks" (John Wiley & Sons, 2005)

More Related Content

What's hot

TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021ijujournal
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
 
A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies Radha Mahalle
 
Chapter 2 wireless sensor
Chapter 2 wireless sensorChapter 2 wireless sensor
Chapter 2 wireless sensorAhmed Tememe
 
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...ijwmn
 
Top Read Articles in April 2020 - IJU
Top Read Articles in April 2020 - IJUTop Read Articles in April 2020 - IJU
Top Read Articles in April 2020 - IJUijujournal
 
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...ijujournal
 
TOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
 
The Internet of Nano Things (IoNT)
The Internet of Nano Things (IoNT)The Internet of Nano Things (IoNT)
The Internet of Nano Things (IoNT)Haider Tarish Haider
 
Most Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And EngineeringMost Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And EngineeringIJCSES Journal
 
An ensemble deep neural network
An ensemble deep neural networkAn ensemble deep neural network
An ensemble deep neural networkShamik Tiwari
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
 
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...IJCSES Journal
 

What's hot (20)

TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
 
A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies
 
Chapter 2 wireless sensor
Chapter 2 wireless sensorChapter 2 wireless sensor
Chapter 2 wireless sensor
 
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
 
Top Read Articles in April 2020 - IJU
Top Read Articles in April 2020 - IJUTop Read Articles in April 2020 - IJU
Top Read Articles in April 2020 - IJU
 
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
 
TOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
27 30
27 3027 30
27 30
 
Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )
 
The Internet of Nano Things (IoNT)
The Internet of Nano Things (IoNT)The Internet of Nano Things (IoNT)
The Internet of Nano Things (IoNT)
 
Most Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And EngineeringMost Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And Engineering
 
An ensemble deep neural network
An ensemble deep neural networkAn ensemble deep neural network
An ensemble deep neural network
 
D010312230
D010312230D010312230
D010312230
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
 
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
 
6G Communication
6G Communication6G Communication
6G Communication
 

Similar to IJCNC Top 10 Trending Articles in Academia !!!

International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
 
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...rinzindorjej
 
Top cited article in 2019 - International Journal of Network Security & Its A...
Top cited article in 2019 - International Journal of Network Security & Its A...Top cited article in 2019 - International Journal of Network Security & Its A...
Top cited article in 2019 - International Journal of Network Security & Its A...IJNSA Journal
 
New research articles 2020 june issue- international journal of computer sc...
New research articles   2020 june issue- international journal of computer sc...New research articles   2020 june issue- international journal of computer sc...
New research articles 2020 june issue- international journal of computer sc...AIRCC Publishing Corporation
 
A collaborative physical layer security scheme
A collaborative physical layer security schemeA collaborative physical layer security scheme
A collaborative physical layer security schemeIJECEIAES
 
Top Cited Articles in 2019 - International Journal of Network Security & Its ...
Top Cited Articles in 2019 - International Journal of Network Security & Its ...Top Cited Articles in 2019 - International Journal of Network Security & Its ...
Top Cited Articles in 2019 - International Journal of Network Security & Its ...IJNSA Journal
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...Amir Shokri
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...ijwmn
 
Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...ijassn
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...IJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
International journal of computer networks & communications (ijcnc) --no...
International journal of computer networks & communications (ijcnc)  --no...International journal of computer networks & communications (ijcnc)  --no...
International journal of computer networks & communications (ijcnc) --no...IJCNCJournal
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Similar to IJCNC Top 10 Trending Articles in Academia !!! (20)

International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)
 
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...
 
Top cited article in 2019 - International Journal of Network Security & Its A...
Top cited article in 2019 - International Journal of Network Security & Its A...Top cited article in 2019 - International Journal of Network Security & Its A...
Top cited article in 2019 - International Journal of Network Security & Its A...
 
New research articles 2020 june issue- international journal of computer sc...
New research articles   2020 june issue- international journal of computer sc...New research articles   2020 june issue- international journal of computer sc...
New research articles 2020 june issue- international journal of computer sc...
 
A collaborative physical layer security scheme
A collaborative physical layer security schemeA collaborative physical layer security scheme
A collaborative physical layer security scheme
 
Top Cited Articles in 2019 - International Journal of Network Security & Its ...
Top Cited Articles in 2019 - International Journal of Network Security & Its ...Top Cited Articles in 2019 - International Journal of Network Security & Its ...
Top Cited Articles in 2019 - International Journal of Network Security & Its ...
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
 
Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
SDSFLF: fault localization framework for optical communication using softwar...
SDSFLF: fault localization framework for optical  communication using softwar...SDSFLF: fault localization framework for optical  communication using softwar...
SDSFLF: fault localization framework for optical communication using softwar...
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
International journal of computer networks & communications (ijcnc) --no...
International journal of computer networks & communications (ijcnc)  --no...International journal of computer networks & communications (ijcnc)  --no...
International journal of computer networks & communications (ijcnc) --no...
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its Applications
 

More from IJCNCJournal

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 

More from IJCNCJournal (20)

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 

IJCNC Top 10 Trending Articles in Academia !!!

  • 1. OOccttoobbeerr 22002200:: TToopp RReeaadd AArrttiicclleess iinn AAccaaddeemmiiaa ffoorr IIJJCCNNCC International Journal of Computer Networks & Communications (IJCNC) ISSN 0974 - 9322 (Online) ; 0975 - 2293 (Print) http://airccse.org/journal/ijcnc.html Contact US: ijcnc@airccse.org
  • 2. AN EFFICIENT DATA COLLECTION PROTOCOL FOR UNDERWATER WIRELESS SENSOR NETWORKS Khaled Day1 , Faiza Al-Salti2 , Abderezak Touzene1 and Nasser Alzeidi1 1 Department of Computer Science, Sultan Qaboos University, Muscat, Oman 2 Muscat College, Muscat, Oman Abstract This paper presents the design and evaluation of a new data collection protocol for Underwater Wireless Sensor Networks called the Data Collection Tree Protocol (DCTP). It uses an efficient distributed algorithm to proactively construct and maintain a data collection tree rooted at the sink node. The preconstructed and maintained data collection tree allows the efficient selection of a single forwarding node at each hop when routing a data packet. We prove the correctness of the constructed data collection tree and we show that under some stability conditions, the constructed tree converges to an optimal shortestpath tree. Results of extensive simulations show a big improvement in terms of packet delivery ratio, endto-end delay and energy consumption compared to the well-known VBF protocol. The simulated cases show increases in the packet delivery ratio between 20% and 122%, reductions in the average end-to-enddelay between 15% and 55% and reductions in the energy consumption between 20% and 50%. These results clearly demonstrate the attractiveness of the proposed DCTP protocol. Keywords: Underwater Wireless Sensor Networks, Data Collection, Routing Protocols, Performance Evaluation Orginal Source URL: https://aircconline.com/ijcnc/V12N5/12520cnc01.pdf Volume Link: http://airccse.org/journal/ijc2020.html References [1] K. Chen, M. Ma, E. Cheng, F. Yuan, and W. Su, A Survey on MAC Protocols for Underwater Wireless Sensor Networks, IEEE Comm. Surveys & Tut., vol. 16, no. 3, pp. 1433– 1447, 2014. [2] G. Tuna, G andV.C. Gungor, A Survey on Deployment Techniques, Localization Algorithms, and Research Challenges for Underwater Acoustic Sensor Networks. Int. J. Commun. Syst., Vol. 30, Issue 17, pp. 1-21, 2017.
  • 3. [3] Z. Wang,X. Feng, G. Han, Y. Sui, and H. Qin, EODL: Energy Optimized Distributed Localization Method in 3DUnderwater Acoustic Sensors Networks. Computer Networks 2018, 141, 179–188. [4] F. Al Salti, N. Alzeidi, and B. Arafeh, EMGGR: An Energy-Efficient Multipath Grid-Based Geographic Routing Protocol for Underwater Wireless Sensor Networks, Wireless Networks, volume 23, no. 4, pp. 1301–1314, May 2017. [5] R. Gomathi andJ.M.L. Manickam, Energy Efficient Shortest Path Routing Protocol for Underwater Acoustic Wireless Sensor Network. Wireless Personal Commun. 2018, 98, 843–856. [6] S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, Void-Handling Techniques for Routing Protocols in Underwater Sensor Networks: Survey and Challenges. IEEE Communications Surveys Tutorials 19, 2 (Secondquarter 2017), 800–827, 2017. [7] Z. H. Jiang, Underwater Acoustic Networks-Issues and Solutions, International Journal of Intelligent Control and Systems, vol. 13, no. 3, pp.152–161, 2008. [8] M. Ahmed, Routing Protocols for Underwater Wireless Sensor Network Based on Location: A Survey, Ad Hoc & Sensor Wireless Networks, 38:67-101, 2018. [9] T. Islam, andY. K. Lee, A Comprehensive Survey of Recent Routing Protocols for Underwater Acoustic Sensor Networks. Sensors, 19(19), 4256. doi:10.3390/s19194256. [10] G. Han, J. Jiang, N. Bao, L. Wan, and M. Guizani, Routing Protocols for Underwater Wireless Sensor Networks, IEEE Communications Magazine, pp. 72-78, November 2015. [11] P. Xie, J.-H. Cui, and L. Lao, VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks, in Proceedings of IFIP Networking'06, Coimbra, Portugal, 2006, pp. 1216– 1221. [12] H. Yan, Z. J. Shi, and J.-H. Cui, Depth Based Routing for Underwater Sensor Networks, in Proc. 7th International IFIP-TC6 Networking Conference on Ad-Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, Singapore, 2008, pp. 72-86. [13] J. M. Jornet, M. Stojanovic, and M. Zorzi, Focused Beam Routing Protocol for Underwater Acoustic Networks, I Proc. International Conference on Mobile Computing and Networking, ACM International Workshop on Underwater Networks, San Francisco, 2008. pp. 75–82. [14] Y.-S. Chen, T.-Y. Juang, Y.-W. Lin, and I.-C. Tsai, A Low Propagation Delay Multi-Path Routing Protocol for Underwater Sensor Networks,J. of Int. Technology, vol. 11, no. 2, 153–165, 2010.
  • 4. [15] P. Xie et al., Aqua-Sim: An NS-2 Based Simulator for Underwater Sensor Networks, in Proceedings of MTS/IEEE Biloxi - Marine Technology for Our Future: Global and Local Challenges (OCEANS 2009), 2009, pp. 1–7. [16] LinkQuest: Underwater Acoustic Modem Models. [Online]. Available: http://www.linkquest.com/html/models1.htm. [Accessed: 10-Apr-2018]. [17] J.-H. Cui, J. Kong, M. Gerla, and S. Zhou, The challenges of building mobile underwater wireless networks for aquatic applications, IEEE Networks, vol. 20, no. 3, pp. 12–18, May 2006. [18] Z. S. Peng Xie, Zhong Zhou, Zheng Peng, Jun-hong Cui, Void Avoidance in Mobile Underwater Sensor Networks, in WUWNet’07, 2007. [19] X. Hong, M. Gerla, G. Pei, and C.-C. Chiang, A Group Mobility Model for Ad Hoc Wireless Networks, in Proceedings of the 2nd ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems - MSWiM ’99, 1999, pp. 53–60. [20] Z. Zhou, Z. Peng, J.-H. Cui, Z. Shi, and A. Bagtzoglou, Scalable Localization with Mobility Prediction for Underwater Sensor Networks, IEEE Trans. Mob. Comput., vol. 10, no. 3, pp. 335– 348, Mar. 2011. [21] Faiza Al-Salti, Nasser Alzeidi , Khaled Day , Abderezak Touzene, An Efficient and Reliable GridBased Routing Protocol for UWSNs by Exploiting Minimum Hop Count, Computer Networks 162 (2019) 106869.
  • 5. A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY Saleh Saraireh Department of Communications and Electronic Engineering, Philadelphia University, Amman,Jordan. Abstract The information security has become one of the most significant problems in data communication. So it becomes an inseparable part of data communication. In order to address this problem, cryptography and steganography can be combined. This paper proposes a secure communication system. It employs cryptographic algorithm together with steganography. The jointing of these techniques provides a robust and strong communication system that able to withstand against attackers. In this paper, the filter bank cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed. After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted message in the cover image by modifying the wavelet coefficients. The performance of the proposed system is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show that, the proposed system provides high level of security. Keywords: Steganography, Cryptography, DWT, Filter bank, PSNR. Orginal Source URL: http://airccse.org/journal/cnc/5313cnc10.pdf Volime Link: http://airccse.org/journal/ijc2013.html References [1 ] Obaida Mohammad Awad Al-Hazaimeh, (2013) "A New Approach for Complex Encrypting and Decrypting Data" International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2. [2] Katzenbeisser, S. and Petitcolas, F.A.P. 2000, Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Inc., Boston, London. [3] Xinpeng Zhang and Shuozhong Wang, (2005), "Steganography Using MultipleBase Notational System and Human Vision Sensitivity", IEEE signal processing letters, Vol. 12, No. 1. [4] Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE signal processing letters, Vol. 13, No. 5.
  • 6. [5] Piyush Marwaha, Paresh Marwaha, (2010), "Visual Cryptographic Steganography in images", IEEE, 2nd International conference on Computing, Communication and Networking Technologies. [6] G.Karthigai Seivi, Leon Mariadhasan and K. L. Shunmuganathan, (2012), " Steganography Using Edge Adaptive Image " IEEE, International Conference on Computing, Electronics and Electrical Technologies. [7] Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, (2012), " A Secure and High Capacity Image Steganography Technique", Signal & Image Processing : An International Journal (SIPIJ) Vol.4, No.1. [8] Tong L.and Zheng-ding, Q, (2002), "DWT-based color Images Steganography Scheme", IEEE International Conference on Signal Processing, 2:1568-1571. [9] Mandal J.K. and Sengupta M., (2010), “Authentication/Secret Message Transformation Through Wavelet Transform based Subband Image Coding (WTSIC).”, Proceedings of International Symposium on Electronic System Design, IEEE Conference Publications, pp 225 – 229. [10] Septimiu F. M., Mircea Vladutiu and Lucian P., (2011),"Secret data communication system using Steganography, AES and RSA", IEEE 17th International Symposium for Design and Technology in Electronic Packaging. [11] H. Tian, K. Zhou, Y. Huang, D. Feng, J. Liu, (2008), "A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP", IEEE The 9th International Conference for Young Computer Scientists, pp. 647-652. [12] Y. Huang, B. Xiao, H. Xiao, (2008), "Implementation of Covert Communication Based on Steganography", IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1512-1515. [13] Cheddad, A, Condell, Joan, Curran, K and McKevitt, Paul,(2008), "Securing Information Content using New Encryption Method and Steganography", IEEE Third International Conference on Digital Information Management. [14] Rasul E., Saed F. and Hossein S, (2009), " Using the Chaotic Map in Image Steganography", IEEE, International Conference on Signal Processing Systems. [15] Majunatha R. H. S. and Raja K B, (2010), "High Capacity and Security Steganography using Discrete Wavelet Transform", International Journal of Computer Science and Security (IJCSS), Vol. 3: Issue (6) pp 462-472.
  • 7. [16] Saraireh S. and Benaissa M., (2009), “A Scalable Block Cipher Design using Filter Banks and Lifting over Finite Fields” In IEEE International Conference on Communications (ICC), Dresden, Germany. [17] El Safy, R.O, Zayed. H. H, El Dessouki. A, (2009), “An adaptive steganography technique based on integer wavelet transform,” ICNM International Conference on Networking and Media Convergence, pp 111-117.
  • 8. JAMMING DETECTION BASED ON DOPPLER SHIFT ESTIMATION IN VEHICULAR COMMUNICATIONS SYSTEMS Javad Afshar Jahanshahi Universidad Católica Los Ángeles de Chimbote, Instituto de Investigación, Chimbote, Perú Abstract Since Doppler shift is one of the most important parameters in wireless propagation, the evaluation of the Doppler shift at the base station (BTS) in vehicular communications improves BTS in many aspects such as channel varying rate, jamming detection, and handover operations. Therefore, in this study, we propose a novel method at a base station based on the received user signal to estimate the channel Doppler shift seen by BTS. Utilizing the inherent information existed in common receivers, a level crossing rate (LCR) based Doppler shift estimation algorithm is developed without any excessive hardware. Moreover, a jamming detection algorithm is improved based on the proposed Doppler shift estimation scheme. The performance of the proposed scheme is evaluated in a Terrestrial Trunked Radio (TETRA) network, and comprehensive experimental results have shown superior performance in a wide range of velocities, signal to noise ratios and jammers. Keywords: Jamming Detection, Vehicular Communications, Level Crossing Rate, Mobile Communication, TETRA (Terrestrial Trunked Radio). Orginal Source URL: https://aircconline.com/ijcnc/V12N5/12520cnc02.pdf Volime Link: http://airccse.org/journal/ijc2020.html References [1] Sampath, A., &Holtzman, J. M. (2003, May). Estimation of maximum Doppler frequency for handoff decisions.In IEEE 43rd Vehicular Technology Conference (pp. 859-862).IEEE. [2] Merwaday, A., &Güvenç, I. (2016). Handover count based velocity estimation and mobility state detection in dense HetNets. IEEE Transactions on Wireless Communications, 15(7), 4673- 4688. [3] Baddour, K. E., & Beaulieu, N. C. (2015). Robust Doppler spread estimation in nonisotropic fading channels. IEEE Transactions on Wireless Communications, 4(6), 2677-2682. [4] Bellili, F., Selmi, Y., Affes, S., &Ghrayeb, A. (2017). A low-cost and robust maximum likelihood joint estimator for the Doppler spread and CFO parameters over flat-fading Rayleigh channels. IEEE Transactions on Communications, 65(8), 3467-3478.
  • 9. [5] Anim-Appiah, K. D. (1999). On generalized covariance-based velocity estimation. IEEE Transactions on Vehicular Technology, 48(5), 1546-1557. [6] Zhang, H., &Abdi, A. (2009). Nonparametric mobile speed estimation in fading channels: Performance analysis and experimental results. IEEE transactions on wireless communications, 8(4), 1683-1692. [7] Holtzman, J. M., &Sampath, A. (2005). Adaptive averaging methodology for handoffs in cellular systems. IEEE Transactions on Vehicular Technology, 44(1), 59-66. [8] Zemen, T., &Molisch, A. F. (2012). Adaptive reduced-rank estimation of nonstationary time- variant channels using subspace selection. IEEE Transactions on Vehicular Technology, 61(9), 4042-4056. [9] Tepedelenlioğlu, C., Abdi, A., Giannakis, G. B., &Kaveh, M. (2011). Estimation of Doppler spread and signal strength in mobile communications with applications to handoff and adaptive transmission. Wireless Communications and Mobile Computing, 1(2), 221-242. [10] Engdahl, K., &Andersson, L. (2010).Detection of high velocity movement in a telecommunication system.U.S. Patent No. 7,647,049. Washington, DC: U.S. Patent and Trademark Office. [11] Austin, M. D., &Stuber, G. L. (2004). Velocity adaptive handoff algorithms for microcellular systems. IEEE Transactions on Vehicular Technology, 43(3), 549-561. [12] Klein, T. E., Leung, K. K., &Zheng, H. (2007).Method and apparatus for scheduling transmissions in wireless data networks.U.S. Patent No. 7,283,814. Washington, DC: U.S. Patent and Trademark Office. [13] Mottier, D., &Castelain, D. (2009, September). A Doppler estimation for UMTS-FDD based on channel power statistics. In Gateway to 21st Century Communications Village.VTC 1999-Fall. IEEE VTS 50th Vehicular Technology Conference (Cat. No. 99CH36324) (Vol. 5, pp. 3052-3056).IEEE. [14] Liu, Q. Y., Wang, M., &Zhong, Z. D. (2011). Statistics of capacity analysis in high speed railway communication systems. Tamkang Journal of Science and Engineering, 14(3), 209-215. [15] Tepedelenlioğlu, C., Abdi, A., Giannakis, G. B., &Kaveh, M. (2011). Estimation of Doppler spread and signal strength in mobile communications with applications to handoff and adaptive transmission. Wireless Communications and Mobile Computing, 1(2), 221-242. [16] Zhang, C., Fan, P., Dong, Y., &Xiong, K. (2015). Service‐based high‐speed railway base station arrangement. Wireless Communications and Mobile Computing, 15(13), 1681-1694.
  • 10. [17] Jingyu, H., Xiaohu, Y., Bin, S., & Kim, Y. H. (2014, May). A Scheme for the Doppler shift estimation despite the Power control in Mobile Communication Systems. In 2004 IEEE 59th Vehicular Technology Conference.VTC 2004-Spring (IEEE Cat.No. 04CH37514) (Vol. 1, pp. 284- 288).IEEE. [18] Shu, M. L., Hua, J. Y., Li, F., Xu, Z. J., & Wang, D. M. (2014, November). Doppler shift estimation exploiting iterative processing in mobile communications. In 2014 International Workshop on High Mobility Wireless Communications (pp. 53-56). IEEE. [19] Austin, M. D., &Stuber, G. L. (2004). Eigen-based Doppler estimation for differentially coherent CPM. IEEE transactions on Vehicular Technology, 43(3), 781-785. [20] Choi, Y. S., &Alamouti, S. (2010).Doppler frequency determination for mobile wireless devices.U.S. Patent No. 7,801,084. Washington, DC: U.S. Patent and Trademark Office. [21] Jinyu, H., Han, H., Qingmin, M., &Xiaohu, Y. (2014, September). A scheme for the SNR estimation and its application in Doppler shift estimation of mobile communication systems.In IEEE 60th Vehicular Technology Conference, 2004.VTC2004-Fall.2004 (Vol. 1, pp. 24- 27).IEEE. [22] Ke, X. Q., Yuan, F., Gao, C. X., & Cheng, E. (2018, December). A robust and efficient digital FM underwater acoustic voice communication system based on SNR estimation.In Proceedings of the Thirteenth ACM International Conference on Underwater Networks & Systems (pp. 1-5). [23] Krasny, L., Arslan, H., Koilpillai, D., &Chennakeshu, S. (2011). Doppler spread estimation in mobile radio systems. IEEE communications letters, 5(5), 197-199. [24] Veluppillai, M., Sangary, N. T., Simmons, S. B., &Jarmuszewski, P. (2013).Method, device and system for detecting the mobility of a mobile device.U.S. Patent No. 8,442,447. Washington, DC: U.S. Patent and Trademark Office. [25] Narasimhan, R., & Cox, D. C. (2009). Speed estimation in wireless systems using wavelets. IEEE Transactions on Communications, 47(9), 1357-1364. [26] Rezende, C., Boukerche, A., Pazzi, R. W., Rocha, B. P., &Loureiro, A. A. (2011). The impact of mobility on mobile ad hoc networks through the perspective of complex networks. Journal of Parallel and Distributed Computing, 71(9), 1189-1200. [27] Sha, Y., Yao, N., &Xu, X. (2008, October). Improvement and Performance Analysis of A Scheme for the Maximum Doppler Frequency Estimation. In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (pp. 1-4).IEEE. [28] Nanda, S., Rezaiifar, R., &Yavuz, M. (2014).Method and apparatus for interference management, U.S. Patent No. 8,923,212. Washington, DC: U.S. Patent and Trademark Office.
  • 11. [29] Cho, M. G., & Hong, D. (2016).Velocity Estimation Apparatus and Method Using Level Crossing Rate.U.S. Patent No. 7,120,440. Washington, DC: U.S. Patent and Trademark Office. [30] Forenza, A., & Perlman, S. G. (2017).System and method for managing inter-cluster handoff of clients which traverse multiple DIDO clusters, U.S. Patent No. 9,826,537. Washington, DC: U.S. Patent and Trademark Office. [31] Mark, S., Rafael, C., & Salomon, S. (2013). Transceivers and method for use in radio communications. European Patent Application, EP, 1(304), 895. [32] Gorokhov, A., Khandekar, A., Tingfang, J. I., &Bhushan, N. (2015).System and method to enable resource partitioning in wireless networks.U.S. Patent No. 9,179,469. Washington, DC: U.S. Patent and Trademark Office. [33] Moscovitz, Y., Deperini, F., &Locatelli, M. (2010).Method and User Equipment for Jamming Detection and Signaling in a Mobile Telecommunications Network,U.S. Patent No. 7,680,450. Washington, DC: U.S. Patent and Trademark Office. [34] Breuer, V., &Wehmeier, L. (2019). Method of detecting a jamming transmitter affecting a communication user equipment. U.S. Patent No. 10,263,726. Washington, DC: U.S. Patent and Trademark Office. [35] Kurhila, M., &Torvinen, M. (2014). Base station. United State Patent, 203423, A1. [36] Shepard, C., Yu, H., Anand, N., Li, E., Marzetta, T., Yang, R., &Zhong, L. (2012, August). Argos: Practical many-antenna base stations. In Proceedings of the 18th annual international conference on Mobile computing and networking (pp. 53-64). [37] Jover, R. P., &Murynets, I. (2016). U.S. Patent No. 9,295,028. Washington, DC: U.S. Patent and Trademark Office. [38] Bereziński, P., Szpyrka, M., Jasiul, B., & Mazur, M. (2016, September). Network anomaly detection using parameterized entropy.In IFIP International Conference on Computer Information Systems and Industrial Management (pp. 465-478).Springer, Berlin, Heidelberg. [39] Behal, S., & Kumar, K. (2017). Detection of DDoS attacks and flash events using novel information theory metrics. Computer Networks, 116, 96-110. [40] Waskita, A. A., Suhartanto, H., &Handoko, L. T. (2016, October). A performance study of anomaly detection using entropy method.In 2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA) (pp. 137-140). IEEE. [41] Spuhler, M., Giustiniano, D., Lenders, V., Wilhelm, M., & Schmitt, J. B. (2014). Detection of reactive jamming in DSSS-based wireless communications. IEEE Transactions on Wireless Communications, 13(3), 1593-1603.
  • 12. [42] Vijayakumar, K. P., Ganeshkumar, P., Anandaraj, M., Selvaraj, K., &Sivakumar, P. (2018). Fuzzy logic–based jamming detection algorithm for cluster-based wireless sensor network. International Journal of Communication Systems, 31(10), e3567. [43] Hamamoto, A. H., Carvalho, L. F., Sampaio, L. D. H., Abrão, T., &ProençaJr, M. L. (2018). Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Systems with Applications, 92, 390-402. [44] Khan, M. A., Khan, S., Shams, B., &Lloret, J. (2016). Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks. Security and Communication Networks, 9(15), 2715-2729. [45] Rappaport, T. S. (2006). Wireless communications: principles and practice (Vol. 2). New Jersey: prentice hall PTR. [46] Lin, L., So, H. C., & Chan, Y. T. (2013). Accurate and simple source localization using differential received signal strength. Digital Signal Processing, 23(3), 736-743.
  • 13. CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO PREDICT STUDENT PERFROMANCE Mital Doshi 1 , Dr.Setu K Chaturvedi, Ph.D 2 1 Mtech. Research Scholar Technocrats Institute of Technology Bhopal, India 2 Professor & HOD (Dept. of CSE) Technocrats Institute of Technology Bhopal, India Abstract Education data mining is an emerging stream which helps in mining academic data for solving various types of problems. One of the problems is the selection of a proper academic track. The admission of a student in engineering college depends on many factors. In this paper we have tried to implement a classification technique to assist students in predicting their success in admission in an engineering stream.We have analyzed the data set containing information about student’s academic as well as sociodemographic variables, with attributes such as family pressure, interest, gender, XII marks and CET rank in entrance examinations and historical data of previous batch of students. Feature selection is a process for removing irrelevant and redundant features which will help improve the predictive accuracy of classifiers. In this paper first we have used feature selection attribute algorithms Chi-square.InfoGain, and GainRatio to predict the relevant features. Then we have applied fast correlation base filter on given features. Later classification is done using NBTree, MultilayerPerceptron, NaiveBayes and Instance based –K- nearest neighbor. Results showed reduction in computational cost and time and increase in predictive accuracy for the student model Keywords: Chi-square, Correlation feature selection, IBK, Infogain, Gainratio, Multilayer perceptron, NaiveBayes, NBTree Orginal Source URL: http://airccse.org/journal/cnc/6314cnc15.pdf Volime Link: http://airccse.org/journal/ijc2014.html References [1] Ladha L. and Deepa T., "Feature Selection Methods and Algorithms", International Journal on Computer Science and Engineering (IJCSE), 2011. [2] R. Kohavi. “Scaling Up the Accuracy of Naive-Bayes Classifiers: a Decision-Tree Hybrid” Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, 1996
  • 14. [3] Baker, R.S.J.D. (2010). Data Mining for Education. In B. McGaw, P. Peterson, E. Baker (eds.), International Encyclopaedia of Education (3rd edition), (pp. 112-118). Oxford, UK: Elsevier [4] Pathom Pumpuang, Anongnart Srivihok , Prasong Praneetpolgrang, “Comparisons of Classifier Algorithms: Bayesian Network, C4.5, Decision Forest and NBTree for Course Registration Planning Model of Undergraduate Students”, 1-4244-2384-2/08/ 2008 IEEE [5] Miren Tanna, “Decision Support System for Admission in Engineering Colleges based on Entrance Exam Marks”, IJCA(0975 – 8887) Volume 52– No.11, August 2012 [6] Malaya Dutta Borah, Rajni Jindal, Daya Gupta Ganesh Chandra Deka, “Application of knowledge based decision technique to predict student enrollment decision”, 978-1-4577-0792- 6/11 2011 IEEE [7] Qasem A. Al-Radaideh, Ahmad Al Ananbeh, and Emad M. Al-Shawakfa, “A classification model for predicting the suitable study track for school students”, Vol8 Issue2/IJRRAS_8_2_15.pdf, August 2011 [8] Hany M. Harb1, Malaka A. Moustafa, “Selecting optimal subset of features for student performance model”, IJCSI Vol. 9, Issue 5, No 1, September 2012, 1694-0814 [9] Lei Yu leiyu,Huan Liu, “Feature Selection for High-Dimensional Data: A Fast Correlation- Based Filter Solution”, (ICML-2003), Washington DC, 2003. [10] B. K. Bharadwaj and S. Pal. "Mining Educational Data to Analyze Students' Performance", International Journal of Advance Computer Science and Applications (IJACSA), Vol. 2, No. 6, pp.63-69, 2011. [11] S. T. Hijazi, and R. S. M. M. Naqvi, "Factors affecting student's performance: A Case of Private Colleges", Bangladesh e-Journal of Sociology, Vol. 3, No. 1, 2006. [12] Z. N. Khan, "Scholastic achievement of higher secondary students in science stream", Journalof Social Sciences, Vol. 1, No. 2, pp. 84-87, 2005. [13] Z. J. Kovacic, “Early prediction of student success: Mining student enrollment data”,Proceedings of Informing Science & IT Education Conference 2010 [14] Blum & Langley, 1997; Kohavi &John, 1997 [15] Hall, M. (1999). Correlation based feature selection for machine learning. Doctoral dissertation, Universityof Waikato, Dept. of Computer Science. [16] WEKA,http://www.cs.waikato.ac.nz/ml/weka, Last access, 8 April 2008.
  • 15. WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT Y. –J. Lee Department of Technology Education, Korea National University of Education, Cheongju, South Korea Abstract This paper addresses web object size which is one of important performance measures and affects to service time in multiple access environment. Since packets arrive according to Poission distribution and web service time has arbitrary distribution, M/G/1 model can be used to describe the behavior of the web server system. In the time division multiplexing (TDM), we can use M/D/1 with vacations model, because service time is constant and server may have a vacation. We derive the mean web object size satisfying the constraint such that mean waiting time by round-robin scheduling in multiple access environment is equal to the mean queueing delay of M/D/1 with vacations model in TDM and M/H2/1 model, respectively. Performance evaluation shows that the mean web object size increases as the link utilization increases at the given maximum segment size (MSS), but converges on the lower bound when the number of embedded objects included in a web page is beyond the threshold. Our results can be applied to the economic design and maintenance of web service. Keywords: M/D/1 with vacations, M/H2/1, mean waiting time, multiple web access Orginal Source URL: http://airccse.org/journal/cnc/6414cnc01.pdf Volime Link: http://airccse.org/journal/ijc2014.html References [1] S. Ross, Introduction to probability model, Academic press, NewYork, 2010, p. 538, USA. [2] W. Shi, E. Collins, and V. Karamcheti, “Modeling Object Characteristics of Dynamic Web Content,” Journal of Parallel and Distributed Computing, Elsevier Science, pp. 963-980, 1998. [3] R. Khayari, R. Sadre and B. R. Haverkort, “Fitting world-wide web request traces with the EMalgorithm, Performance Evaluation,” Vol. 52, pp. 175-191, 2003. [4] A. Riska, V. Diev and E. Smirni, “Efficient fitting of long-tailed data sets into hyper- exponential distributions,” Proc. of IEEE Global Telecommunications Conference (GLOBECOM 2002), Vol. 3, pp. 2513-2517, 2002.
  • 16. [5] Y. Lee, “Mean waiting delay for web service perceived by end-user in multiple access environment,” Natural Science , vol. 2, Natural Science Institute of KNUE, pp. 55-58, 2012. [6] S. K. Bose, “M/G/1 with vacations,” http:// www.iitg.ernet.in/skbose/qbook/Slide_Set_7.PDF, pp. 1-7, 2002. [7] N. Tian and Z. G. Zhang, Vacation Queueing Model, Springer Science and Business Media, pp. 10-11, 2006. [8] E. Modiano, “Communication systems engineering,” MIT OpenCourseWare, http://ocw.mit.edu, pp. 1-19, 2009. [9] S. W. Fuhrmann, “Technical Note—A Note on the M/G/1 Queue with Server Vacations,” Operations Research, Vol. 32, No. 6, pp. 1368-1373, 1984. [10] D. Bertsekas and R. Gallager, Data Networks, Prentice Hall, New Jersey, pp. 186-195, 2007. [11] M. S. Obaidat and N. A. Boudriga, Fundamentals of Performance Evaluation of Computer and Tele-communication Systems, Wiely, pp. 156-157, 2010. [12] Y. Lee, “Mean waiting time of an end-user in the multiple web access environment,” Proc. of the Sixth International Conference on Communication Theory, Reliability, and Quality of Service (CTRQ-2013), pp. 1-4, 2013.
  • 17. ZIGBEE TECHNOLOGY AND ITS APPLICATION IN WIRELESS HOME AUTOMATION SYSTEMS: A SURVEY Thoraya Obaid, HaleemahRashed, Ali Abou-Elnour, Muhammad Rehan, Mussab Muhammad Saleh, and Mohammed Tarique Department of Electrical Engineering, Ajman University of Science and Technology P.O. Box 2202, Fujairah, United Arab Emirates (UAE) Abstract Wireless home automation systems have drawn considerable attentions of the researchers for more than a decade. The major technologies used to implement these systems include Z-Wave, Insteon, Wavenis, Bluetooth, WiFi, and ZigBee. Among these technologies the ZigBee based systems have become very popular because of its low cost and low power consumption. In this paper ZigBee based wireless home automation systems have been addressed. There are two main parts of this paper. In the first part a brief introduction of the ZigBee technology has been presented and in the second part a survey work on the ZigBee based wireless home automation system has been presented. The performances of the ZigBee based systems have also been compared with those of other competing technologies based systems. In addition some future opportunities and challenges of the ZigBee based systems have been listed in this paper. Keywords: Home automation, ZigBee, Z-Wave, Insteon, Waveins,PAN, voice control, energy management, assistive homes, industrial automation Orginal Source URL: http://airccse.org/journal/cnc/6414cnc11.pdf Volime Link: http://airccse.org/journal/ijc2014.html References [1] A.J. Bernheim Brush, Bongshin Lee, Ratul Mahajan, Sharad Agrawal, Stefan Saroiu, Collin Dixon,(2011) ,“Home Automation in the Wild: Challenges and Opportunities”, Proceedings of ACM CHI Conference on Human Factors o Computing System, May 7-12, Vancouver, BC, Canada [2] ABI Research on home automation available at http://www.abirearch.com [3] Richard Harper, “ Inside the Smart Home”, Springer-Verlag London Limited (2003)
  • 18. [4] Juile A Kietz, Shwetak N. Patel, Brian Jones, Ed Price, Elizabeth D. Mynatt, Greogory A. Abowd, (2008) “The Georgia Tech aware Home”, The 26th CHI Conference, April 5-10, Florence, Italy, pp. 3675-3680 [5] TiiuKoskela and Kaosa-vaananen-vainio-Mattila, (2004) “Evolution towards smart home environments:empirical evaluation of three users interfaces, International Journal of Personal and Ubiquitous Computing, July, Vol. 8, No. 3-4, pp. 234-240 [6] Daine J. Cook and Sajal K. Das, (2005) “Smart Home Environments: Technology, Protocols, andapplications”, Wiley series of Parallel and Distributed Computing (kindle Edition, pp. 273- 294 [7] Tom Rodden and Steve Benford,(2003) “ The evolution of buildings and implications for the design of ubiquitous domestic environments”, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 5-10, Fort Lauderdale, Florida, pp. 9-16 [8] Home security systems, home security products, and home alarm systems available at http://www.adt.com [9] W. Keith Edwards, Rebecaa E. Grinter, Ratul Mahajan, and David Wetherall,(2011)“ Advancing thestate of home networking”, Communication of ACM, Vol. 5, No.6, July, pp. 62- 71 [10] Forest and Sullivan, “North American Home Automation Market”, available at http://www.forest.com/sublib [11] Intile S.S., (2002) “Designing a home of the future”, IEEE Pervasive Computing, Vol. 1, No.2, pp. 76- 82 [12] Scott Davidoff, Min Kyung Lee, Charles Yiu, John Zimmerman, and Anind K. Dey,(2006) “ Principlesof smart home control”, Proceedings of the 8th International Conference on Ubiquitous Computing, 17-21 September, pp. 19-34. [13] Carles Gomez and Joseph Paradells,(2010) “Wireless Home Automation Networks: A survey of Architectural and Technologies”, IEEE Communication Magzine, June, pp. 92-101 [14] A.J. D. Rathnayaka, V.M. Poddar, (2011)“ Evaluation of Wireless Home Automation Technologies”, Proceedings of the 5th International Conference on Digital Ecosystems and Technologies, May 31, 2011, Daejeon, Korea, pp. 76-81 [15] Frost and Sullivan, “Innovation and Affordability open up home automation to alarge audience” available at http://www.frost.com/prod/servlet/press-release-pag?docid=273090581 [16] The Z-Wave technology available at http://www.z-wavealliance.org/technology
  • 19. [17] P. Darbee, “ INSTEON: The Details”, 2005-2013 available at www.insteon.com [18] http://www.radiocomms.com.au/products/42985-Wavenis-Open-Standard-Alliance [19] https://www.bluetooth.org [20] http://www.wi-fi.org/ [21] https://www.zigbee.org/ [22] The IEEE 802.15.4 standard available at http://standards.ieee.org/getieee802/download/802.15.4d2009.pdf [23] IPv6 over Low power WPAN (6lowpan) available at http://datatracker.ietf.org/wg/6lowpan/ [24] http://www.enocean-alliance.org/en/home/ [25] http://www.thetrackit.com/library/UWB%20Defin.pdf [26] Dechuan Chen and MeifangWabg,(2006) “A home security ZigBee network for remote monitoring application”, Proceedings of IET International Conference on Wireless, Mobile, and Multimedia networks”, November 6-9, Hangzhou , China, pp. 1-4 [27] ManaseePatil and S.R.N. Reddy, (2013) “Design and Implementation of Home/Office Automation System based on Wireless Technologies”, International Journal of Computer Application, Vol. 69,No.6, October , pp. 19-22 [28] V. Sathya Narayanan1 and S. Gayathri, “Design of Wireless Home automation and security system using PIC Microcontroller”, International Journal of Computer Applications in Engineering Sciences, Vol. 3, special issue, pp. 135-140 [29] Woo-Choo Park and Myung-Hyun Yoon, (2006)“ The Implementation of Indoor Location System to Control ZigBee Home Network”, Proceedings of International Joint Conference SICR-ICASE”, October 18-21, Busan, South Korea, pp. 2158-2161 [30] Kawamoto, R., Emon , T., Sakata, S., and Youasa, K., (2007)“ Energy efficient sensor control scheme for Home Networks based on DLNA-ZigBee Gateway Architecture”, Proceedings of the First International Global Information Infrastructure Symposium, July 2-6, 2007, Marrakech, Morocco, pp. 73-79 [31] Zhang Shunyang, Xu Du, Jiang Yongping,() Wang Riming, “ Realization of Home Remote Controlnetworks based on ZigBee”, Proceedings of the 8th International Conference on Electronic Measurements and Instrumentations, August 16-18, Xiang, China, pp. 4-344-4-348 [32] Jan Hou, Wu Cang dong, Zhongjia Yuan, Jiyuan Tan, “ Research of Intelligent Home Security Surveillance System based on ZigBee”, Proceedings of the Initial Symposium on Intelligent Information Technology Application Workshops, December 21-22, Shanghai, pp. 554-557
  • 20. [33] Jianfeng Wu, and Hubin Qin, (2008)“ The deisgn of wireless intelligent home system based on ZigBee”, Proceedings of the 11th IEEE International Conference on Communication Technology, November 11-12, HagZhau, pp. 73-76 [34] Chunglong Zhang, Min Zhang, Young Sheng Su, and Weillian Wang, (2012) “ Smart home design based on ZigBee wireless sensor network”, Proceedings of the 7th International ICST Conference on Communications and networking, Kun Ming, pp. 463-466 [35] Jui-Yu Chang, Tao-Yuan, Min-Hsing Hung, and Yen-Wei Chang, (2007) “A ZigBee based Power Monitoring System with Direct Load Control Capabilities”, Proceedings of IEEE International Conference on Networking, Sensing, and Control, April 15-17, London, 2007, pp. 895-900 [36] Ying-Wen Bai and Chi-Huang Hang, “ Remote Power ON/OFF control and current measurementfor home electric outlets based on a low-power embedded board and ZigBee Communication”, Proceedings of IEEE International Symposium on Consumer Electronics, April 14-16, Vilamoura, pp.1-4 [37] Jin Sung Byum, BoungjuJeon, Junyoung Noh, and Youngil Kim, “ An Intelligent self- adjusting sensor for smart home services based on ZigBee Communiation”, IEEE Transaction on Consumer Eletronics, Vol. 58, No. 3, pp. 799-802 [38] Chihhsiong Shih and Bwo-cheng Liang, “ A model driven software framework for ZigBee based energy saving systems”, Proceedings of the 3rd International Conference on Intelligent Systems, modeling and Simulation, February 8-10, Kota Kinabaiu, pp. 487-492 [39] Karia Deepak, JaypalBavisker, Raj Makwana and PanchatNiraj,(2013) “ Performance analysis of ZigBee based load control and power monitoring system”, Proceedings of the InternationalConference on Advances in Computing, Communications, and Informatics, Myshore, August, 25, 2013, pp. 1779- 1484. [40] Jieming Zhu, Xuecai, Yucang Yang, and Hang Li, (2010)“ Developing a voice control system forZigBee based home automation”, Proceedings of IEEE International Conference on network Infrastructure and Digital Content, September 24-26, Beijing, 2010, pp. 7737-741 [41] Y.B. Krishna and S. Nagendram,(2012)“ ZigBee Based Voice Control System for Smart Home”, International Journal on Computer Technology and Applications, Vol. 3, no. 1 , pp. 163- 168 [42] Gananasekar, A.K., Jayarelu, P., and V. Nagrajan,(2012) “Speech recognition based wireless automation of home with fault identification for physically challenged”, Proceedings of International Conference on Communications and Signal Processing, April 4-5 2012, Chennai, pp. 128- 132
  • 21. [43] Al Shueili, H. and Sen Gupta G, Mukhopadhyaya, (2001)“ Voice recognition based wireless home automation system”, Proceedings of the International Conference on Mechatronics , May 17-19, Kualalumpur, pp. 1-6 [44] Dhawan S. Thakur and Aditi Sharma,(2013)” Voice Recognition Wireless Home Automation System based on ZigBee”IOSR Journal of Electronic and Communication Engineering, Vol. 6, No. 1 May-June 2013, pp. 65-75. [45] MitaliPatil, AshwiniBedare, and VarshaPacharne,(2013) “The Design and Implementation of VoiceControlled Wireless Intelligent Home Automation System Based on ZigBee”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 4, April 2013, pp. 307-310 [46] T. Kirankumar, and B. Bhavani,(2013) ” A Sustainable Automated System for Elderly People Using Voice Recognition and Touch Screen Technology”, International Journal of Science andResearch (IJSR), Vol. 2, No. 8, August 2013, pp. 265-267 [47] Y.Usha Devi,(2012) “Wireless Home Automation System Using ZigBee”, International Journal of Scientific & Engineering Research,Volume 3, Issue 8, August, 2012, pp. 1-5 [48] http://www.zigbee.org/About/FAQ.aspx [49] Rathod K., Parikh, N., and Shah, V.,(2012) “Wireless automation using ZigBee protocols”, Proceedings of the 9th International Conference on Wireless and Optical Communication, lndere, September 20-22, 2012, pp.1-5 [50] http://www.skyworksinc.com/downloads/press_room/published_articles/ Microwave_Journal_082009.pdf [51] http://www.engineerlive.com/content/19359 [52] Simek, M., Fuchs, M, Mraz, L., and Morvek, P.,(2011) “Measurement of LowPAN Network coexistence with Home Microwave Appliances in Laboratory and Home Environments”, Proceedings of International Conference on Broadband and Wireless Computing, October 26-28, Bercelona, pp. 292-299 [53] Khusvinder Gill, Shuang-Hua Yang, Fang Yao, and Xin Lu, (2009) “A ZigBee-Based Home Automation System”, IEEE Transaction on Consumer Electronics”, Vol. 55, No. 2, May 2009, pp. 422- 430 [54] Fei Ding, Guangming Song, Jianing Li, and Higuo Song, (2008) “ A ZigBee Based Mesh Network forHome Control”, Proceedings of International Workshop on Geoscience and Remote Sensing”, Shanghai, Vol. 1, pp. 744-740
  • 22. [55] Cui Chenguyi, Zhao Guannan, and Jin Mingle,(2010) “ A ZigBee based embedded remote control System”, Proceedings of the 2nd International Conference on Signal Processing Systems, 5-7 July, Dalian, pp. v3-373-376 [56] NausheenBelim, HarshadaBhambure, Priyanka Kumbhar, and SimranjitTuteja,(2013) “Automate and Secure Your Home Using Zigbee Technology”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, No. 1, March 2013, pp. 63-66 [57] Meng-Shiuan Pan, Chia-Hung Tsai, Yu-Chee Tseng,(2009) “The Orphan Problem in ZigBee WirelessNetworks”, IEEE Transaction of Mobile Computing,November 2009, Vol. 8 , No. 11, pp. 1573-1584 [58] Xiu-Wei Yang, Jinan, China ; Yuan Xu ; Shu-Bo Qiu,(2011) “A Solution of Orphan Problem in ZigBee Tree Network”, Proceedings on the 7th International Conference on Wireless Communication, Networking and Mobile Computing, September 2011, Wuhan, pp. 1-4 [59] Michael Varhola and Milos Drutorvsky,(2007) “ZigBee Based Home Automation Wireless Sensor Networks”,ActaElectrotechnica et Informatics, Vol. 7, No. 4, 2007, pp. 1-8 [60] Napolean A., Karthik K., Kamalakannan M., Amarnath M., Nidhin A., (2013) ”Implementation of ZigBee based Home Automation System Using Voice Control”, International Journal of Engineering Research and Technology, Vol. 2, No. 5, May, pp. 723-733
  • 23. A DEEP LEARNING TECHNIQUE FOR WEB PHISHING DETECTION COMBINED URL FEATURES AND VISUAL SIMILARITY Saad Al-Ahmadi1 and Yasser Alharbi 2 1 College of Computer and Information Science, Computer Science Department, King Saud University, Riyadh, Saudi Arabia 2 College of Computer and Information Science, Computer Engineering Department, King Saud University, Riyadh, Saudi Arabia Abstract The most popular way to deceive online users nowadays is phishing. Consequently, to increase cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper, we propose an approach that rely on websites image and URL to deals with the issue of phishing website recognition as a classification challenge. Our model uses webpage URLs and images to detect a phishing attack using convolution neural networks (CNNs) to extract the most important features of website images and URLs and then classifies them into benign and phishing pages. The accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the proposed model in detecting a web phishing attack. Keywords: Phishing detection, URL, visual similarity, deep learning, convolution neural network. Orginal Source URL: https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf Volime Link: http://airccse.org/journal/ijc2020.html References [1] H. Thakur, “Available Online at www.ijarcs.info A Survey Paper On Phishing Detection,” vol. 7, no. 4, pp. 64–68, 2016. [2] G. Varshney, M. Misra, and P. K. Atrey, “A survey and classification of web phishing detection schemes,” Security and Communication Networks. 2016, doi: 10.1002/sec.1674. [3] E. S. Aung, T. Zan, and H. Yamana, “A Survey of URL-based Phishing Detection,” pp. 1–8, 2019, [Online]. Available: https://db-event.jpn.org/deim2019/post/papers/201.pdf. [4] S. Nakayama, H. Yoshiura, and I. Echizen, “Preventing false positives in content-based phishing detection,” in IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009, doi: 10.1109/IIH-MSP.2009.147.
  • 24. [5] A. K. Jain and B. B. Gupta, “Phishing detection: Analysis of visual similarity based approaches,” Security and Communication Networks. 2017, doi: 10.1155/2017/5421046. [6] A. Khan, A. Sohail, U. Zahoora, and A. S. Qureshi, “A Survey of the Recent Architectures of Deep Convolutional Neural Networks,” pp. 1–68, 2019, doi: 10.1007/s10462-020-09825-6. [7] J. Mao et al., “Phishing page detection via learning classifiers from page layout feature,” Eurasip J. Wirel. Commun. Netw., 2019, doi: 10.1186/s13638-019-1361-0. [8] I. F. Lam, W. C. Xiao, S. C. Wang, and K. T. Chen, “Counteracting phishing page polymorphism: An image layout analysis approach,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2009, doi: 10.1007/978-3-642- 02617-1_28. [9] T. C. Chen, T. Stepan, S. Dick, and J. Miller, “An anti-phishing system employing diffused information,” ACM Trans. Inf. Syst. Secur., vol. 16, no. 4, 2014, doi: 10.1145/2584680. [10] A. S. Bozkir and E. A. Sezer, “Use of HOG descriptors in phishing detection,” in 4th International Symposium on Digital Forensics and Security, ISDFS 2016 - Proceeding, 2016, doi: 10.1109/ISDFS.2016.7473534. [11] F. C. Dalgic, A. S. Bozkir, and M. Aydos, “Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors,” ISMSIT 2018 - 2nd Int. Symp. Multidiscip. Stud. Innov. Technol. Proc., 2018, doi: 10.1109/ISMSIT.2018.8567299. [12] K. L. Chiew, E. H. Chang, S. N. Sze, and W. K. Tiong, “Utilisation of website logo for phishing detection,” Comput. Secur., 2015, doi: 10.1016/j.cose.2015.07.006. [13] K. L. Chiew, J. S. F. Choo, S. N. Sze, and K. S. C. Yong, “Leverage Website Favicon to Detect Phishing Websites,” Secur. Commun. Networks, 2018, doi: 10.1155/2018/7251750. [14] Y. Zhou, Y. Zhang, J. Xiao, Y. Wang, and W. Lin, “Visual similarity based anti-phishing with the combination of local and global features,” in Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 2015, doi: 10.1109/TrustCom.2014.28. [15] A. P. E. Rosiello, E. Kirda, C. Kruegel, and F. Ferrandi, “A layout-similarity-based approach for detecting phishing pages,” in Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm, 2007, doi: 10.1109/SECCOM.2007.4550367. [16] J. Mao, P. Li, K. Li, T. Wei, and Z. Liang, “BaitAlarm: Detecting phishing sites using similarity in fundamental visual features,” in Proceedings - 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013, 2013, doi: 10.1109/INCoS.2013.151.
  • 25. [17] S. Haruta, H. Asahina, and I. Sasase, “Visual Similarity-Based Phishing Detection Scheme Using Image and CSS with Target Website Finder,” in 2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings, 2017, doi: 10.1109/GLOCOM.2017.8254506. [18] H. Zhang, G. Liu, T. W. S. Chow, and W. Liu, “Textual and visual content-based anti- phishing: A Bayesian approach,” IEEE Trans. Neural Networks, 2011, doi: 10.1109/TNN.2011.2161999. [19] E. Medvet, E. Kirda, and C. Kruegel, “Visual-similarity-based phishing detection,” Proc. 4th Int. Conf. Secur. Priv. Commun. Networks, Secur., no. September 2008, 2008, doi: 10.1145/1460877.1460905. [20] S. G. Selvaganapathy, M. Nivaashini, and H. P. Natarajan, “Deep belief network based detection and categorization of malicious URLs,” Inf. Secur. J., vol. 27, no. 3, pp. 145–161, 2018, doi: 10.1080/19393555.2018.1456577. [21] Y. Ding, N. Luktarhan, K. Li, and W. Slamu, “A keyword-based combination approach for detecting phishing webpages,” Comput. Secur., vol. 84, pp. 256–275, 2019, doi: 10.1016/j.cose.2019.03.018. [22] H. huan Wang, L. Yu, S. wei Tian, Y. fang Peng, and X. jun Pei, “Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network,” Appl. Intell., vol. 49, no. 8, pp. 3016–3026, 2019, doi: 10.1007/s10489-019-01433- 4. [23] M. Zouina and B. Outtaj, “A novel lightweight URL phishing detection system using SVM and similarity index,” Human-centric Comput. Inf. Sci., vol. 7, no. 1, pp. 1–13, 2017, doi: 10.1186/s13673-017-0098-1. [24] S. Parekh, D. Parikh, S. Kotak, and S. Sankhe, “A New Method for Detection of Phishing Websites: URL Detection,” Proc. Int. Conf. Inven. Commun. Comput. Technol. ICICCT 2018, no. Icicct, pp. 949–952, 2018, doi: 10.1109/ICICCT.2018.8473085. [25] H. Le, Q. Pham, D. Sahoo, and S. C. H. Hoi, “URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection,” no. i, 2018, [Online]. Available: http://arxiv.org/abs/1802.03162. [26] J. Saxe and K. Berlin, “eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys,” 2017, [Online]. Available: http://arxiv.org/abs/1702.08568. [27] K. Shima et al., “Classification of URL bitstreams using bag of bytes,” 21st Conf. Innov. Clouds, Internet Networks, ICIN 2018, pp. 1–5, 2018, doi: 10.1109/ICIN.2018.8401597.
  • 26. [28] R. Vinayakumar, K. P. Soman, and P. Poornachandran, “Evaluating deep learning approaches to characterize and classify malicious URL’s,” J. Intell. Fuzzy Syst., vol. 34, no. 3, pp. 1333–1343, 2018, doi: 10.3233/JIFS-169429. [29] O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection from URLs,” Expert Syst. Appl., vol. 117, pp. 345–357, 2019, doi: 10.1016/j.eswa.2018.09.029. [30] W. Wang, F. Zhang, X. Luo, and S. Zhang, “PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks,” Secur. Commun. Networks, 2019, doi: 10.1155/2019/2595794. [31] S. Khan, H. Rahmani, S. A. A. Shah, and M. Bennamoun, “A Guide to Convolutional Neural Networks for Computer Vision,” Synth. Lect. Comput. Vis., 2018, doi: 10.2200/s00822ed1v01y201712cov015. [32] V. Karthikeyani and S. Nagarajan, “Machine Learning Classification Algorithms to Recognize Chart Types in Portable Document Format (PDF) Files,” Int. J. Comput. Appl., 2012, doi: 10.5120/4789- 6997. [33] M. A. Adebowale, K. T. Lwin, and M. A. Hossain, “Deep learning with convolutional neural network and long short-term memory for phishing detection,” 2019 13th Int. Conf. Software, Knowledge, Inf. Manag. Appl. Ski. 2019, no. March 2019, doi: 10.1109/SKIMA47702.2019.8982427. [34] C. Opara, B. Wei, and Y. Chen, “HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis,” no. October 2018, 2019, [Online]. Available: http://arxiv.org/abs/1909.01135.
  • 27. A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORITY IN WIRELESS BODY AREA NETWORKS Sabin Bhandari and Sangman Moh Department of Computer Engineering, Chosun University, Gwangju, South Korea Abstract In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic monitoring, and other medical services. However, the existing standards such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of WBANs. Many medium access control (MAC) protocols have been studied so far, most of which are derived from the IEEE 802.15.4 superframe structure with some improvements and adjustments. However, the MAC protocols do not provide the required quality of service (QoS) for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic priority, providing the required QoS. According to the performance evaluation results, the proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of transmission time, system throughput, energy efficiency, and collision ratio. Keywords: Wireless body area network; Medium access control, Energy efficiency; Quality of service; Traffic priority; IEEE 802.15.4 Orginal Source URL: https://aircconline.com/ijcnc/V11N4/11419cnc02.pdf Volime Link: http://airccse.org/journal/ijc2019.html References [1] D. Fernandes, A. G. Ferreira, R. Abrishambaf, J. Mendes, andJ. Cabral, (2018) “Survey and taxonomy of transmissions power control mechanisms for wireless body area networks,” IEEE Communications Surveys and Tutorials, vol. 20, no. 2, pp. 1292-1328 [2] IEEE, (2006) “IEEE Std.802.15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low data rate wireless personal area networks (WPAN),” Piscataway, NJ, USA [3] X. Yang, L. Wang, and Z. Zhang, (2018) “Wireless body area networks MAC protocol for energy efficiency and extending lifetime,” IEEE Sensors Letters, vol. 2, no. 1, pp. 1-4
  • 28. [4] B. Liu, Z. Yan, and C. W. Chen, (2017) “Medium access control for wireless body area networks with QoS provisioning and energy efficient design,” IEEE Transactions on Mobile Computing, vol. 16, no. 2, pp. 422-434 [5] S. Ullah, M. Chen, and K. Kwak, (2012) “Throughput and delay analysis of IEEE 802.15.6 based CSMA/CA protocol,” Journal of Medical Systems, vol. 36, no. 6, pp. 3875-3891 [6] S. Bhandari and S. Moh, (2015) “A survey of MAC Protocols for cognitive radio body area networks,” Sensors, vol. 15, pp. 9189-9209 [7] E. Kartsakli, A. Lalos, A. Antonopoulos, S. Tennina, M. Renzo, L. Alonso, and C. Verikoukis, (2014) “A survey on M2M systems for mHealth: A wireless communications perspective,” Sensors, vol. 14, pp. 18009-18052 [8] R. Cavallari, F. Martelli, R. Rosini, C. Buratti, and R. Verdone, (2014) “A survey on wireless body area networks: Technologies and design challenges,” IEEE Communications Surveys & Tutorials, vol. 16, pp. 1635-1657 [9] T. Le and S. Moh, (2015) “Interference mitigation schemes for wireless body area sensor networks: A comparative survey,” Sensors, vol. 15, pp. 13805-18838 [10] S. Mangold, S. Choi, G. R. Hiertz, O. Klein, and B. Walke, (2003) “Analysis of IEEE 802.11e for QoS support in wireless LANs,” IEEE Wireless Communications, vol. 10, No. 3, pp. 40-50 [11] N. F. Timmons and W. G. Scanlon, (2004) “Analysis of the performance of IEEE 802.15.4 for medical sensor body area networking,” in Proc. of 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, pp. 16-24 [12] T. Falck, J. Espina, J. P. Ebert, and D. Dietterle, (2006) “BASUMA – The sixth sense for chronically ill patients,” in Proc. of International Workshop on Wearable and Implantable Body Sensor Networks, pp. 1-6 [13] G. Fang and E. Dutkiewicz, (2009) “BodyMAC: Energy efficient TDMA-based MAC protocol for Wireless Body Area Network,” in Proc. of 9th International Symposium on Communications and Information Technology, pp. 1455-1459 [14] Z. Yan and B. Liu, (2011) “A context aware MAC protocol for medical wireless body area network,” in Proc. of 7th Int. Wireless Communication and Mobile Computing Conf. (IWCMC 2011), pp. 2133- 2138 [15] L. Huaming and T. Jindong, (2010) “Heartbeat-driven medium-access control for body sensor networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1, pp. 44-51
  • 29. [16] C. Li, L. Wang, J. Li, B. Zhen, H.-B. Li, and R. Kohno, (2009) “Scalable and robust medium access control protocol in wireless body area networks,” in Proc. of IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 2127- 2131 [17] W. Lee, S. H. Rhee, Y. Kim, and H. Lee, (2009) “An efficient multi-channel management protocol for wireless body area networks,” in Proc. of International Conference on Information Networking, pp.1-5 [18] I. Anjum, N. Alam, M. A. Razzaque, M. Mehedi Hassan, and A. Alamri, (2013) “Traffic priority and load adaptive mac protocol for qos provisioning in body sensor networks,” International Journal of Distributed Sensor Networks, vol. 2013, pp. 1-9 [19] K. S. Kwak and S. Ullah, (2010) “A traffic-adaptive MAC protocol for WBAN,” in Proc. of IEEE GLOBECOM Workshops, pp. 1286-1289 [20] O. Md. Rahman, C. S. Hong, S. Lee, and Y.-C. Bang, (2011) “ATLAS: A traffic load aware sensor MAC design for collaborative body area sensor networks,” Sensors, vol. 11, no.12, pp. 11560-11580 [21] M. M. Alam, O. Berder, D. Menard, and O. Sentieys, (2012) “TAD-MAC: traffic-aware dynamic MAC protocol for wireless body area sensor networks,” IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 2, no. 1, pp. 109-119 [22] B. Kim and J. Cho, (2012) “A novel priority-based channel access algorithm for contention- based MAC protocol in WBANs,” in Proc. of 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2012), pp. 1-5 [23] S. Ullah, M. Imran, and M. Alnuem, (2014) “A hybrid and secure priority-guaranteed MAC protocol for wireless body area network,” International Journal of Distributed Sensor Networks, vol. 2014, pp. 1-7 [24] C. Li, B. Hao, K. Zhang, Y. Liu, and J. Li, (2011) “A novel medium access control protocol with low delay and traffic adaptivity for wireless body area networks,” Journal of Medical Systems, pp. 1265- 1275 [25] S. Jin, Z. Weixia, and Z. Zheng, (2013) “Priority-based adaptive timeslot allocation scheme for wireless body area network,” in Proc. of 13th International Symposium on Communications and Information Technologies, pp. 609-614 [26] Y. Zhang and G. Dolmans, (2010) “Priority-guaranteed MAC protocol for emerging wireless body area networks,” Annals of Telecommunications, vol. 66, pp. 229-241
  • 30. [27] X. Liang and I. Balasingham, (2007) “Performance analysis of the IEEE 802.15.4 based ECG monitoring network,” in Proc. of 7th International Conferences on Wireless and Optical Communications, pp. 99-104 [28] S. Bhandari, K. Singh, and S. Moh, (2017) “Traffic-Aware Medium Access Control Protocol for Wireless Body Area Networks,” in Proc. of InfoWare 2017 Conference, pp. 1-6
  • 31. INTRUSION PREVENTION/INTRUSION DETECTION SYSTEM (IPS/IDS) FOR WIFI NETWORKS Michal Korčák1 and Jaroslav Lámer2 and František Jakab3 1,2,3 Department of Computer and Informatics, Technical University of Košice, TUKE Košice, Slovakia Abstract The nature of wireless networks itself created new vulnerabilities that in the classical wired networks do not exist. This results in an evolutional requirement to implement new sophisticated security mechanism in form of Intrusion Detection and Prevention Systems. This paper deals with security issues of small office and home office wireless networks. The goal of our work is to design and evaluate wireless IDPS with use of packet injection method. Decrease of attacker’s traffic by 95% was observed when compared to attacker’s traffic without deployment of proposed IDPS system. Keywords: Deauthentification, Intrusion detection, Intrusion prevention, Packet injection, WiFi Orginal Source URL: http://airccse.org/journal/cnc/6414cnc07.pdf Volime Link: http://airccse.org/journal/ijc2014.html References [1] Henry, Paul & Luo, Hui, (2002) “WiFi: what's next?”. Communications Magazine, IEEE, 40.12: 66- 72. [2] Tews, Erik & Beck, Martin, (2009) “Practical attacks against WEP and WPA” In: Proceedings of the second ACM conference on Wireless network security. ACM, p. 79-86. [3] Gounaris, Georgios, (2014) “WiFi security and testbed implementation for WEP/WPA cracking demonstration”. [4] L. T. Heberlein & K. N. Levitt & B. Mukherjee, (1991) “A Method To Detect Intrusive Activity in a Networked Environment”. In: 14th National Computer Security Conference. Washington, D.C.: National Institute of Standards and Technology, National Computer Security Center, pp. 362-371 [5] Karen, Scarfone & Peter Mell, (2007) “Guide To Intrusion Detection And Prevention Systems (IDPS)”. Washington, D.C.: National Institute of Standards and Technology, Special Publication 800- 94, 128 p.
  • 32. [6] Michael Rash, (2007) “Linux Firewalls - Attack Detection And Response With Iptables”, Psad And Fwsnort. San Francisco: No Starch Press, 388 p. [7] Allen, Lee (2012) “Advanced Penetration Testing for Highly--Secured Environments: The Ultimate Security Guide”. Birmingham: Packt Publishing Ltd., 414p. [8] “Linux Wireless - Hostapd Linux Documentation Page”. [online]. [cit. 14. April. 2014]. Available online: . [9] KAZIENKO, Przemyslaw; DOROSZ, Piotr. Intrusion detection systems (IDS) Part 2- Classification; methods; techniques. WindowsSecurity. com, 2004. [10] CARL, Glenn, et al. Denial-of-service attack-detection techniques. Internet Computing, IEEE, 2006, 10.1: 82-89.
  • 33. ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS SENSOR NETWORK Tran Cong Hung1 and Ly Quoc Hung2 1 Posts and Telecommunications Institute of Technology 2 Ho Chi Minh Technical and Economic College Abstract In the traditional clustering routing protocol of wireless sensor network, LEACH protocol (Low Energy Adaptive Clustering Hierarchy) is considered to have many outstanding advantages in the implementation of the hierarchy according to low energy adaptive cluster to collect and distribute the data to the base station. The main objective of LEACH is: To prolong life time of the network, reduce the energy consumption by each node, using the data concentration to reduce bulletins in the network. However, in the case of large network, the distance from the nodes to the base station is very different. Therefore, the energy consumption when becoming the host node is very different but LEACH is not based on the remaining energy to choose the host node, which is based on the number of times to become the host node in the previous rounds. This makes the nodes far away from the base station lose power sooner. In this paper, we give a new routing protocol based on the LEACH protocol in order to improve operating time of sensor network by considering energy issues and distance in selecting the cluster-head (CH), at that time the nodes with high energy and near the base station (BS) will have a greater probability of becoming the cluster-head than the those in far and with lower energy. Keywords: LEACH, Life-time, Energy efficient, WSN, Matlab. Orginal Source URL: https://aircconline.com/ijcnc/V8N5/8516cnc04.pdf Volime Link: http://airccse.org/journal/ijc2016.html References [1] Trịnh Lương Miên (2014), "Tổng quan về mạng cảm biến không dây", Tạp chí tự động hóa ngày nay, Số 157 [2] TS. Lê Nhật Thăng, and TS. Nguyễn Quý Sỹ (2007), "Các kỹ thuật phân nhóm trong các mạng cảm biến vô tuyến", Tạp chí Bưu chính viễn thông, Số 301 [3] K. Sohraby, and D. Minoli and T Znati (2007), "Wireless Sensor Network Technology, Protocol and Application" (John Wiley & Sons Ltd, 2007)
  • 34. [4] Charka Panditharathne and Soumya Jyoti Sen (2009), "Energy Efficient Communication Protocols for Wireless Sensor Networks" [5] T. N. Qureshi, N. Javaid, A. H. Khan, A. Iqbal, E. Akhtar, and M. Ishfaq (2013), "Balanced Energy Efficient Network Integrated Super Heterogenous Protocol for Wireless Sensor Networks" [6] W. B. Heinzelman, and A. P. Chandrakasan and H. Balakrishnan (2002), "An application- specific protocol architecture for wireless microsensor networks", IEEE Transactions on Wireless Communications", Vol 1, pp. 660-700 [7] Callaway, and Edgar H (2004), "Wireless Sensor Networks—Architectures and Protocols" (CRC Press Company, 2004) [8] W. Xinhua, and W. Sheng (2010), "Performance Comparison of LEACH and LEACH-C Protocols by NS2", Ninth International Symposium on Distributed Computing and Applications to Business" [9] W R Heinzelman, and A P Chandrakasan and H Balakrishnan (2000), "Energy efficient communication protocol for wireless microsensor networks" [10] Alakesh Braman, and Umapathi G. R (2014), "A Comparative Study on Advances in LEACH Routing Protocol for Wireless Sensor Networks: A survey.", Volume 3 [11] Jennifer Yick, Biswanath Mukhejee, and Dicpak Ghosal (2008), " Wireless sensor network survey", Computer Networks 52, pp. 2292 2330 [12] Wendi RabinerHeinzelman, AnanthaChandrakasan, and HariBalakrishnan (2005), "Energy- Efficient Communication Protocol for Wireless Micro-sensor Networks", pp. 79 - 194 [13] HolgerKarl, and AndreasWillig (2005), "Protocols and Architectures for wireless Sensor Networks" (John Wiley & Sons, 2005)