The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal of Computational Science, Information Technology and Co...rinzindorjej
The International Journal of Computational Science, Information Technology and Control Engineering (IJCSITCE) is an open access peer-reviewed journal that publishes quality articles which make innovative contributions in all areas of Computational Science, Mathematical Modeling, Information Technology, Networks, Computer Science, Control and Automation Engineering. IJCSITCE is an abstracted and indexed journal that focuses on all technical and practical aspects of Scientific Computing, Modeling and Simulation, Information Technology, Computer Science, Networks and Communication Engineering, Control Theory and Automation. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced techniques in computational science, information technology, computer science, chaos, control theory and automation, and establishing new collaborations in these areas.
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
This document compares emerging wireless technologies for the Internet of Things (IoT), including ZigBee, 6LoWPAN, Bluetooth Low Energy, LoRa, and various versions of Wi-Fi such as 802.11ah. It evaluates the capabilities of each technology in terms of data range and rate, network size, frequency channels, bandwidth, and power consumption. The document concludes that a multifaceted approach is needed to enable interoperable and secure communication in IoT applications using different wireless technologies and standards.
June 2022: Top 10 Read Articles in Signal & Image Processingsipij
This article summarizes two papers published in the journal Signal & Image Processing.
The first paper describes a Gaussian mixture model-based speech recognition system developed using MATLAB. It analyzes the accuracy of GMM for modeling speech and the performance of the overall system.
The second paper proposes two new methods for securing images using cryptography and steganography. The first method encrypts an image into ciphertext using S-DES encryption and hides the text in a second image. The second method directly encrypts an image using a key image as the S-DES key and hides the encrypted data in a second image.
August 2022: Top 10 Read Articles in Signal & Image Processingsipij
This document summarizes two papers published in the journal Signal & Image Processing: An International Journal (SIPIJ).
The first paper presents a Gaussian mixture model-based speech recognition system developed using MATLAB. It analyzes the accuracy of Gaussian mixture models for parametric modeling and the performance of the system for recognizing isolated digits 0-9.
The second paper proposes two new methods for secured image steganography that combine cryptography and steganography. The first method encrypts an image into cipher text using S-DES encryption and hides the text in a cover image. The second method directly encrypts an image using a key image as input to S-DES and hides the encrypted data in a cover image.
January 2023: Top 10 Read Articles in Signal &Image Processing sipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
September 2022: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
October 2022: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal of Computational Science, Information Technology and Co...rinzindorjej
The International Journal of Computational Science, Information Technology and Control Engineering (IJCSITCE) is an open access peer-reviewed journal that publishes quality articles which make innovative contributions in all areas of Computational Science, Mathematical Modeling, Information Technology, Networks, Computer Science, Control and Automation Engineering. IJCSITCE is an abstracted and indexed journal that focuses on all technical and practical aspects of Scientific Computing, Modeling and Simulation, Information Technology, Computer Science, Networks and Communication Engineering, Control Theory and Automation. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced techniques in computational science, information technology, computer science, chaos, control theory and automation, and establishing new collaborations in these areas.
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
This document compares emerging wireless technologies for the Internet of Things (IoT), including ZigBee, 6LoWPAN, Bluetooth Low Energy, LoRa, and various versions of Wi-Fi such as 802.11ah. It evaluates the capabilities of each technology in terms of data range and rate, network size, frequency channels, bandwidth, and power consumption. The document concludes that a multifaceted approach is needed to enable interoperable and secure communication in IoT applications using different wireless technologies and standards.
June 2022: Top 10 Read Articles in Signal & Image Processingsipij
This article summarizes two papers published in the journal Signal & Image Processing.
The first paper describes a Gaussian mixture model-based speech recognition system developed using MATLAB. It analyzes the accuracy of GMM for modeling speech and the performance of the overall system.
The second paper proposes two new methods for securing images using cryptography and steganography. The first method encrypts an image into ciphertext using S-DES encryption and hides the text in a second image. The second method directly encrypts an image using a key image as the S-DES key and hides the encrypted data in a second image.
August 2022: Top 10 Read Articles in Signal & Image Processingsipij
This document summarizes two papers published in the journal Signal & Image Processing: An International Journal (SIPIJ).
The first paper presents a Gaussian mixture model-based speech recognition system developed using MATLAB. It analyzes the accuracy of Gaussian mixture models for parametric modeling and the performance of the system for recognizing isolated digits 0-9.
The second paper proposes two new methods for secured image steganography that combine cryptography and steganography. The first method encrypts an image into cipher text using S-DES encryption and hides the text in a cover image. The second method directly encrypts an image using a key image as input to S-DES and hides the encrypted data in a cover image.
January 2023: Top 10 Read Articles in Signal &Image Processing sipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
September 2022: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
October 2022: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
July 2022: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
April 2022: Top Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
May 2022: Top Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field
January 2021: Top Ten Cited Article in Computer Science, Engineering IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
April 2023: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
Top downloaded article in academia 2020 - International Journal of Informatio...Zac Darcy
The International Journal of Information Technology, Modeling and Computing (IJITMC) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology, Modeling and Computing. With the advances of Information Technology, there is an active multi-disciplinary research in the areas of IT, CSE, Modeling and Simulation with numerous applications in various fields. The International Journal of Information Technology, Modeling and Computing (IJITMC) is an abstracted and indexed international journal of high quality devoted to the publication of original research papers from IT, Modeling, CSE and Control Engineering with some emphasis on all areas and subareas of computer science, IT, scientific modeling, simulation, visualization and control systems and their broad range of applications.
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...ijwmn
This article proposes a novel speed-based handover algorithm for mobility management between macrocells and femtocells in LTE networks. Existing handover decision algorithms are compared. The proposed algorithm uses a mobile's speed to determine whether to handover from a macrocell to a femtocell or vice versa. Simulation results show the performance of the proposed algorithm. The algorithm aims to guarantee efficient handovers between different cell types in a hierarchical LTE structure.
Top cited article in 2019 - International Journal of Network Security & Its A...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
This document summarizes a research paper that evaluates using blockchain technology for resource management between network providers (NPs) in next generation networks (NGNs). It describes implementing a resource management mechanism in a smart contract and testing it on real testbeds using Raft and IBFT consensus algorithms. The evaluation aims to assess performance in terms of transaction throughput and latency to determine if the solution can support micro-service level resource reallocation between NPs. The results help identify the most suitable consensus mechanism for this use case based on performance metrics.
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
This document summarizes a study that evaluated using blockchain technology for resource management between Network Providers (NPs) in Next Generation Networks (NGNs). The researchers implemented a resource management mechanism using a smart contract on a blockchain testbed. Experiments tested transaction throughput and latency using different consensus algorithms (Raft and IBFT). The goal was to assess if the solution could support micro-level resource reallocation between NPs or only at higher levels, and determine the most suitable consensus mechanism based on performance. Results found that blockchain could enable distributed, trusted resource management between competitive NPs, but throughput and latency depended on the consensus algorithm used.
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
More Related Content
Similar to May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
July 2022: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
April 2022: Top Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
May 2022: Top Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field
January 2021: Top Ten Cited Article in Computer Science, Engineering IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
April 2023: Top 10 Read Articles in Signal & Image Processingsipij
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the journal covers all theoretical and practical aspects of the Digital Signal Processing & Image processing, from basic research to development of application.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Signal & Image processing.
Top downloaded article in academia 2020 - International Journal of Informatio...Zac Darcy
The International Journal of Information Technology, Modeling and Computing (IJITMC) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology, Modeling and Computing. With the advances of Information Technology, there is an active multi-disciplinary research in the areas of IT, CSE, Modeling and Simulation with numerous applications in various fields. The International Journal of Information Technology, Modeling and Computing (IJITMC) is an abstracted and indexed international journal of high quality devoted to the publication of original research papers from IT, Modeling, CSE and Control Engineering with some emphasis on all areas and subareas of computer science, IT, scientific modeling, simulation, visualization and control systems and their broad range of applications.
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...ijwmn
This article proposes a novel speed-based handover algorithm for mobility management between macrocells and femtocells in LTE networks. Existing handover decision algorithms are compared. The proposed algorithm uses a mobile's speed to determine whether to handover from a macrocell to a femtocell or vice versa. Simulation results show the performance of the proposed algorithm. The algorithm aims to guarantee efficient handovers between different cell types in a hierarchical LTE structure.
Top cited article in 2019 - International Journal of Network Security & Its A...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
This document summarizes a research paper that evaluates using blockchain technology for resource management between network providers (NPs) in next generation networks (NGNs). It describes implementing a resource management mechanism in a smart contract and testing it on real testbeds using Raft and IBFT consensus algorithms. The evaluation aims to assess performance in terms of transaction throughput and latency to determine if the solution can support micro-service level resource reallocation between NPs. The results help identify the most suitable consensus mechanism for this use case based on performance metrics.
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
This document summarizes a study that evaluated using blockchain technology for resource management between Network Providers (NPs) in Next Generation Networks (NGNs). The researchers implemented a resource management mechanism using a smart contract on a blockchain testbed. Experiments tested transaction throughput and latency using different consensus algorithms (Raft and IBFT). The goal was to assess if the solution could support micro-level resource reallocation between NPs or only at higher levels, and determine the most suitable consensus mechanism based on performance. Results found that blockchain could enable distributed, trusted resource management between competitive NPs, but throughput and latency depended on the consensus algorithm used.
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Similar to May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf (20)
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Assessment and Planning in Educational technology.pptxKavitha Krishnan
In an education system, it is understood that assessment is only for the students, but on the other hand, the Assessment of teachers is also an important aspect of the education system that ensures teachers are providing high-quality instruction to students. The assessment process can be used to provide feedback and support for professional development, to inform decisions about teacher retention or promotion, or to evaluate teacher effectiveness for accountability purposes.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
1. May 2024: Top10
Read Articles in
Computer Networks
& Communications
International Journal of Computer
Networks& Communications (IJCNC)
http://airccse.org/journal/ijcnc.html
(Scopus, ERA Listed, WJCI Indexed)
Scopus Cite Score 2022—1.8
ISSN 0974 - 9322 (Online); 0975 - 2293 (Print)
Citations, h-index, i10-index
2. GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND
EFFECTIVE SOLUTIONS
Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin
School of Computer Sciences, Universiti Sains Malaysia, Malaysia
ABSTRACT
Today, Global Positioning System (GPS) is widely used in almost every aspect of our daily life.
Commonly, users utilize the technology to track the position of a vehicle or an object of interest.
They also use it to safely navigate to the destination of their choice. As a result, there are countless
number of GPS based tracking application that has been developed. But, a main recurring issue that
exists among these applications are the inaccuracy of the tracking faced by users and this issue has
become a rising concern. Most existing research have examined the effects that the inaccuracy of
GPS have on users while others identified suitable methods to improve the accuracy of GPS based
on one or two factors. The objective of this survey paper is to identify the common factors that affects
the accuracy of GPS and identify an effective method which could mitigate or overcome most of
those factors. As part of our research, we conducted a thorough examination of the existing factors
for GPS inaccuracies. According to an initial survey that we have collected, most of the respondents
has faced some form of GPS inaccuracy. Among the common issues faced are inaccurate object
tracking and disconnection of GPS signal while using an application. As such, most of the
respondents agree that it is necessary to improve the accuracy of GPS. This leads to another objective
of this paper, which is to examine and evaluate existing methods as well as to identify the most
effective method that could improve the accuracy of GPS.
KEYWORDS
GPS, accuracy factors, improve accuracy, global positioning system
For More Details: https://aircconline.com/ijcnc/V8N2/8216cnc11.pdf
Volume Link: https://airccse.org/journal/ijc2016.html
3. REFERENCES
[1] Lin, J.Y, Yang, B.K., Tuan A.D., and Chen, H.C. (2013). “The Accuracy Enhancement of GPS
Track in Google Map”, 2013 Eighth International Conference on Broadband and Wireless
Computing, Communication and Applications, Compiegne, France. pp. 524-527.
[2] Iqbal, A., Mahmood. H., Farooq, U., Kabir, M.A. and Asad, M.U.. (2009). “An Overview of the
Factors Responsible for GPS Signal Error: Origin and Solution”, 2009 International Conference on
Wireless Networks and Information Systems, Shanghai, China. pp. 294-299.
[3] Bajaj, R., Ranaweera, S.L., Agrawal, D.P.. (2002). “GPS: Location-tracking Technology”,
Computer, vol.35, no..4, pp. 92-94.
[4] Huang, J.Y., and Tsai, C.H.. (2008). “Improve GPS Positioning Accuracy with Context
Awareness”, 2008 First IEEE International Conference on Ubi-Media Computing, Lanzhou, China,
pp. 94-99.
[5] Wubbena, G., Andreas, B., Seeber, G., Boder, V. and Hankemeier, P., (1996). “Reducing
Distance Dependant Errors for Real-Time Precise DGPS Applications by Establishing Reference
Station Networks”. In Proceedings of the 9th International Technical Meeting of the Satellite
Division of the Institute of Navigation (ION GPS-96)
[6] Enge, P., Walter, T., Pullen, S., Kee, C., Chao, Y. and Tsai, Y. (1996). “Wide area augmentation
of the global positioning system”. Proceedings of the IEEE, vol. 84 Aug. 1996, pp. 1063–1088.
[7] Qi, H. and Moore, J. B. (2002). “Direct Kalman Filtering Approach for GPS/INS Integration”,
IEEE Trans. Aerosp, Electron. System. vol. 38, no. 2, 2002, pp. 687-693.
[8] Malleswari, B.L., MuraliKrishna, I.V., Lalkishore, K., Seetha, M., Nagaratna, P. H. “The Role of
Kalman Filter in the Modelling of GPS Errors”, Journal of Theoretical and Applied Information
Technology, pp. 95-101.
[9] White, C.E., Bernstein, D. and Kornhauser, Alain L.. (2000). “Some map matching algorithms
for personal navigation assistants”. Transportation Research Part C, No. 8, 2000, pp. 91-108.
4. A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY
AND STEGANOGRAPHY
Saleh Saraireh
Department of Communications and Electronic Engineering, Philadelphia University, Amman,
Jordan
ABSTRACT
The information security has become one of the most significant problems in data communication.
So it becomes an inseparable part of data communication. In order to address this problem,
cryptography and steganography can be combined. This paper proposes a secure communication
system. It employs cryptographic algorithm together with steganography. The jointing of these
techniques provides a robust and strong communication system that able to withstand against
attackers. In this paper, the filter bank cipher is used to encrypt the secret text message, it provide
high level of security, scalability and speed. After that, a discrete wavelet transforms (DWT) based
steganography is employed to hide the encrypted message in the cover image by modifying the
wavelet coefficients. The performance of the proposed system is evaluated using peak signal to noise
ratio (PSNR) and histogram analysis. The simulation results show that, the proposed system provides
high level of security.
KEYWORDS
Steganography, Cryptography, DWT, Filter bank, PSNR
For More Details: https://airccse.org/journal/cnc/5313cnc10.pdf
Volume Link: https://airccse.org/journal/ijc2013.html
5. REFERENCES
[1] Obaida Mohammad Awad Al-Hazaimeh, (2013) "A New Approach for Complex Encrypting and
Decrypting Data" International Journal of Computer Networks & Communications (IJCNC) Vol.5,
No.2.
[2] Katzenbeisser, S. and Petitcolas, F.A.P. 2000, Information Hiding Techniques for Steganography
and Digital Watermarking. Artech House, Inc., Boston, London.
[3] Xinpeng Zhang and Shuozhong Wang, (2005), "Steganography Using MultipleBase Notational
System and Human Vision Sensitivity", IEEE signal processing letters, Vol. 12, No. 1.
[4] Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE signal processing letters, Vol. 13,
No. 5.
[5] Piyush Marwaha, Paresh Marwaha, (2010), "Visual Cryptographic Steganography in images",
IEEE, 2nd International conference on Computing, Communication and Networking Technologies.
[6] G.Karthigai Seivi, Leon Mariadhasan and K. L. Shunmuganathan, (2012), " Steganography Using
Edge Adaptive Image " IEEE, International Conference on Computing, Electronics and Electrical
Technologies.
[7] Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, (2012), " A Secure and High
Capacity Image Steganography Technique", Signal & Image Processing : An International Journal
(SIPIJ) Vol.4, No.1.
[8] Tong L.and Zheng-ding, Q, (2002), "DWT-based color Images Steganography Scheme", IEEE
International Conference on Signal Processing, 2:1568-1571.
[9] Mandal J.K. and Sengupta M., (2010), “Authentication/Secret Message Transformation Through
Wavelet Transform based Subband Image Coding (WTSIC).”, Proceedings of International
Symposium on Electronic System Design, IEEE Conference Publications, pp 225 – 229.
[10] Septimiu F. M., Mircea Vladutiu and Lucian P., (2011),"Secret data communication system
using Steganography, AES and RSA", IEEE 17th International Symposium for Design and
Technology in Electronic Packaging.
[11] H. Tian, K. Zhou, Y. Huang, D. Feng, J. Liu, (2008), "A Covert Communication Model Based
on Least Significant Bits Steganography in Voice over IP", IEEE The 9th International Conference
for Young Computer Scientists, pp. 647-652.
[12] Y. Huang, B. Xiao, H. Xiao, (2008), "Implementation of Covert Communication Based on
Steganography", IEEE International Conference on Intelligent Information Hiding and Multimedia
Signal Processing, pp. 1512-1515.
[13] Cheddad, A, Condell, Joan, Curran, K and McKevitt, Paul,(2008), "Securing Information
Content using New Encryption Method and Steganography", IEEE Third International Conference
on Digital Information Management.
[14] Rasul E., Saed F. and Hossein S, (2009), " Using the Chaotic Map in Image Steganography",
IEEE, International Conference on Signal Processing Systems.
6. [15] Majunatha R. H. S. and Raja K B, (2010), "High Capacity and Security Steganography using
Discrete Wavelet Transform", International Journal of Computer Science and Security (IJCSS), Vol.
3: Issue (6) pp 462-472.
[16] Saraireh S. and Benaissa M., (2009), “A Scalable Block Cipher Design using Filter Banks and
Lifting over Finite Fields” In IEEE International Conference on Communications (ICC), Dresden,
Germany.
[17] El Safy, R.O, Zayed. H. H, El Dessouki. A, (2009), “An adaptive steganography technique based
on integer wavelet transform,” ICNM International Conference on Networking and Media
Convergence, pp 111-117.
7. An IDE for Android Mobile Phones with Extended Functionalities Using Best
Developing Methodologies
Sakila Banu1 and Kanakasabapathi Vijayakumar2
1
College of Computer Science and Information Technology, Taif University, Taif, Saudi Arabia
2
Department of Mathematics,Anna University,Chennai,India.
ABSTRACT
Google's Android platform is a widely anticipated open source operating system for mobile phones. The
mobile phone landscape changed with the introduction of smart phones running Android, a platform marketed
by Google. Android phones are the first credible threat to the iPhone market. Google not only target the
consumers of iPhone, it also aimed to win the hearts and minds of mobile application developers. As a Result,
application developers are developing new software’s everyday for Android Smart Phones and are competing
with the previous in Market. But so far there is no Specific IDE developed to create mobile application easily
by just Drag and Drop method to make even the non-programmers to develop application for the smart phones.
This paper presents an IDE with Extended Functionalities for Developing Mobile Applications for Android
Mobile Phones using the Best developing Methodologies. The New IDE comes with the Extended
Functionalities like Executing the created Application, Previewing the Application Created, Roll Back and
Cancel Functions with the newly added Icons like Execute, Preview, Roll Back and Cancel Respectively.
Another important feature of this paper is that the IDE is developed using the Best Developing Methodologies
by presenting the possible methods for developing the IDE using JAVA SWING GUI Builder in Android
ADT plug-in. The developed IDE is tested using the Android Runtime Emulator in Eclipse Framework.
KEYWORDS
IDE-Integrated Development Environment, GUI-Graphical User Interface, ADT-Android
Development Tool.
For More Details: https://airccse.org/journal/cnc/5413cnc11.pdf
Volume Link: https://airccse.org/journal/ijc2013.html
8. REFERENCES
[1] Understanding Android Security by Enck, W.; Ongtang, M.; McDaniel, P.; Pennsylvania State Univ.,
University Park, PA
[2] Android: Changing the Mobile Landscap by Margaret Butler from
http://developerlife.com/tutorials/?p=289
[3] Android – How to build a service-enabled Android app – Part 1/3 UI Posted June 4th, 2008 by
Nazmul
[4] Android-An Open Handset Alliance Project. http://code.google.com/android/.
[5] Bloom S.Book, M.Gruhn, V.Hrushchak, R.Kohler, A.(2008). Write Once Run Anywhere. A survey of
Mobile Runtime Environments. Proceedings of the 3rd International Conference On Grid and Pervasive
Computing(GPC2008):132-137
[6] Holzer, A.Ondrus,J.(2009). Trends in Mobile Application Development. Proceedings of the 2nd
International Conference Mobile Wireless Middleware, Operating Systems and Applications(Mobile ware
2009):55-64
[7] http://www.vogella.com/articles/AndroidDragAndDrop/article.html
[8] http://javapapers.com/android/android-drag-and-drop/
[9] http://developer.android.com/guide/topics/ui/drag-drop.html
[10] http://en.wikipedia.org/wiki/App_Inventor_for_Android
[11] JForm Designer from http://www.formdev.com/jformdesigner/
[12] http://beta.appinventor.mit.edu/about/moreinfo/
[13] Jigloo GUI Builder ,http://www.ibm.com/developerworks/opensource/tutorials/
9. DYNAMIC ROUTING OF IP TRAFFIC BASED ON QOS PARAMETERS
Martin Kriška1 , Jozef Janitor2 and Peter Fecilak3
1Computer Networks Laboratory, Technical University of Kosice, Slovakia 2 Institute of
Computer Technology, Technical University of Kosice, Slovakia 3Department of Computers and
Informatics, Technical University of Kosice, Slovakia
ABSTRACT
The article looks into the current state of the art of dynamic routing protocols with respect to
their possibilities to react to changes in the Quality of Service when selecting the best route towards
a destination network. New options that could leverage information about the ever changing QoS
parameters for data communication are analysed and a Cisco Performance Routing solution is
described more in detail. The practical part of this work focuses on a design and implementation
of a test bed that provides a scalable laboratory architecture to manipulate QoS parameters of
different data communications flowing through it. The test bed is used in various use cases that
were used to evaluate Cisco Performance Routing optimization capabilitiesin different scenarios.
KEYWORDS
Performance Routing, PfR, Quality of Service, QoS, Optimized Edge Routing
For More Details: https://airccse.org/journal/cnc/6414cnc02.pdf
Volume Link: https://airccse.org/journal/ijc2014.html
10. REFERENCES
[1] Information Sciences Institute, University of Southern California. RFC 791 INTERNET
PROTOCOL - DARPA INTERNET PROGRAM, PROTOCOL SPECIFICATION. s.l. : Internet
Engineering Task Force, 1981.
[2] Cisco Systems, Inc. Route Selection in Cisco Routers. Cisco. [Online] 2008. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/8651/21.pdf.
[3] D. Savage, et. al.: Enhanced Interior Gateway Routing Protocol. IETF. [Online] 2013 [Date:
25th of October 2013.] http://tools.ietf.org/html/draft-savage-eigrp-00.
[4] Teare Diane: Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide.
Indianapolis: Cisco Press, 2010. ISBN 1587058820.
[5] Cisco Systems, Inc. BGP Best Path Selection Algorithm. Cisco. [Online] 2012. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/13753/25.pdf.
[6] Doyle Jeff, Carroll Jennifer: CCIE Professional Development Routing TCP/IP Volume I.
Indianapolis: Cisco Press, 2006. ISBN 1587052024.
[7] D. Awduche, et. al.: RSVP-TE: Extensions to RSVP for LSP Tunnels. IETF. [Online] 2013
[Date: 11th of November 2013.] http://tools.ietf.org/html/rfc3209.
[8] X. Fu, et. al.: RSVP-TE extensions for Loss and Delay Traffic Engineering. IETF. [Online]
2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/draft-fuxh-mpls-delay-loss-rsvp-
te-ext02.
[9] Z. Seils. Defining SDN Overview of SDN Terminology & Concepts. Cisco. [Online] 2013.
[Date: 4 th of October 2013.] https://learningnetwork.cisco.com/docs/DOC-21946.
[10] Cisco Systems, Inc. onePK Chat and Demo at Cisco Live. SlideShare. [Online] 2012. [Date:
4th of October 2013.] http://www.slideshare.net/getyourbuildon/onepk-chat-and-demo-at-cisco-
live.
[11] S. Cadora. Hitchhiker's Guide to onePK. Cisco. [Online] 2013. [Date: 12th of September
2013.] https://learningnetwork.cisco.com/docs/DOC-22910.
[12] R. Trunk. Understanding Performance Routing (PfR). Chesapeake Netcraftsmen. [Online]
2009. [Date: 15th of November 2013.] http://netcraftsmen.net/archived-documents/c-mug-
articlearchive/7-20090922-cmug-understanding-performance-routing/file.html?limit=10.
[13] Kalita Hemanta Kumar, Nambiar Manoj K.: Designing WANem: A Wide Area Network Emulator
tool. Bangalore, 2011. ISBN 9780769546186.
R. Pandi Selvam, V.Palanisamy: An efficient cluster based approach for multi-sourcemulticast routing
protocol in mobile ad hoc networks, International Journal of Computer
11. Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to
Ensure Confidentiality, Authenticity and Non-Repudiation
Ritesh Mukherjee1, Anirban Goswami2, Soumit Chowdhury3 and Nabin Ghoshal4, 1Centre for
Development of Advanced Computing, India, 2Techno Main Salt Lake, India, 3Government
College of Engineering & Ceramic Technology, India, 4University of Kalyani, India
ABSTRACT
The concept is to capture and preserve the intruder’s details in unattended mode. A camera is
integrated with a processing unit and counter arrangement to ensure authenticity and non-repudiation
of the captured images of the intruder before court of law. Ownership claim is justified concocting
confidential data sharing of visual cryptography. Signal quality is retained and unauthorized
tampering of secret data resisted. Entire procedure indulges: Message Digest M is generated using
SHA-2 from the date and time stamp of the acquired image, two shares are generated from MAC
address (K) of the network card and encryption is done using AES involving encoding using
Hamming 1 – bit technique. The cover image is prepared in DCT domain to restrict JPEG
compression. Sensitive data is embedded in restricted areas of DCT transformed image. Extraction
of secret data verifies an intruder. The experimental results prove its efficacy over existing
conventional system.
KEYWORDS
Visual cryptography, share generation, AES, key exchange, image compression.
For More Details: https://aircconline.com/ijcnc/V14N4/14422cnc07.pdf
Volume Link: https://airccse.org/journal/ijc2022.html
12. REFERENCES
[1] Debasis Mazumdar & Ritesh Mukherjee (2020) “Apparatus for Automated Monitoring of
Facial Images and a process therefor”, US Patent 10,592,727, filed April 21, 2015 and issued
Mar 17, 2020.
[2] Lu C.S. & Liao H.Y.M. (2001) “Multipurpose watermarking for image authentication and
protection”, IEEE Transactions on Image Processing, Vol. 10, No. 10, pp. 1579–1592.
[3] Yu G.J., Lu C.S. & Liao H.Y.M. (2001) “Mean quantization-based fragile watermarking for
image authentication”, Optical Engineering, Vol. 40, No. 7, pp. 1396–1408.
[4] Barni M., Bartolini F. & Furon T. (2003) “A general framework for robust watermarking
security”, Signal Processing, Vol. 83, No. 10, pp. 2069–2084.
[5] Lee I.S. & Tsai W.H. (2009) “A new approach to covert communication via PDF Files”,
Signal Processing, Vol. 90, No. 2, pp. 557–565.
[6] Shamir A (1979) “How to share a secret”, Communication of the ACM, Vol.22, No.11, pp.
612–613.
[7] Brabin, D. R. D., Perinbam, J. R. P. & Meganathan, D. (2016) “A block-based reversible
data hiding scheme for digital images using optimal value computation”, Wireless Personal
Communications. DOI: 10.1007/s11277-016-3817-4.
[8] Omnia Abdullah Alharbi, Asia Othman Aljhadli & Azizah Abdul Manaf (2020)“A Robust
Double Layer Steganography Technique Based on DNA Sequences”, The 4th International
Conference on Future Networks and Distributed Systems (ICFNDS), article No.:38, pp.1–5,
https:// doi.org / 10.1145 / 3440749. 3442644.
[9] Sanjay Kumar, Anjana Gupta & Gurjit Singh Walia (2021) “Reversible data hiding: A
contemporary survey of state-of-the-art, opportunities, and challenges”, Applied Intelligence,
Vol.52, issue 7, pp 7373–7406, https://doi.org/10.1007/s10489-021-02789-2.
[10] Cox I J, Kilian J, Leighton T & Shamoon T (1997) “Secure Spread Spectrum Watermarking
for Multimedia”, IEEE Transaction on Image Processing, Vol. 6, No. 12, pp. 1673–1687.
[11] Koch E & Zhao J (1995) “Towards robust and hidden image copyright labeling”,
Proceedings of IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras,
Greece, pp. 452–455.
[12] Hsu C. T. & Wu J. L. (1999) “Hidden Digital Watermarks in Images”, IEEE Trans. On
Image Processing, Vol. 8, No. 1, pp. 58-68.
[13] Langelaar G., Setyawan I. & Lagendijk R.L. (2000) “Watermarking Digital Image and
Video Data”, IEEE Signal Processing Magazine, Vol. 17, pp. 20-43. [14] Lin S. D., Shie S. C.
& Guo J. Y. (2010) “Improving the robustness of DCT based image watermarking against JPEG
13. compression”, Computer Standards & Interfaces, Vol. 32, pp. 54–60.
[15] Yue T. W. & Chiag S. (2000) “A Neural Network Approach for Visual Cryptography”,
IEEE-INNSENNS International Joint Conference on Neural Networks, Vol.5, pp. 494-499.
[16] Jayeeta Majumder & Chittaranjan Pradhan (2020) “Pixel Value Differencing Based Image
Steganography using AES and SHA-2 Cryptography Method”, International Journal of Recent
Technology and Engineering (IJRTE), Vol. 8, No. 5, pp. 5325-5329.
[17] Roshni Padate & Aamna Patel (2014) “Encryption and Decryption of Text using AES
Algorithm”, International Journal of Emerging Technology and Advanced Engineering, Vol. 4,
No. 5, pp. 883- 886.
[18] M.Pitchaiah, Philemon Daniel & Praveen (2012) “Implementation of Advanced Encryption
StandardAlgorithm”, International Journal of Scientific & Engineering Research, Vol. 3, No. 3,
pp. 1- 6.
[19] Mstafa R J & Elleithy K M (2014) “A Highly Secure Video Steganography using Hamming
Code (7, 4). Systems”, Applications and Technology Conference (LISAT), IEEE.
[20] Varnan C S, Jagan A, Kaur J, Jyoti D & Dr. Rao D S (2011) “Image Quality Assessment
Techniques on Spatial Domain”, International Journal of Computer Science and Technology
(IJCST), Vol. 2, No.3, ISSN: 2229-4333(Print), ISSN: 0976-8491(Online).
[21] Wang Z, Bovik A C, Sheikh H R & Simoncelli E P (2004) “Image Quality Assessment:
From Error Visibility to Structural Similarity”, IEEE Transactions on Image Processing, Vol.13,
No.4.
[22] Kaur G & Kochhar A (2011) “A Steganography Implementation based on LSB and DCT”,
International Journal for Science and Emerging Technologies with Latest Trends, Vol.4, No.1,
pp. 35–41. ISSN No: Online 2250-3641.
[23] S. D. Lin, S. C. Shie & J. Y. Guo (2010) “Improving the robustness of DCT based image
watermarking against JPEG compression”, Computer Standards &Interfaces, Vol. 32, pp. 54–
60.
[24] S. D. Lin & C. F. Chen (2000) “A robust DCT based watermarking for copyright
protection”, IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 415–421.
[25] S. D. Lin, S. C. Shie & C. F. Chen (2003) “A DCT based image watermarking with
threshold embedding”, International Journal of Computers and Applications, Vol. 25, No. 2, pp.
130–135, 2003.
[26] Vikash Saxena & J. P. Gupta (2009) “A novel watermarking scheme for JPEG images”,
WSEAS Transactions on Signal Processing, 2009, Vol. 5, No. 2, pp. 74–84, 2009.
14. [27] Rekha Chaturvedi, Abhay Sharma, N. Hemrajani & D. Goyal (2012) “Analysis of robust
watermarking technique using mid-band dct domain for different image formats”, International
Journal of Scientific and Research Publications, Vol. 2, No. 3, pp. 1–4.
[28] Q. Kang, K. Li, & J. Yang (2014) “A digital watermarking approach based on DCT domain
combining QR code and chaotic theory”, in Eleventh International Conference on Wireless and
Optical Communications Networks (WOCN), pp. 1–7.
[29] Jobin Abraham & Varghese Paul (2016) “A DCT based imperceptible color image
watermarking scheme”, International Journal of Signal Processing, Image Processing, and
Pattern Recognition, Vol. 9, No. 7, pp. 137–146.
[30] Anirban Goswami, Ritesh Mukherjee & Nabin Ghoshal (2017) “Chaotic Visual
Cryptography Based Digitized Document Authentication”, Wireless Personal Communications,
Vol.96, No. 3, pp. 3585– 3605.
[31] Gelar Budiman and Ledya Novamizanti (2015) “White Space Steganography On Text By
Using Lzw-Huffman Double Compression”, International Journal of Computer Networks &
Communications (IJCNC), Vol.7, No.2, pp. 123-136, DOI: 10.5121/ijcnc.2015.7210.
[32] Saraireh, Saleh (2013) “A Secure Data Communication System Using Cryptography and
Steganography (2013)”, International Journal of Computer Networks & Communications
(IJCNC) Vol.5, No.3, pp. 125-137.
15. VISUALIZE NETWORK ANOMALY DETECTION BY USING K-MEANS
CLUSTERING ALGORITHM
A. M. Riad1
, Ibrahim Elhenawy2
, Ahmed Hassan3
and Nancy Awadallah1
1
Faculty of Computer Science and Information Systems, Mansoura University, Egypt
2
Faculty of Computer Science and Information Systems ,Zagazig University, Egypt
3
Faculty of Engineering Mansoura University , Egypt
ABSTRACT
With the ever increasing amount of new attacks in today’s world the amount of data will keep
increasing, and because of the base-rate fallacy the amount of false alarms will also increase. Another
problem with detection of attacks is that they usually isn’t detected until after the attack has taken
place, this makes defending against attacks hard and can easily lead to disclosure of sensitive
information. In this paper we choose K-means algorithm with the Kdd Cup 1999 network data set to
evaluate the performance of an unsupervised learning method for anomaly detection. The results of
the evaluation showed that a high detection rate can be achieve while maintaining a low false alarm
rate .This paper presents the result of using k-means clustering by applying Cluster 3.0 tool and
visualized this result by using TreeView visualization tool .
KEYWORDS
Intrusion detection, Clustering, K-means, Kdd Cup 99, Cluster 3.0, Visualization, TreeView
For More Details: https://airccse.org/journal/cnc/5513cnc14.pdf
Volume Link: https://airccse.org/journal/ijc2013.html
16. REFERENCES
[1] J. F. Nieves ,"Data Clustering for Anomaly Detection in Network Intrusion Detection "
,Research Alliance in Math and Science , August, pp.1-12, 2009 .
[2] L. Portnoy , E. Eskin , S. Stolfo , " Intrusion detection with unlabeled data using clustering",
In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001) ,
Philadelphia , PA,USA ,2001.
[3] E.Eskin, A.Arnold, , M. Prerau, L.Portnoy, S. Stolfo, "A geometric framework for
unsupervised anomaly detection: Detecting intrusions in unlabeled data", Applications of Data
Mining in Computer Security(2002), Norwell, MA, USA, Dec., pp. 78–100,2002.
[4] K. Nyarko, T. Capers, C. Scott, K. Ladeji-Osias,” Network Intrusion Visualization with
NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration”, IEEE, 2002.
[5] K.Labib, V. R. Vemuri, "Anomaly Detection Using S Language Framework: Clustering and
Visualization of Intrusive Attacks on Computer Systems". Fourth Conference on Security and
Network Architectures, SAR'05, Batz sur Mer, France, June 2005
[6] P. Ren , Y. Gao , Z. Li , Y. Chen and B. Watson , “IDGraphs: Intrusion Detection and
AnalysisUsing Histographs” ,IEEE , 2005 .
[7] P. Laskov, K. Rieck, C. Schäfer, K.R. Müller, “Visualization of anomaly detection using
prediction sensitivity”, Proc.of Sicherheit, April 2005, 197- 208.
[8] A. Mitrokotsa, C. Douligeris ,” Detecting Denial of Service Attacks Using Emergent Self-
Organizing Maps” , Signal Processing and Information Technology, 2005. Proceedings of the
Fifth IEEE International Symposium , pp. 375 – 380 ,IEEE,2005.
[9] J. Peng, C. Feng, J.W. Rozenblit , “A Hybrid Intrusion Detection and Visualization System”
, Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International
Symposium and Workshop , , pp. – 506, IEEE ,2006.
[10] X.Cui, J.Beaver, T. Potok and L.Yang , “Visual Mining Intrusion Behaviors by Using
Swarm Technology” , System Sciences (HICSS), 2011 44th Hawaii International Conference ,
pp. 1 – 7, IEEE 2011.
[11] A.Frei, M. Rennhard ,” Histogram Matrix: Log File Visualization for Anomaly Detection”,
IEEE , 2007 .
[12] L. Dongxia , Z. Yongbo ,” An Intrusion Detection System Based on Honeypot Technology”
,Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on
IEEE, Vol.1,2012 .
[13] M. Jianliang , S. Haikun, B. Ling, "The Application on Intrusion Detection Based on K-
means Cluster Algorithm" , IFITA '09 Proceedings of the 2009 International Forum on
17. Information , Technology and Applications – Vol.1,pp. 150-152,IEEE ,2009.
[14] B. K. Kumar , A. Bhaskar , “Identifying Network Anomalies Using Clustering Technique
in Weblog Data”, International Journal of Computers & Technology, Vol. 2 No. 3, June, 2012.
[15] S. Akbar , K.Nageswara Rao , J.A.Chandulal ," Intrusion Detection System Methodologies
Based on Data Analysis",International Journal of Computer Applications ,Vol. 5 , No.2 , August
2010.
[16] K.Bharti, S. Shukla, S. Jain ,"Intrusion detection using clustering", IJCCT, Vol.1 , 2010
[17] S.Jain , M. Aalam , M.Doja , “ K-means clustering using weka interface” , Proceedings of
the 4th National Conference; INDIACom, Computing For Nation Development, 2010.
[18] The Third International Knowledge Discovery and Data Mining Tools Competition, May
2002,Available from http://kdd.ics.uci.edu/databases/kddcup99.kddcup99.html.
[19] M. Sabhnani ,G. Serpen, “Application of Machine Learning Algorithms to KDD Intrusion
Detection Dataset within Misuse Detection Context “, In Proceedings of the International
Conference on Machine Learning, Models, Technologies and Applications (MLMTA 2003),
Vol. 1, (2003).
[20] F.S.Gharehchopogh, Neda Jabbari, Zeinab Ghaffari Azar ,“Evaluation of Fuzzy K-Means
And KMeans Clustering Algorithms In Intrusion Detection Systems” , International Journal of
Scientific & Technology Research ,Vol. 1, issue 11, December 2012.
[21] M. E. Elhamahmy, H. N. Elmahdy , I. A. Saroit ,"A New Approach for Evaluating Intrusion
Detection System" , International Journal of Artificial Intelligent Systems and Machine
Learning, Vol. 2, No 11, November 2010 .
[22] Dr.S.Siva Sathya, Dr. R.Geetha Ramani and K.Sivaselvi. "Discriminant Analysis based
Feature Selection in KDD Intrusion Dataset ", International Journal of Computer Applications
31(11):1-7, October 2011.
[23] P. G.Jeya , M. Ravichandran and C. S. Ravichandran ," Efficient Classifier for R2L and
U2R Attacks. International Journal of Computer Applications 45(21):29-32, May 2012 .
[24] F. N. M. Sabri, N. M.Norwawi, K. Seman," "Identifying False Alarm Rates for Intrusion
Detection System with Data Mining", International Journal of Computer Science and Network
Security, VOL. 11 No. 4, April 2011
[25] P. Divya , R. Priya," Clustering Based Feature Selection and Outlier Analysis
",International Journal of Computer Science & Communication Networks, Vol 2(6), pg.647-
652.
[26] C.Ahlberg, B. Shneiderman ,” Visual information seeking: tight coupling of dynamic query
filters with starfield displays” , In proceeding of: Conference on Human Factors in Computing
18. Systems, CHI 1994, Boston, Massachusetts, USA, pp. 313-317,April 24-28, 1994.
[27] S. Noel , M. Jacobs , P. Kalapa , S. Jajodia “Multiple Coordinated Views for Network
Attack Graphs”, Visualization for Computer Security,.(VizSEC 05). IEEE Workshop on, 99
[28]http://www.researchgate.net/publication/27521564_The_Information_Mural_A_Techniqu
e_for_ Displaying_and_Navigating_Large_Information_Spaces
[29] http://www.ukessays.com/essays/information-technology/intrusion-detection-system-
methodologiesdata-analysis-information-technology-essay.php
[30] http://dl.acm.org/citation.cfm?id=1106724
[31] http://www.computer.org/csdl/proceedings/vizsec/2005/2782/00/27820005-abs.html
[32] http://dl.acm.org/citation.cfm?id=1106719
[33] Ms. P. K. Karmore and MS. S. T. Bodkhe ,"A Survey on Intrusion in Ad Hoc Networks
and its Detection Measures" , International Journal on Computer Science and Engineering
(IJCSE) ,3(5),pp.1896-1903,May 2011 .
[34] http://bonsai.hgc.jp/~mdehoon/software/cluster/cluster3.pdf - Last visiting at 21.06.2013.
19. On the Migration of a Large Scale Network from IPv4 to IPv6 Environment
Muhammad Yeasir Arafat1
, Feroz Ahmed2
and M Abdus Sobhan3
Department of Electrical and Electronic Engineering, School of Engineering and Computer
Science, Independent University, Bangladesh
ABSTRACT
This work mainly addresses the design a large scale network using dual stack mechanisms. We
focused on the most important theoretical concepts of the IPv6 protocol, such as addressing, address
allocation, routing with the OSPF and BGP protocols and routing protocols performance in dual
stack network using GNS3 and Wireshark simulators. we have a tendency to measure a perfect model
and a true large-scale network atmosphere victimization out there end-to-end activity techniques that
focuses on a large-scale IPv4 and IPv6 backbone and created performance the IPv4 and IPv6
network. In this paper, we compiled IPv6 address planning in large scale network, performance
statistics of each network in terms of TCP throughput, delay jitters, packet loss rate, and round trip
time. It is found that, a minor degradation within the throughput of the TCP, delay jitter, a lower
packet loss rate, and a rather longer round trip time are occurred in a real large scale dual stack
network.
KEYWORDS
IPv6, IPv4, double stack, BGPv4, OSPFv3, ISP, throughput, TCP and RTT
For More Details: https://airccse.org/journal/cnc/6214cnc10.pdf
Volume Link: https://airccse.org/journal/ijc2014.html
20. REFERENCES
[1] Tahir Abdullah, Shahbaz Nazeer, Afzaal Hussain, “NETWORK MIGRATION AND
PERFORMANCE ANALYSIS OF IPv4 AND IPv6”, European Scientific Journal, vol. 8, No.5, 2013
[2] Lefty Valle-Rosado, Lizzie Narváez-Díaz, Cinhtia González-Segura and Victor Chi-Pech,
“Design and Simulation of an IPv6 Network Using Two Transition Mechanisms”, IJCSI
International Journal of Computer Science Issues, Vol.9, No.6, pp: 60-65, Nov. 2012.
[3] Internet Engineering Task Force (IETF) RFC 6052, 3513, 4291, 6104, http://tools.ietf.org/html/
[4] Febby Nur Fatah, Adang Suhendra , M Akbar Marwan , Henki Firdaus Henki Firdaus ,
“Performance Measurements Analysis of Dual Stack IPv4-IPv6”, Proc. of the Second Intl.
Conference on Advances in Information Technology — AIT, 2013..
[5] Y. Wang, S. Ye, and X. Li, “Understanding Current IPv6 Performance: A Measurement Study”,
10th IEEE Symposium on Computer Communications, June 2005.
[6] Cebrail CIFLIKLI, Ali GEZER and Abdullah Tuncay OZSAHIN, “Packet traffic features of IPv6
and IPv4 protocol traffic, Turk”, J Elec Eng & Comp Science, Vol.20, No5, pp: 727-749, 2012
[7] Alex Hinds, Anthony Atojoko, and Shao Ying Zhu, “Evaluation of OSPF and EIGRP Routing
Protocols for IPv6”, International Journal of Future Computer and Communication (IJFCC), Vol.2,
No.4, pp: 287-291, Aug. 2013.
[8] T. Bates, R. Chandra, D. Katz, and Y. Rekhter, “Multiprotocol Extensions for BGP-4,” Internet
Request for Comments, vol. RFC 4760, Jan. 2007.
[9] Ing. Luis Marrone, Lic. Andr´es Barbieri and Mg. Mat ‘as Robles, “TCP Performance - CUBIC,
Vegas & Reno”, JCS&T, Vol.13, No.1, pp:1-8, April 2013
[10] Kevin R. Fall and W. Richard Stevens, “TCP/IP Illustrated”, volume 1, published by
Addisonwisely professional computer series, Pearson Education, 2012
21. PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI
MODELS AS MQTT SERVERS AND CLIENTS
Faiza Al-Salti1
, N. Alzeidi2
, Khaled Day2
, Abderezak Touzene2
, 1
Sultan Qaboos Comprehensive
Cancer Care and Research Centre, Oman, 2
Sultan Qaboos University, Oman
5G Networks & Beyond, Technical Research Centre of Finland (VTT), Espoo, Finland
ABSTRACT
This paper studies the impact of different localization schemes on the performance of location-based
routing for UWSNs. Particularly, LSWTS and 3DUL localization schemes available in the literature
are used to study their effects on the performance of the ERGR-EMHC routing protocol. First, we
assess the performance of two localization schemes by measuring their localization coverage,
accuracy, control packets overhead, and required localization time. We then study the performance
of the ERGR-EMHC protocol using location information provided by the selected localization
schemes. The results are compared with the performance of the routing protocol when using exact
nodes’ locations. The obtained results show that LSWTS outperforms 3DUL in terms of localization
accuracy by 83% and localization overhead by 70%. In addition, the results indicate that the
localization error has a significant impact on the performance of the routing protocol. For instance,
ERGR-EMHC with LSWTS is better in delivering data packets by an average of 175% compared to
3DUL.
KEYWORDS
Underwater wireless sensor networks (UWSNs), localization, ranging localization methods,
localization error, location-based routing
For More Details: https://aircconline.com/ijcnc/V15N2/15223cnc01.pdf
Volume Link: https://airccse.org/journal/ijc2023.html
22. REFERENCES
[1] Y. Wang, “Three-Dimensional Wireless Sensor Networks: Geometric Approaches for Topology
and Routing Design,” in The Art of Wireless Sensor Networks, H. M. Ammari, Ed. Berlin,
Heidelberg: Springer Berlin Heidelberg, 2014, pp. 367–409.
[2] H. P. Tan, R. Diamant, W. K. G. Seah, and M. Waldmeyer, “A survey of techniques and
challenges in underwater localization,” Ocean Engineering, vol. 38, no. 14–15, pp. 1663–1676,
October 2011, doi: 10.1016/J.OCEANENG.2011.07.017.
[3] F. Al-Salti, N. Alzeidi, and K. Day, “LOCALIZATION SCHEMES FOR UNDERWATER
WIRELESS SENSOR NETWORKS: SURVEY,” International journal of Computer Networks &
Communications, vol. 12, no. 3, pp. 113–130, May 2019.
[4] M. Erol, L. F. M. Vieira, and M. Gerla, “AUV-Aided Localization for Underwater Sensor
Networks,” in International Conference on Wireless Algorithms, Systems and Applications (WASA
2007), 1-3 August 2007, pp. 44–54, Chicago, IL, USA.
[5] M. Beniwal, R. P. Singh, and A. Sangwan, “A Localization Scheme for Underwater Sensor
Networks Without Time Synchronization,” Wireless Personal Communications, vol. 88, no. 3, pp.
537–552, June 2016.
[6] M. Isik and O. Akan, “A three dimensional localization algorithm for underwater acoustic sensor
networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 9, pp. 4457–4463,
September 2009.
[7] Z. Zhou, Z. Peng, J.-H. Cui, Z. Shi, and A. Bagtzoglou, “Scalable Localization with Mobility
Prediction for Underwater Sensor Networks,” IEEE Transactions on Mobile Computing, vol. 10, no.
3, pp. 335–348, March 2011.
[8] Y. Zhou, B. Gu, K. Chen, J. Chen, and H. Guan, “An range-free localization scheme for large
scale underwater wireless sensor networks,” Journal of Shanghai Jiaotong University (Science), vol.
14, no. 5, pp. 562–568, October 2009.
[9] J. Luo and L. Fan, “A Two-Phase Time Synchronization-Free Localization Algorithm for
Underwater Sensor Networks,” Sensors, vol. 17, no. 12, p. 726, March 2017.
[10] K. Day, F. Al-Salti, A. Touzene, and N. Alzeidi, “AN EFFICIENT DATA COLLECTION PROTOCOL
FOR UNDERWATER WIRELESS SENSOR NETWORKS,” International Journal of Computer Networks
& Communications (IJCNC), vol. 12, no. 5, pp. 1–15, September 2020, doi: 10.5121/ijcnc.2020.12501.
[11] P. Xie, J.-H. Cui, and L. Lao, VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks,
in Proceedings of IFIP Networking'06, Coimbra, Portugal, 2006, pp. 1216–1221.
[12] F. Al Salti, N. Alzeidi, and B. Arafeh, EMGGR: An Energy-Efficient Multipath Grid-Based
Geographic Routing Protocol for Underwater Wireless Sensor Networks, Wireless Networks,
volume 23, no. 4, pp. 1301–1314, May 2017. International Journal of Computer Networks &
Communications (IJCNC) Vol.15, No.2, March 2023 18
[13] N. Javaid, M. Shah, A. Ahmad, M. Imran, M. Khan, and A. Vasilakos, “An Enhanced Energy
Balanced Data Transmission Protocol for Underwater Acoustic Sensor Networks,” Sensors, vol. 16,
23. no. 4, p. 487, April 2016, doi: 10.3390/s16040487.
[14] F. Al-Salti, N. Alzeidi, K. Day, and A. Touzene, “An efficient and reliable grid-based routing
protocol for UWSNs by exploiting minimum hop count,” Computer Networks, vol. 162, p. 106869,
October 2019.
[15] B. Peng and A. H. Kemp, “Energy-efficient geographic routing in the presence of localization
errors,” Computer Networks, vol. 55, no. 3, pp. 856–872, February 2011.
[16] M. Kadi and I. Alkhayat, “The effect of location errors on location based routing protocols in
wireless sensor networks,” Egyptian Informatics Journal, vol. 16, no. 1, pp. 113–119, March 2015.
[17] R. C. Shah, A. Wolisz, and J. M. Rabaey, “On the performance of geographical routing in the
presence of localization errors,” in IEEE International Conference on Communications, 2005. ICC
2005, 16-20 May 2005, vol. 5, pp. 2979–2985, Seoul, South Korea.
[18] D. Son, A. Helmy, and B. Krishnamachari, “The effect of mobility-induced location errors on
geographic routing in mobile ad hoc sensor networks: analysis and improvement using mobility
prediction,” IEEE Transactions on Mobile Computing, vol. 3, no. 3, pp. 233–245, July 2004.
[19] Erol, L. F. M. Vieira, and M. Gerla, “Localization with Dive’N’Rise (DNR) beacons for
underwater acoustic sensor networks,” in Proceedings of the second workshop on Underwater
networks - WuWNet ’07, 14 September 2007, pp. 97-100, Montreal, Quebec, Canada.
[20] V. Chandrasekhar and W. Seah, “An Area Localization Scheme for Underwater Sensor
Networks,” in OCEANS 2006 - Asia Pacific, 16-19 May 2006, pp. 1–8, Singapore, Singapore.
[21] A. M. Abu-Mahfouz and G. P. Hancke, “ns-2 extension to simulate localization system in
wireless sensor networks,” in IEEE Africon ’11, 13-15 September 2011, pp. 1–7, Livingstone,
Zambia.
[22] M. Erol-Kantarci, S. Oktug, L. Vieira, and M. Gerla, “Performance evaluation of distributed
localization techniques for mobile underwater acoustic sensor networks,” Ad Hoc Networks, vol. 9,
no. 1, pp. 61–72, January 2011.
[23] Z. Zhou, J.-H. Cui, and S. Zhou, “Efficient localization for large-scale underwater sensor
networks,” Ad Hoc Networks, vol. 8, no. 3, pp. 267–279, May 2010.
[24] Z. Qiang, Z. Senlin, and L. Meiqin, “A clock synchronization independent localization scheme for
underwater wireless sensor networks,” in Proceedings of the Eighth ACM International Conference on
Underwater Networks and Systems - WUWNet ’13, 11-13 November 2013, pp. 1–5, Kaohsiung, Taiwan.
[25] F. Al-Salti, N. Alzeidi, K. Day and A. Touzene, “Multiple Sink Placement Strategy for Underwater
Wireless Sensor Networks,” Proceedings of the International Symposium on Networks, Computers and
Communications (ISNCC), 19-21 June 2018, Rome, Italy.
[26] F. Al-Salti, A. N, K. Day, B. Arafeh, and A. Touzene, “Grid Based Priority Routing Protocol for
UWSNs,” International journal of Computer Networks & Communications, vol. 9, no. 6, pp. 01–20,
December 2017, doi: 10.5121/ijcnc.2017.9601.
24. INTRUSION PREVENTION/INTRUSION DETECTION SYSTEM (IPS/IDS)
FOR WIFI NETWORKS
Michal Korcak, Jaroslav Lamer and Frantisek Jakab, Technical University of Košice, Slovakia
ABSTRACT
The nature of wireless networks itself created new vulnerabilities that in the classical wired networks
do not exist. This results in an evolutional requirement to implement new sophisticated security
mechanism in form of Intrusion Detection and Prevention Systems. This paper deals with security
issues of small office and home office wireless networks. The goal of our work is to design and
evaluate wireless IDPS with use of packet injection method. Decrease of attacker’s traffic by 95%
was observed when compared to attacker’s traffic without deployment of proposed IDPS system.
KEYWORDS
Deauthentification, Intrusion detection, Intrusion prevention, Packet injection, WiFi
For More Details: https://airccse.org/journal/cnc/6414cnc07.pdf
Volume Link: https://airccse.org/journal/ijc2014.html
25. REFERENCES
[1] Henry, Paul & Luo, Hui, (2002) “WiFi: what's next?”. Communications Magazine, IEEE,
40.12: 66- 72.
[2] Tews, Erik & Beck, Martin, (2009) “Practical attacks against WEP and WPA” In:
Proceedings of the second ACM conference on Wireless network security. ACM, p. 79-86.
[3] Gounaris, Georgios, (2014) “WiFi security and testbed implementation for WEP/WPA
cracking demonstration”.
[4] L. T. Heberlein & K. N. Levitt & B. Mukherjee, (1991) “A Method To Detect Intrusive
Activity in a Networked Environment”. In: 14th National Computer Security Conference.
Washington, D.C.: National Institute of Standards and Technology, National Computer Security
Center, pp. 362-371
[5] Karen, Scarfone & Peter Mell, (2007) “Guide To Intrusion Detection And Prevention
Systems (IDPS)”. Washington, D.C.: National Institute of Standards and Technology, Special
Publication 800- 94, 128 p.
[6] Michael Rash, (2007) “Linux Firewalls - Attack Detection And Response With Iptables”,
Psad And Fwsnort. San Francisco: No Starch Press, 388 p.
[7] Allen, Lee (2012) “Advanced Penetration Testing for Highly--Secured Environments: The
Ultimate Security Guide”. Birmingham: Packt Publishing Ltd., 414p.
[8] “Linux Wireless - Hostapd Linux Documentation Page”. [online]. [cit. 14. April. 2014].
Available online: .
[9] KAZIENKO, Przemyslaw; DOROSZ, Piotr. Intrusion detection systems (IDS) Part 2-
Classification; methods; techniques. WindowsSecurity. com, 2004.
[10] CARL, Glenn, et al. Denial-of-service attack-detection techniques. Internet Computing,
IEEE, 2006, 10.1: 82-89