The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
January 2021: Top Ten Cited Article in Computer Science, Engineering IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAYcscpconf
Less than a century since the automobile was made affordable enough for the general public, hundreds of millions of vehicles now travel along highways and streets around the
world. Innovations in safety, comfort, and convenience have made vast improvements in
automobiles during that time, and now new technologies promise to change the face of
vehicular travel once again. Vehicular ad hoc network (VANET) is network which provides the communication between vehicle to vehicle for p r o v i d i n g i n f o r m a t i o n t o travelers with new features and applications that have never previously been possible. This paper focuses
on vehicle to vehicle (V2V) communications in VANET. Lot of research is going on for
determining route between source and destination vehicles for routing the information with
good packet delivery ratio. In this paper we provide a simulation and study of VANET Routing Protocols for end-to-end delay in V2V communication.
Study of vanet routing protocols for end to end delaycsandit
Less than a century since the automobile was made affordable enough for the general
public, hundreds of millions of vehicles now travel along highways and streets around the
world. Innovations in safety, comfort, and convenience have made vast improvements in
automobiles during that time, and now new technologies promise to change the face of
vehicular travel once again. Vehicular ad hoc network (VANET) is network which provides the
communication between vehicle to vehicle for p r o v i d i n g i n f o rma t i o n t o travelers with
new features and applications that have never previously been possible. This paper focuses
on vehicle to vehicle (V2V) communications in VANET. Lot of research is going on for
determining route between source and destination vehicles for routing the information with
good packet delivery ratio. In this paper we provide a simulation and study of VANET Routing
Protocols for end-to-end delay in V2V communication.
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with devices and provides sufficient capability advantages of networking and socialization with consideration of intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT networks. The constructed RPL routing protocol incorporates an optimization approach for the identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path for data transmission between nodes through optimization techniques for effective route establishment. The optimization of routes is performed with whale optimization techniques. The developed whale optimization technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an optimization membership function for the identification of the optimal path in the network. The performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT. The comparative analysis showed that the performance of the proposed WOABC is ~3% increased throughput. The performance of the proposed WOABC is significant compared with the existing RPL routing protocol.
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers
both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with
devices and provides sufficient capability advantages of networking and socialization with consideration of
intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for
effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms
of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research
developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT
networks. The constructed RPL routing protocol incorporates an optimization approach for the
identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path
for data transmission between nodes through optimization techniques for effective route establishment. The
optimization of routes is performed with whale optimization techniques. The developed whale optimization
technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an
optimization membership function for the identification of the optimal path in the network. The
performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT.
The comparative analysis showed that the performance of the proposed WOABC is ~3% increased
throughput. The performance of the proposed WOABC is significant compared with the existing RPL
routing protocol.
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing problem in multi-services MANETs, as well as the implementation of an adaptation of the dynamic
source routing (DSR) protocol.
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
January 2021: Top Ten Cited Article in Computer Science, Engineering IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAYcscpconf
Less than a century since the automobile was made affordable enough for the general public, hundreds of millions of vehicles now travel along highways and streets around the
world. Innovations in safety, comfort, and convenience have made vast improvements in
automobiles during that time, and now new technologies promise to change the face of
vehicular travel once again. Vehicular ad hoc network (VANET) is network which provides the communication between vehicle to vehicle for p r o v i d i n g i n f o r m a t i o n t o travelers with new features and applications that have never previously been possible. This paper focuses
on vehicle to vehicle (V2V) communications in VANET. Lot of research is going on for
determining route between source and destination vehicles for routing the information with
good packet delivery ratio. In this paper we provide a simulation and study of VANET Routing Protocols for end-to-end delay in V2V communication.
Study of vanet routing protocols for end to end delaycsandit
Less than a century since the automobile was made affordable enough for the general
public, hundreds of millions of vehicles now travel along highways and streets around the
world. Innovations in safety, comfort, and convenience have made vast improvements in
automobiles during that time, and now new technologies promise to change the face of
vehicular travel once again. Vehicular ad hoc network (VANET) is network which provides the
communication between vehicle to vehicle for p r o v i d i n g i n f o rma t i o n t o travelers with
new features and applications that have never previously been possible. This paper focuses
on vehicle to vehicle (V2V) communications in VANET. Lot of research is going on for
determining route between source and destination vehicles for routing the information with
good packet delivery ratio. In this paper we provide a simulation and study of VANET Routing
Protocols for end-to-end delay in V2V communication.
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with devices and provides sufficient capability advantages of networking and socialization with consideration of intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT networks. The constructed RPL routing protocol incorporates an optimization approach for the identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path for data transmission between nodes through optimization techniques for effective route establishment. The optimization of routes is performed with whale optimization techniques. The developed whale optimization technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an optimization membership function for the identification of the optimal path in the network. The performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT. The comparative analysis showed that the performance of the proposed WOABC is ~3% increased throughput. The performance of the proposed WOABC is significant compared with the existing RPL routing protocol.
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers
both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with
devices and provides sufficient capability advantages of networking and socialization with consideration of
intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for
effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms
of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research
developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT
networks. The constructed RPL routing protocol incorporates an optimization approach for the
identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path
for data transmission between nodes through optimization techniques for effective route establishment. The
optimization of routes is performed with whale optimization techniques. The developed whale optimization
technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an
optimization membership function for the identification of the optimal path in the network. The
performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT.
The comparative analysis showed that the performance of the proposed WOABC is ~3% increased
throughput. The performance of the proposed WOABC is significant compared with the existing RPL
routing protocol.
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing problem in multi-services MANETs, as well as the implementation of an adaptation of the dynamic
source routing (DSR) protocol.
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Efficient addressing schemes for internet of thingsIJECEIAES
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with constrained application protocol (CoAP-DPMIP) and PMIPv6 with constrained application protocol (CoAP-PMIP). It also provides the optimized transmission path to reduce the delay handover in IoT network. The PMIPv6 described the IPv6 address of mobile sensor device for efficient mobility management. The network architecture explains three protocol layers of open systems interconnection model (OSI model). The OSI layers are data link layer, network layer and transport layer. We have proposed the distance estimation algorithm for efficient data frames transmission. This paper mainly focuses the secure data transmission with minimum loss of error. The evaluation result proved that proposed technique performance with delay, energy, throughput and packet delivery ratio (PDR). Also, it measures the computational time very effectively.
IRJET - Security and Privacy by IDS SystemIRJET Journal
This document summarizes a research paper that proposes an intrusion detection system (IDS) to detect spoofing attacks in wireless sensor networks. The IDS monitors node activities and detects if a node is behaving abnormally or attacking the network. If an attack is detected, the IDS sends an alarm message to the affected node to isolate the attacker. The paper simulates this approach using OTCL language in Network Simulator 2 on Linux. The results show the IDS can efficiently detect spoofing attackers in the wireless network.
The rapid growth that has taken place in Computer Vision has been instrumental in driving the advancement of Image processing techniques and drawing inferences from them. Combined with the enormous capabilities that Deep Neural networks bring to the table, computers can be efficiently trained to automate the tasks and yield accurate and robust results quickly thus optimizing the process. Technological growth has enabled us to bring such computationally intensive tasks to lighter and lower-end mobile devices thus opening up a wide range of possibilities. WebRTC-the open-source web standard enables us to send multimedia-based data from peer to peer paving the way for Real-time Communication over the Web. With this project, we aim to build on one such opportunity that can enable us to perform custom object detection through an android based application installed on our mobile phones. Therefore, our problem statement is to be able to capture real-time feeds, perform custom object detection, generate inference results, and appropriately send intruder alerts when needed. To implement this, we propose a mobile-based over-the-cloud solution that can capitalize on the enormous and encouraging features of the YOLO algorithm and incorporate the functionalities of OpenCV’s DNN module for providing us with fast and correct inferences. Coupled with a good and intuitive UI, we can ensure ease of use of our application.
The document proposes a real-time mobile surveillance system using WebRTC. It utilizes computer vision techniques like YOLO for object detection on live video feeds captured by an Android application. The feeds are sent to a NodeJS server and then to a Flask server using REST APIs where OpenCV's DNN module performs inference. Detected objects and alerts are then sent back to the Android device. The system aims to provide low-latency, remote surveillance capabilities using mobile devices and over-the-cloud solutions.
Design and Implementation of Smart congestion control systemdbpublications
The frequent traffic jams at major junctions
call for an efficient traffic management
system in place. The resulting wastage of
time and increase in pollution levels can be
eliminated on a city-wide scale by these
systems.
The project proposes to implement
an intelligent traffic controller using real
time image processing. The image
sequences from a camera are analyzed using
thresholding method to find the density.
Subsequently, the number of vehicles at
the intersection is evaluated and traffic is
efficiently managed. The project also
proposes to implement a real-time
emergency vehicle detection system. In case
an emergency vehicle is detected, the lane is
given priority over all the others. Hardware
control is done by microcontroller.
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
This document proposes an internet video streaming service for social networks that uses dynamic adaptive streaming over HTTP (DASH) and Markov decision processes (MDPs) to optimize quality of service for video streaming on mobile devices. It develops an MDP model to choose the most favorable video streaming method across multiple wireless networks in order to improve startup latency, playback fluency, average playback quality, playback smoothness, and wireless data cost. The system was tested using an Android emulator and scalable video coding to provide an efficient, adaptive streaming service for various mobile devices and dynamic network environments.
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
This document presents a system for internet video streaming service for social networks. It aims to improve quality of service for video streaming on mobile devices by developing an adaptive streaming method using a Markov Decision Process. The system uses Dynamic Adaptive Streaming over HTTP (DASH) to store multiple compressed video versions at different resolutions and qualities in segments. It formulates the multi-link video streaming as a reinforcement learning task and models it as a finite state Markov Decision Process. An algorithm is proposed to find near-optimal solutions in real-time to select the best video quality based on factors like bandwidth, buffer occupancy, and device resolution to improve streaming performance metrics while saving network bandwidth and costs. The system was tested using an Android emulator and Scalable Video
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...AM Publications,India
This document presents a novel routing protocol called SSAAR that aims to provide end-to-end throughput and secure data transmission in multi-hop wireless networks. The protocol uses an hop-by-hop authentication scheme using elliptic curve cryptography where each user generates a public/private key pair. When a source node wants to transmit data, it generates a digital signature for the message using its private key. Intermediate nodes can verify the signature using the source's public key to authenticate the message. The protocol is evaluated experimentally and results show it can effectively provide security and reliability for wireless data transmission.
This document summarizes an article that proposes a novel approach called NOFITC (Near Real Time Online Flow-based Internet Traffic Classification) for online network traffic classification using machine learning. The approach customizes an open source C4.5 algorithm to work for online classification of NetFlow data in real-time. It evaluates the accuracy and processing time of the approach by comparing its performance to Weka's C4.5 implementation and a packet sniffing program on collected network traffic data. The results show that the accuracy is identical to C4.5 and it can classify NetFlow packets with no packet loss due to parallel processing, demonstrating it can perform online traffic classification in real-time.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
New Approaches in Cognitive Radios using Evolutionary Algorithms IJECEIAES
Cognitive radio has claimed a promising technology to exploit the spectrum in an ad hoc network. Due many techniques have become a topic of discussion on cognitive radios, the aim of this paper was developed a contemporary survey of evolutionary algorithms in Cognitive Radio. According to the art state, this work had been collected the essential contributions of cognitive radios with the particularity of base they research in evolutionary algorithms. The main idea was classified the evolutionary algorithms and showed their fundamental approaches. Moreover, this research will be exposed some of the current issues in cognitive radios and how the evolutionary algorithms will have been contributed. Therefore, current technologies have matters presented in optimization, learning, and classification over cognitive radios where evolutionary algorithms can be presented big approaches. With a more comprehensive and systematic understanding of evolutionary algorithms in cognitive radios, more research in this direction may be motivated and refined.
Energy-efficient device-to-device communication in internet of things using ...IJECEIAES
Device-to-device (D2D) communication has grown into notoriety as a critical component of the internet of things (IoT). One of the primary limitations of IoT devices is restricted battery source. D2D communication is the direct contact between the participating devices that improves the data rate and delivers the data quickly by consuming less battery. An energy-efficient communication method is required to enhance the communication lifetime of the network by reducing the node energy dissipation. The clustering-based D2D communication method is maximally acceptable to boom the durability of a network. The oscillating spider monkey optimization (OSMO) and oscillating particle swarm optimization (OPSO) algorithms are used in this study to improve the selection of cluster heads (CHs) and routing paths for D2D communication. The CHs and D2D communication paths are selected depending on the parameters such as energy consumption, distance, end-to-end delay, link quality and hop count. A simulation environment is designed to evaluate and test the performance of the OSMO-OPSO algorithm with existing D2D communication algorithms (such as the GAPSO-H algorithm, adaptive resource-aware splitlearning (ARES), bio-inspired cluster-based routing scheme (Bi-CRS), and European society for medical oncology (ESMO) algorithm). The results proved that the proposed technique outperformed with respect to traditional routing strategies regarding latency, packet delivery, energy efficiency, and network lifetime.
Traffic Management using IoT and Deep Learning Techniques: A Literature SurveyIRJET Journal
The document summarizes various literature on traffic management techniques using IoT and deep learning. It discusses object detection algorithms like YOLO, Faster R-CNN, and DeepSORT. It also reviews papers that use techniques like background subtraction, image processing, and ultrasonic sensors to detect and count vehicles and dynamically manage traffic light timing. Most studies aim to develop more accurate, real-time systems to reduce traffic congestion compared to traditional fixed-time traffic signals. They achieve improved results over previous methods in areas like mean average precision, tracking accuracy, and processing speed.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
Contenu connexe
Similaire à April 2024 - Top 10 Read Articles in Computer Networks & Communications
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Efficient addressing schemes for internet of thingsIJECEIAES
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with constrained application protocol (CoAP-DPMIP) and PMIPv6 with constrained application protocol (CoAP-PMIP). It also provides the optimized transmission path to reduce the delay handover in IoT network. The PMIPv6 described the IPv6 address of mobile sensor device for efficient mobility management. The network architecture explains three protocol layers of open systems interconnection model (OSI model). The OSI layers are data link layer, network layer and transport layer. We have proposed the distance estimation algorithm for efficient data frames transmission. This paper mainly focuses the secure data transmission with minimum loss of error. The evaluation result proved that proposed technique performance with delay, energy, throughput and packet delivery ratio (PDR). Also, it measures the computational time very effectively.
IRJET - Security and Privacy by IDS SystemIRJET Journal
This document summarizes a research paper that proposes an intrusion detection system (IDS) to detect spoofing attacks in wireless sensor networks. The IDS monitors node activities and detects if a node is behaving abnormally or attacking the network. If an attack is detected, the IDS sends an alarm message to the affected node to isolate the attacker. The paper simulates this approach using OTCL language in Network Simulator 2 on Linux. The results show the IDS can efficiently detect spoofing attackers in the wireless network.
The rapid growth that has taken place in Computer Vision has been instrumental in driving the advancement of Image processing techniques and drawing inferences from them. Combined with the enormous capabilities that Deep Neural networks bring to the table, computers can be efficiently trained to automate the tasks and yield accurate and robust results quickly thus optimizing the process. Technological growth has enabled us to bring such computationally intensive tasks to lighter and lower-end mobile devices thus opening up a wide range of possibilities. WebRTC-the open-source web standard enables us to send multimedia-based data from peer to peer paving the way for Real-time Communication over the Web. With this project, we aim to build on one such opportunity that can enable us to perform custom object detection through an android based application installed on our mobile phones. Therefore, our problem statement is to be able to capture real-time feeds, perform custom object detection, generate inference results, and appropriately send intruder alerts when needed. To implement this, we propose a mobile-based over-the-cloud solution that can capitalize on the enormous and encouraging features of the YOLO algorithm and incorporate the functionalities of OpenCV’s DNN module for providing us with fast and correct inferences. Coupled with a good and intuitive UI, we can ensure ease of use of our application.
The document proposes a real-time mobile surveillance system using WebRTC. It utilizes computer vision techniques like YOLO for object detection on live video feeds captured by an Android application. The feeds are sent to a NodeJS server and then to a Flask server using REST APIs where OpenCV's DNN module performs inference. Detected objects and alerts are then sent back to the Android device. The system aims to provide low-latency, remote surveillance capabilities using mobile devices and over-the-cloud solutions.
Design and Implementation of Smart congestion control systemdbpublications
The frequent traffic jams at major junctions
call for an efficient traffic management
system in place. The resulting wastage of
time and increase in pollution levels can be
eliminated on a city-wide scale by these
systems.
The project proposes to implement
an intelligent traffic controller using real
time image processing. The image
sequences from a camera are analyzed using
thresholding method to find the density.
Subsequently, the number of vehicles at
the intersection is evaluated and traffic is
efficiently managed. The project also
proposes to implement a real-time
emergency vehicle detection system. In case
an emergency vehicle is detected, the lane is
given priority over all the others. Hardware
control is done by microcontroller.
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
This document proposes an internet video streaming service for social networks that uses dynamic adaptive streaming over HTTP (DASH) and Markov decision processes (MDPs) to optimize quality of service for video streaming on mobile devices. It develops an MDP model to choose the most favorable video streaming method across multiple wireless networks in order to improve startup latency, playback fluency, average playback quality, playback smoothness, and wireless data cost. The system was tested using an Android emulator and scalable video coding to provide an efficient, adaptive streaming service for various mobile devices and dynamic network environments.
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
This document presents a system for internet video streaming service for social networks. It aims to improve quality of service for video streaming on mobile devices by developing an adaptive streaming method using a Markov Decision Process. The system uses Dynamic Adaptive Streaming over HTTP (DASH) to store multiple compressed video versions at different resolutions and qualities in segments. It formulates the multi-link video streaming as a reinforcement learning task and models it as a finite state Markov Decision Process. An algorithm is proposed to find near-optimal solutions in real-time to select the best video quality based on factors like bandwidth, buffer occupancy, and device resolution to improve streaming performance metrics while saving network bandwidth and costs. The system was tested using an Android emulator and Scalable Video
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...AM Publications,India
This document presents a novel routing protocol called SSAAR that aims to provide end-to-end throughput and secure data transmission in multi-hop wireless networks. The protocol uses an hop-by-hop authentication scheme using elliptic curve cryptography where each user generates a public/private key pair. When a source node wants to transmit data, it generates a digital signature for the message using its private key. Intermediate nodes can verify the signature using the source's public key to authenticate the message. The protocol is evaluated experimentally and results show it can effectively provide security and reliability for wireless data transmission.
This document summarizes an article that proposes a novel approach called NOFITC (Near Real Time Online Flow-based Internet Traffic Classification) for online network traffic classification using machine learning. The approach customizes an open source C4.5 algorithm to work for online classification of NetFlow data in real-time. It evaluates the accuracy and processing time of the approach by comparing its performance to Weka's C4.5 implementation and a packet sniffing program on collected network traffic data. The results show that the accuracy is identical to C4.5 and it can classify NetFlow packets with no packet loss due to parallel processing, demonstrating it can perform online traffic classification in real-time.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
New Approaches in Cognitive Radios using Evolutionary Algorithms IJECEIAES
Cognitive radio has claimed a promising technology to exploit the spectrum in an ad hoc network. Due many techniques have become a topic of discussion on cognitive radios, the aim of this paper was developed a contemporary survey of evolutionary algorithms in Cognitive Radio. According to the art state, this work had been collected the essential contributions of cognitive radios with the particularity of base they research in evolutionary algorithms. The main idea was classified the evolutionary algorithms and showed their fundamental approaches. Moreover, this research will be exposed some of the current issues in cognitive radios and how the evolutionary algorithms will have been contributed. Therefore, current technologies have matters presented in optimization, learning, and classification over cognitive radios where evolutionary algorithms can be presented big approaches. With a more comprehensive and systematic understanding of evolutionary algorithms in cognitive radios, more research in this direction may be motivated and refined.
Energy-efficient device-to-device communication in internet of things using ...IJECEIAES
Device-to-device (D2D) communication has grown into notoriety as a critical component of the internet of things (IoT). One of the primary limitations of IoT devices is restricted battery source. D2D communication is the direct contact between the participating devices that improves the data rate and delivers the data quickly by consuming less battery. An energy-efficient communication method is required to enhance the communication lifetime of the network by reducing the node energy dissipation. The clustering-based D2D communication method is maximally acceptable to boom the durability of a network. The oscillating spider monkey optimization (OSMO) and oscillating particle swarm optimization (OPSO) algorithms are used in this study to improve the selection of cluster heads (CHs) and routing paths for D2D communication. The CHs and D2D communication paths are selected depending on the parameters such as energy consumption, distance, end-to-end delay, link quality and hop count. A simulation environment is designed to evaluate and test the performance of the OSMO-OPSO algorithm with existing D2D communication algorithms (such as the GAPSO-H algorithm, adaptive resource-aware splitlearning (ARES), bio-inspired cluster-based routing scheme (Bi-CRS), and European society for medical oncology (ESMO) algorithm). The results proved that the proposed technique outperformed with respect to traditional routing strategies regarding latency, packet delivery, energy efficiency, and network lifetime.
Traffic Management using IoT and Deep Learning Techniques: A Literature SurveyIRJET Journal
The document summarizes various literature on traffic management techniques using IoT and deep learning. It discusses object detection algorithms like YOLO, Faster R-CNN, and DeepSORT. It also reviews papers that use techniques like background subtraction, image processing, and ultrasonic sensors to detect and count vehicles and dynamically manage traffic light timing. Most studies aim to develop more accurate, real-time systems to reduce traffic congestion compared to traditional fixed-time traffic signals. They achieve improved results over previous methods in areas like mean average precision, tracking accuracy, and processing speed.
Similaire à April 2024 - Top 10 Read Articles in Computer Networks & Communications (20)
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Leveraging Generative AI to Drive Nonprofit Innovation
April 2024 - Top 10 Read Articles in Computer Networks & Communications
1. April 2024: Top10
Read Articles in
Computer Networks
& Communications
International Journal of Computer
Networks& Communications (IJCNC)
http://airccse.org/journal/ijcnc.html
(Scopus, ERA Listed, WJCI Indexed)
Scopus Cite Score 2022—1.8
ISSN 0974 - 9322 (Online); 0975 - 2293 (Print)
Citations, h-index, i10-index
2. DYNAMIC ROUTING OF IP TRAFFIC BASED ON QOS PARAMETERS
Martin Kriška1 , Jozef Janitor2 and Peter Fecilak3
1Computer Networks Laboratory, Technical University of Kosice, Slovakia 2 Institute of
Computer Technology, Technical University of Kosice, Slovakia 3Department of Computers and
Informatics, Technical University of Kosice, Slovakia
ABSTRACT
The article looks into the current state of the art of dynamic routing protocols with respect to
their possibilities to react to changes in the Quality of Service when selecting the best route towards
a destination network. New options that could leverage information about the ever changing QoS
parameters for data communication are analysed and a Cisco Performance Routing solution is
described more in detail. The practical part of this work focuses on a design and implementation
of a test bed that provides a scalable laboratory architecture to manipulate QoS parameters of
different data communications flowing through it. The test bed is used in various use cases that
were used to evaluate Cisco Performance Routing optimization capabilitiesin different scenarios.
KEYWORDS
Performance Routing, PfR, Quality of Service, QoS, Optimized Edge Routing
For More Details: https://airccse.org/journal/cnc/6414cnc02.pdf
Volume Link: https://airccse.org/journal/ijc2014.html
3. REFERENCES
[1] Information Sciences Institute, University of Southern California. RFC 791 INTERNET
PROTOCOL - DARPA INTERNET PROGRAM, PROTOCOL SPECIFICATION. s.l. : Internet
Engineering Task Force, 1981.
[2] Cisco Systems, Inc. Route Selection in Cisco Routers. Cisco. [Online] 2008. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/8651/21.pdf.
[3] D. Savage, et. al.: Enhanced Interior Gateway Routing Protocol. IETF. [Online] 2013 [Date:
25th of October 2013.] http://tools.ietf.org/html/draft-savage-eigrp-00.
[4] Teare Diane: Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide.
Indianapolis: Cisco Press, 2010. ISBN 1587058820.
[5] Cisco Systems, Inc. BGP Best Path Selection Algorithm. Cisco. [Online] 2012. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/13753/25.pdf.
[6] Doyle Jeff, Carroll Jennifer: CCIE Professional Development Routing TCP/IP Volume I.
Indianapolis: Cisco Press, 2006. ISBN 1587052024.
[7] D. Awduche, et. al.: RSVP-TE: Extensions to RSVP for LSP Tunnels. IETF. [Online] 2013
[Date: 11th of November 2013.] http://tools.ietf.org/html/rfc3209.
[8] X. Fu, et. al.: RSVP-TE extensions for Loss and Delay Traffic Engineering. IETF. [Online]
2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/draft-fuxh-mpls-delay-loss-rsvp-
te-ext02.
[9] Z. Seils. Defining SDN Overview of SDN Terminology & Concepts. Cisco. [Online] 2013.
[Date: 4 th of October 2013.] https://learningnetwork.cisco.com/docs/DOC-21946.
[10] Cisco Systems, Inc. onePK Chat and Demo at Cisco Live. SlideShare. [Online] 2012. [Date:
4th of October 2013.] http://www.slideshare.net/getyourbuildon/onepk-chat-and-demo-at-cisco-
live.
[11] S. Cadora. Hitchhiker's Guide to onePK. Cisco. [Online] 2013. [Date: 12th of September
2013.] https://learningnetwork.cisco.com/docs/DOC-22910.
[12] R. Trunk. Understanding Performance Routing (PfR). Chesapeake Netcraftsmen. [Online]
2009. [Date: 15th of November 2013.] http://netcraftsmen.net/archived-documents/c-mug-
articlearchive/7-20090922-cmug-understanding-performance-routing/file.html?limit=10.
[13] Kalita Hemanta Kumar, Nambiar Manoj K.: Designing WANem: A Wide Area Network Emulator
tool. Bangalore, 2011. ISBN 9780769546186.
R. Pandi Selvam, V.Palanisamy: An efficient cluster based approach for multi-sourcemulticast routing
protocol in mobile ad hoc networks, International Journal of Computer
4. GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND
EFFECTIVE SOLUTIONS
Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin
School of Computer Sciences, Universiti Sains Malaysia, Malaysia
ABSTRACT
Today, Global Positioning System (GPS) is widely used in almost every aspect of our daily life.
Commonly, users utilize the technology to track the position of a vehicle or an object of interest.
They also use it to safely navigate to the destination of their choice. As a result, there are countless
number of GPS based tracking application that has been developed. But, a main recurring issue that
exists among these applications are the inaccuracy of the tracking faced by users and this issue has
become a rising concern. Most existing research have examined the effects that the inaccuracy of
GPS have on users while others identified suitable methods to improve the accuracy of GPS based
on one or two factors. The objective of this survey paper is to identify the common factors that affects
the accuracy of GPS and identify an effective method which could mitigate or overcome most of
those factors. As part of our research, we conducted a thorough examination of the existing factors
for GPS inaccuracies. According to an initial survey that we have collected, most of the respondents
has faced some form of GPS inaccuracy. Among the common issues faced are inaccurate object
tracking and disconnection of GPS signal while using an application. As such, most of the
respondents agree that it is necessary to improve the accuracy of GPS. This leads to another objective
of this paper, which is to examine and evaluate existing methods as well as to identify the most
effective method that could improve the accuracy of GPS.
KEYWORDS
GPS, accuracy factors, improve accuracy, global positioning system
For More Details: https://aircconline.com/ijcnc/V8N2/8216cnc11.pdf
Volume Link: https://airccse.org/journal/ijc2016.html
5. REFERENCES
[1] Lin, J.Y, Yang, B.K., Tuan A.D., and Chen, H.C. (2013). “The Accuracy Enhancement of GPS
Track in Google Map”, 2013 Eighth International Conference on Broadband and Wireless
Computing, Communication and Applications, Compiegne, France. pp. 524-527.
[2] Iqbal, A., Mahmood. H., Farooq, U., Kabir, M.A. and Asad, M.U.. (2009). “An Overview of the
Factors Responsible for GPS Signal Error: Origin and Solution”, 2009 International Conference on
Wireless Networks and Information Systems, Shanghai, China. pp. 294-299.
[3] Bajaj, R., Ranaweera, S.L., Agrawal, D.P.. (2002). “GPS: Location-tracking Technology”,
Computer, vol.35, no..4, pp. 92-94.
[4] Huang, J.Y., and Tsai, C.H.. (2008). “Improve GPS Positioning Accuracy with Context
Awareness”, 2008 First IEEE International Conference on Ubi-Media Computing, Lanzhou, China,
pp. 94-99.
[5] Wubbena, G., Andreas, B., Seeber, G., Boder, V. and Hankemeier, P., (1996). “Reducing
Distance Dependant Errors for Real-Time Precise DGPS Applications by Establishing Reference
Station Networks”. In Proceedings of the 9th International Technical Meeting of the Satellite
Division of the Institute of Navigation (ION GPS-96)
[6] Enge, P., Walter, T., Pullen, S., Kee, C., Chao, Y. and Tsai, Y. (1996). “Wide area augmentation
of the global positioning system”. Proceedings of the IEEE, vol. 84 Aug. 1996, pp. 1063–1088.
[7] Qi, H. and Moore, J. B. (2002). “Direct Kalman Filtering Approach for GPS/INS Integration”,
IEEE Trans. Aerosp, Electron. System. vol. 38, no. 2, 2002, pp. 687-693.
[8] Malleswari, B.L., MuraliKrishna, I.V., Lalkishore, K., Seetha, M., Nagaratna, P. H. “The Role of
Kalman Filter in the Modelling of GPS Errors”, Journal of Theoretical and Applied Information
Technology, pp. 95-101.
[9] White, C.E., Bernstein, D. and Kornhauser, Alain L.. (2000). “Some map matching algorithms
for personal navigation assistants”. Transportation Research Part C, No. 8, 2000, pp. 91-108.
6. CONGESTION AND ENERGY AWARE MULTIPATH LOAD
BALANCING ROUTING FOR LLNS
Kala Venugopal and T G Basavaraju
Department of Computer Science and Engineering, Government Engineering College, Hassan,
Karnataka, India
ABSTRACT
The Internet of Things (IoT) is presently in its golden era with its current technological evolution
towards digital transformation. Low-power and Lossy Networks (LLNs) form the groundwork for
IoT, where the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is designated by
Internet Engineering Task Force as the benchmark protocol for routing. Although RPL, with its
unique capabilities, has addressed many IoT routing requirements, Load balancing and Congestion
control are the outliers. This paper builds on the RPL protocol and proposes a multipath Congestion
and Energy Aware RPL (CEARPL) that alleviates the load balancing and congestion concerns
associated with RPL and improves the network performance. For congestion avoidance, a
Congestion and Energy Aware Objective Function (CEA-OF) is suggested during parent selection
that considers multiple metrics like Child Count metric, Estimated Lifetime metric, and Queue
Occupancy metric, to equally distribute the traffic in LLNs. The Queue Occupancy metric is used
to detect congestion in the network, and a Multipath routing strategy is utilized to mitigate the
congestion in the network. A comparison of the performance of CEA-RPL was made against the
existing Objective Functions of RPL, OFO, and MRHOF, as well as COM-OF, utilizing Contiki
OS 3.0's Cooja emulator. CEA-RPL projected superior results with power consumption lowering
by 33%, endto-end delay decreasing by 30%, queue loss ratio reducing by 49%, and packet
receiving rate and network lifetime improving by 7% and 49%, on an average, respectively.
KEYWORDS
Congestion, Multipath routing, Internet of Things, Load balancing, Low-power Lossy Networks,
Objective function & RPL
For More Details: https://aircconline.com/ijcnc/V15N3/15323cnc05.pdf
Volume Link: https://airccse.org/journal/ijc2023.html
7. REFERENCES
[1] https://dataprot.net/statistics/iot-statistics/
[2] T. Winter et al., (2012) “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks”, IETF
RFC 6550.
[3] The Internet Engineering Task Force (IETF), 2010. .
[4] Routing Over Low Power and Lossy Networks (ROLL), 2004.
[5] O. Gaddour & A. Koubaa, (2012) “RPL in a nutshell: A survey”, Elsevier, Computer Networks,
Volume 56, Issue 14, Pages 3163-3178, doi: 10.1016/j.comnet.2012.06.016
[6] Doruk Pancaroglu, Sevil Sen, (2021) “Load balancing for RPL-based Internet of Things: A
review”, Ad Hoc Networks, Volume 116, 102491, ISSN 1570-8705,
https://doi.org/10.1016/j.adhoc.2021.102491.
[7] B. G. Mamoun Qasem, Ahmed Al-Dubai & Imed Romdhani, (2017) “Load balancing objective
function in RPL”, ROLL – WG INTERNET DRAFT, pp. 1–10
[8] C, Lim, (2019) "A Survey on Congestion Control for RPL-Based Wireless Sensor Networks",
Sensors 19, no. 11: 2567. https://doi.org/10.3390/s19112567
[9] P. Thubert, (2012) “Objective function zero for the routing protocol for low-power and lossy
networks (RPL)”, RFC 6552.
[10] O. Gnawali & P. Levis, (2012) “The Minimum Rank with Hysteresis Objective Function”, RFC
6719
[11] Ibrahim S. Alsukayti, (2020) “The support of multipath routing in IPv6-based internet of
things”, International Journal of Electrical and Computer Engineering (IJECE). 10. 2208.
10.11591/ijece.v10i2.pp2208-2220.
[12] J. Tsai & T. Moors, (2006) “A Review of Multipath Routing Protocols: From Wireless Ad Hoc
to Mesh Networks”, 17-18 July
[13] M. Geuzouri, N. Mbarek & A. Temar, (2020) A new way of achieving multipath routing in
wireless networks”, International Journal of Wireless and Mobile Computing. 18. 101.
10.1504/IJWMC.2020.10026464.
[14] A. Bhat & V. Geetha, (2017) "Survey on routing protocols for Internet of Things”, 7th
International Symposium on Embedded Computing and System Design (ISED), pp. 1-5, doi:
10.1109/ISED.2017.8303949.
[15] O. Iova, F. Theoleyre & T. Noel, (2015) “Exploiting multiple parents in RPL to improve both
the network lifetime and its stability", 2015 IEEE International Conference on Communications
(ICC), pp. 610-616, doi: 10.1109/ICC.2015.7248389.
[16] M. A. Lodhi, A. Rehman, M. M. Khan & F. B. Hussain, (2015) "Multiple path RPL for low
power lossy networks", 2015 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob),
8. pp. 279- 284, doi: 10.1109/APWiMob.2015.7374975.
[17] P. Levis, T. Clausen, J. Hui, O. Gnawali & J. Ko, (2011) “The trickle algorithm", March 2011,
IETF RFC 6206.
[18] Q. Le, T. Ngo-Quynh & T. Magedanz, (2014) "RPL-based multipath Routing Protocols for
Internet of Things on Wireless Sensor Networks", 2014 International Conference on Advanced
Technologies for Communications (ATC 2014), pp. 424-429, doi: 10.1109/ATC.2014.7043425.
[19] Radi, Marjan, Behnam Dezfouli, Kamalrulnizam Abu Bakar, & Malrey Lee, (2012) "Multipath
Routing in Wireless Sensor Networks: Survey and Research Challenges", Sensors 12, no. 1: 650685.
https://doi.org/10.3390/s120100650
[20] W. Lou, W. Liu & Y. Zhang, (2006) “Performance Optimization Using Multipath Routing in
Mobile Ad Hoc and Wireless Sensor Networks”, 10.1007/0-387-29026-5_5.
[21] Z. Wang, L. Zhang, Z. Zheng et al., (2018) “Energy balancing RPL protocol with multipath for
wireless sensor networks. Peer-to-Peer Networks”, Appl. 11, 1085–1100,
https://doi.org/10.1007/s12083-017-0585-1
[22] Oana Iova, Fabrice Theoleyre & Thomas Noel, (2015) “Using Multiparent Routing in RPL to
Increase the Stability and the Lifetime of the Network”, Ad Hoc Networks, Elsevier, 29,
10.1016/j.adhoc.2015.01.020, hal-01206380
[23] M. Lodhi, Abdul Rehman, Meer Khan, M. Asfand-E-yar & F. Hussain, (2017) “Transient
multipath routing protocol for low power and lossy networks”, KSII Transactions on Internet and
Information Systems,11, 2002-2019, 10.3837/tiis.2017.04.010.
[24] T. L. Jenschke, G. Z. Papadopoulos, R. -A. Koutsiamanis & N. Montavont, (2019) "Alternative
Parent Selection for Multi-Path RPL Networks", 2019 IEEE 5th World Forum on Internet of Things
(WF-IoT), pp. 533-538, doi: 10.1109/WF-IoT.2019.8767236.
[25] Tomas Lagos Jenschke, Remous-Aris Koutsiamanis, Georgios Papadopoulos, Nicolas
Montavont, (2021) “ODeSe: On-Demand Selection for multipath RPL networks”, Ad Hoc Networks,
Elsevier, 114, pp.102431. 10.1016/j.adhoc.2021.102431. hal-03122968v2f
[26] F. Kaviani & M. Soltanaghaei, (2022) “CQARPL: Congestion and QoS-aware RPL for IoT
applications under heavy traffic”, The Journal of Supercomputing, 78, 10.1007/s11227-02204488-2.
[27] H. -S. Kim, H. Kim, J. Paek & S. Bahk, (2017) "Load Balancing Under Heavy Traffic in RPL
Routing Protocol for Low Power and Lossy Networks", in IEEE Transactions on Mobile Computing,
vol. 16, no. 4, pp. 964-979, 1 April 2017, doi: 10.1109/TMC.2016.2585107.
[28] Kala Venugopal & T. G. Basavaraju, (2022) “A Combined Metric Objective Function for RPL
Load Balancing in Internet of Things”, International Journal of Internet of Things, Vol. 10 No. 1,
2022, pp. 22-31. doi: 10.5923/j.ijit.20221001.02.
[29] S. Wakatsuki, N. Komuro, H. Sekiya & S. Sakata, (2014) “Prolonging network lifetime for
6LoWPAN / RPL wireless sensor network using mobile sink with dynamic sojourn time”, 2014
[30] M. Aboubakar, M. Kellil, A. Bouabdallah & P. Roux, (2019) “Toward intelligent
9. reconfiguration of RPL networks using supervised learning”, 2019 Wireless Days (WD),
Manchester, United Kingdom, pp. 1-4, 2019, DOI: 10.1109/WD.2019.8734236.
[31] Mah Zaib Jamil, Danista Khan, Adeel Saleem, Kashif Mehmood & Atif Iqbal, (2019)
“Comparative performance analysis of RPL for low power and lossy networks based on different
objective functions”, International Journal of Advanced Computer Science and Applications, Vol.
10, No. 5, DOI: 10.14569/IJACSA.2019.0100524
[32] Contiki O.S and Cooja simulator, http://www.contiki-os.org/ [33] T. Zahariadis & P. Trakadas,
(2022) “Design guidelines for routing metrics composition in LLN”, ROLL Internet Draft, 2022
[34] Nesrine Khernane, Jean Couchot & Ahmed Mostefaoui, (2018) “Maximum network lifetime
with optimal power/rate and routing trade-off for wireless multimedia sensor networks”, Computer
Communications, Elsevier, 124, pp.1 – 16, hal-02182832
[35] Moteiv Corporation. Tmote sky: Datasheet (2006):
https://insense.cs.standrews.ac.uk/files/2013/04/tmote-sky-datasheet.pdf, Nov 13, 2006
[36] H.A.A. Al-Kashoash, H. Kharrufa, Y. Al-Nidawi. et al., (2019) “Congestion control in wireless
sensor and LoWPAN Networks: toward the Internet of Things”, Wireless Netw 25, 4493-4522,
https://doi.org/10.1007/s11276-018-1743-y
10. CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE
COMPUTING IN SOFTWARE-DEFINED WIDE AREA NETWORKS
Felipe Rodriguez Yaguache and Kimmo Ahola
5G Networks & Beyond, Technical Research Centre of Finland (VTT), Espoo, Finland
ABSTRACT
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology
adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the
opportunities for deploying edge-computing containerized applications running over SD-WAN are
vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the
lack of research focused on service discovery in these scenarios. In this article, an in-house service
discovery solution that works alongside Kubernetes’ master node for allowing improved traffic
handling and better user experience when running micro-services is developed. The service
discovery solution was conceived following a design science research approach. Our research
includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster
that allows us to deploy custom services and delimit the necessary characteristics of our in-house
solution. Also, the implementation's performance is tested based on the required times for updating
the discovery solution according to service updates. Finally, some conclusions and modifications are
pointed out based on the results, while also discussing possible enhancements.
KEYWORDS
SD-WAN, Edge computing, Virtualization, Kubernetes, Containers, Services
For More Details: https://aircconline.com/ijcnc/V11N5/11519cnc07.pdf
Volume Link: https://airccse.org/journal/ijc2019.html
11. REFERENCES
[1] Padhy, R., Patra, M., Satapathy, S. Virtualization Techniques & Technologies: State-of-The-Art.
Journal of Global Research in Computer Science, 2018, vol. 2, nro.12. ISSN: 2229-371X. Available
https://www.researchgate.net/publication/264884756_VIRTUALIZATION_TECHNIQUES_TEC
HN OLOGIES_STATE-OF-THE-ART.
[2] Horrel, J., Karimullah, A. SD-WAN Set to Transform WAN in Australia. IDC Custom Solutions,
Framingham, 2017.
[3] Jakma, P. Quagga Routing Software Suite. Quagga Routing Suite. Visited: 15.02.2019. Available
at: https://www.quagga.net/
[4] Open Network Operating System (ONOS). ONOS features. Open Networking Foundation & The
Linux Foundation, San Francisco, 2019. Visited 15.02.2019. Available at:
https://onosproject.org/features/
[5] Open Networking Foundation. Atomix. Open Networking Foundation. Visited 15.02.2019.
Available at: https://atomix.io/docs/latest/user-manual/introduction/what-is-atomix/
[6] Kubernetes. DNS for services and pods. The Linux Foundation, San Francisco, 2019. Visited
15.02.2019. Available at: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/
[7] Kubernetes. Access services running on clusters. The Linux Foundation, San Francisco, 2019.
Visited 15.02.2019. Available at: https://kubernetes.io/docs/tasks/administer-cluster/access-cluster-
services/
[8] MetalLB Metal Load-Balancer (MetalLB). Google. Visited 15.02.2019. Available at:
https://metallb.universe.tf/
[9] Stanford-Clark, A., Nipper, A. Message Queuing Telemetry Transport (MQTT). Organization
for the Advancement of Structured Information Standards (OASIS). Visited 15.02.2019. Available
at: http://mqtt.org
[10] Jarraya, Y., Madi, T., Debbabi, M., 2014. A Survey and a Layered Taxonomy of Software
Defined Networking. IEEE Communications Surveys & Tutorials 16,1955–1980. URL:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6805151, doi:
10.1109/COMST.2014.2320094.
[11] Kreutz, D., Ramos, F.M.V. , Esteves Verissimo, P., Esteve Rothenberg, C., Azodolmolky, S.,
Uhlig, S., 2015. Software-Defined Networking: A Comprehensive Survey. Proceedings of the IEEE
103,14– 76. URL: http://ieeexplore.ieee.org/document/6994333/,
doi:10.1109/JPROC.2014.2371999.
[12] Taleb, T., Samdanis, K., Mada, B., Flinck, H., Dutta, S., & Sabella, D. (2017). On Multi-Access
Edge Computing:A Survey of the Emerging 5G Network Edge Cloud Architecture and
Orchestration. IEEE Communications Surveys and Tutorials, 19(3), 1657-1681. [7931566].
https://doi.org/10.1109/COMST.2017.2705720
[13] Eugene, TS., Zhang, Hui. Predicting Internet Network Distance with Coordinates-Based
12. Approaches. Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and
Communications Societies, 2002, DOI: 10.1109/INFCOM.2002.1019258, ISSN: 0743-166X.
Available at: https://www.cs.rice.edu/~eugeneng/papers/INFOCOM02.pdf
[14] Miao, Rui., Hongyi, Zeng., Changhoon, Kim., Jeongkeun, Lee., Minlan, Yu. SilkRoad: Making
Stateful Layer-4 Load Balancing Fast andCheap Using Switching ASICs. Association for Computing
Machinery’s Special Interest Group on Data Communications (SIGCOMM), 2017, DOI:
10.1145/3098822.3098824, ISBN: 78-1-4503-4653-5/17/08. Available at:
https://eastzone.bitbucket.io/paper/sigcomm17-silkroad.pdf
[15] Changhoon, Kim., Sivaraman, Anirudh., Katta, Naga., Bas, Antonin., Wobker, Lawrence J. In-
band Network Telemetry via Programmable Dataplanes. 2015, Visited 12.05.2019. Available at:
https://pdfs.semanticscholar.org/a3f1/9dc8520e2f42673be7cbd8d80cd96e3ec0c1.pdf?_ga=2.76525
46 8.802012735.1559031914-713298922.1559031914
[16] Ranganathan, R. A highly available and scalable microservice architecture for access
management. Aalto University, 2018. Available at:
https://aaltodoc.aalto.fi/bitstream/handle/123456789/34401/master_Ranganathan_Rajagopalan_201
8. pdf?sequence=1&isAllowed=y
[17] Rodriguez Yaguache F., Ahola K. Enabling Edge Computing Using Container Orchestration and
Software Defined Wide Area Networks. 9th International Conference on Computer Science, Engineering and
Applications (CCSEA 2019), 353-372. ISBN: 978-1-925953-05-3. Available at:
http://aircconline.com/csit/papers/vol9/csit90930.pdf
13. PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI
MODELS AS MQTT SERVERS AND CLIENTS
Faiza Al-Salti1
, N. Alzeidi2
, Khaled Day2
, Abderezak Touzene2
, 1
Sultan Qaboos Comprehensive
Cancer Care and Research Centre, Oman, 2
Sultan Qaboos University, Oman
5G Networks & Beyond, Technical Research Centre of Finland (VTT), Espoo, Finland
ABSTRACT
This paper studies the impact of different localization schemes on the performance of location-based
routing for UWSNs. Particularly, LSWTS and 3DUL localization schemes available in the literature
are used to study their effects on the performance of the ERGR-EMHC routing protocol. First, we
assess the performance of two localization schemes by measuring their localization coverage,
accuracy, control packets overhead, and required localization time. We then study the performance
of the ERGR-EMHC protocol using location information provided by the selected localization
schemes. The results are compared with the performance of the routing protocol when using exact
nodes’ locations. The obtained results show that LSWTS outperforms 3DUL in terms of localization
accuracy by 83% and localization overhead by 70%. In addition, the results indicate that the
localization error has a significant impact on the performance of the routing protocol. For instance,
ERGR-EMHC with LSWTS is better in delivering data packets by an average of 175% compared to
3DUL.
KEYWORDS
Underwater wireless sensor networks (UWSNs), localization, ranging localization methods,
localization error, location-based routing
For More Details: https://aircconline.com/ijcnc/V15N2/15223cnc01.pdf
Volume Link: https://airccse.org/journal/ijc2023.html
14. REFERENCES
[1] Y. Wang, “Three-Dimensional Wireless Sensor Networks: Geometric Approaches for Topology
and Routing Design,” in The Art of Wireless Sensor Networks, H. M. Ammari, Ed. Berlin,
Heidelberg: Springer Berlin Heidelberg, 2014, pp. 367–409.
[2] H. P. Tan, R. Diamant, W. K. G. Seah, and M. Waldmeyer, “A survey of techniques and
challenges in underwater localization,” Ocean Engineering, vol. 38, no. 14–15, pp. 1663–1676,
October 2011, doi: 10.1016/J.OCEANENG.2011.07.017.
[3] F. Al-Salti, N. Alzeidi, and K. Day, “LOCALIZATION SCHEMES FOR UNDERWATER
WIRELESS SENSOR NETWORKS: SURVEY,” International journal of Computer Networks &
Communications, vol. 12, no. 3, pp. 113–130, May 2019.
[4] M. Erol, L. F. M. Vieira, and M. Gerla, “AUV-Aided Localization for Underwater Sensor
Networks,” in International Conference on Wireless Algorithms, Systems and Applications (WASA
2007), 1-3 August 2007, pp. 44–54, Chicago, IL, USA.
[5] M. Beniwal, R. P. Singh, and A. Sangwan, “A Localization Scheme for Underwater Sensor
Networks Without Time Synchronization,” Wireless Personal Communications, vol. 88, no. 3, pp.
537–552, June 2016.
[6] M. Isik and O. Akan, “A three dimensional localization algorithm for underwater acoustic sensor
networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 9, pp. 4457–4463,
September 2009.
[7] Z. Zhou, Z. Peng, J.-H. Cui, Z. Shi, and A. Bagtzoglou, “Scalable Localization with Mobility
Prediction for Underwater Sensor Networks,” IEEE Transactions on Mobile Computing, vol. 10, no.
3, pp. 335–348, March 2011.
[8] Y. Zhou, B. Gu, K. Chen, J. Chen, and H. Guan, “An range-free localization scheme for large
scale underwater wireless sensor networks,” Journal of Shanghai Jiaotong University (Science), vol.
14, no. 5, pp. 562–568, October 2009.
[9] J. Luo and L. Fan, “A Two-Phase Time Synchronization-Free Localization Algorithm for
Underwater Sensor Networks,” Sensors, vol. 17, no. 12, p. 726, March 2017.
[10] K. Day, F. Al-Salti, A. Touzene, and N. Alzeidi, “AN EFFICIENT DATA COLLECTION
PROTOCOL FOR UNDERWATER WIRELESS SENSOR NETWORKS,” International Journal of
Computer Networks & Communications (IJCNC), vol. 12, no. 5, pp. 1–15, September 2020, doi:
10.5121/ijcnc.2020.12501.
[11] P. Xie, J.-H. Cui, and L. Lao, VBF: Vector-Based Forwarding Protocol for Underwater Sensor
Networks, in Proceedings of IFIP Networking'06, Coimbra, Portugal, 2006, pp. 1216–1221.
[12] F. Al Salti, N. Alzeidi, and B. Arafeh, EMGGR: An Energy-Efficient Multipath Grid-Based
Geographic Routing Protocol for Underwater Wireless Sensor Networks, Wireless Networks,
volume 23, no. 4, pp. 1301–1314, May 2017. International Journal of Computer Networks &
Communications (IJCNC) Vol.15, No.2, March 2023 18
15. [13] N. Javaid, M. Shah, A. Ahmad, M. Imran, M. Khan, and A. Vasilakos, “An Enhanced Energy
Balanced Data Transmission Protocol for Underwater Acoustic Sensor Networks,” Sensors, vol. 16,
no. 4, p. 487, April 2016, doi: 10.3390/s16040487.
[14] F. Al-Salti, N. Alzeidi, K. Day, and A. Touzene, “An efficient and reliable grid-based routing
protocol for UWSNs by exploiting minimum hop count,” Computer Networks, vol. 162, p. 106869,
October 2019.
[15] B. Peng and A. H. Kemp, “Energy-efficient geographic routing in the presence of localization
errors,” Computer Networks, vol. 55, no. 3, pp. 856–872, February 2011.
[16] M. Kadi and I. Alkhayat, “The effect of location errors on location based routing protocols in
wireless sensor networks,” Egyptian Informatics Journal, vol. 16, no. 1, pp. 113–119, March 2015.
[17] R. C. Shah, A. Wolisz, and J. M. Rabaey, “On the performance of geographical routing in the
presence of localization errors,” in IEEE International Conference on Communications, 2005. ICC
2005, 16-20 May 2005, vol. 5, pp. 2979–2985, Seoul, South Korea.
[18] D. Son, A. Helmy, and B. Krishnamachari, “The effect of mobility-induced location errors on
geographic routing in mobile ad hoc sensor networks: analysis and improvement using mobility
prediction,” IEEE Transactions on Mobile Computing, vol. 3, no. 3, pp. 233–245, July 2004.
[19] Erol, L. F. M. Vieira, and M. Gerla, “Localization with Dive’N’Rise (DNR) beacons for
underwater acoustic sensor networks,” in Proceedings of the second workshop on Underwater
networks - WuWNet ’07, 14 September 2007, pp. 97-100, Montreal, Quebec, Canada.
[20] V. Chandrasekhar and W. Seah, “An Area Localization Scheme for Underwater Sensor
Networks,” in OCEANS 2006 - Asia Pacific, 16-19 May 2006, pp. 1–8, Singapore, Singapore.
[21] A. M. Abu-Mahfouz and G. P. Hancke, “ns-2 extension to simulate localization system in
wireless sensor networks,” in IEEE Africon ’11, 13-15 September 2011, pp. 1–7, Livingstone,
Zambia.
[22] M. Erol-Kantarci, S. Oktug, L. Vieira, and M. Gerla, “Performance evaluation of distributed
localization techniques for mobile underwater acoustic sensor networks,” Ad Hoc Networks, vol. 9,
no. 1, pp. 61–72, January 2011.
[23] Z. Zhou, J.-H. Cui, and S. Zhou, “Efficient localization for large-scale underwater sensor
networks,” Ad Hoc Networks, vol. 8, no. 3, pp. 267–279, May 2010.
[24] Z. Qiang, Z. Senlin, and L. Meiqin, “A clock synchronization independent localization scheme for
underwater wireless sensor networks,” in Proceedings of the Eighth ACM International Conference on
Underwater Networks and Systems - WUWNet ’13, 11-13 November 2013, pp. 1–5, Kaohsiung, Taiwan.
[25] F. Al-Salti, N. Alzeidi, K. Day and A. Touzene, “Multiple Sink Placement Strategy for Underwater
Wireless Sensor Networks,” Proceedings of the International Symposium on Networks, Computers and
Communications (ISNCC), 19-21 June 2018, Rome, Italy.
[26] F. Al-Salti, A. N, K. Day, B. Arafeh, and A. Touzene, “Grid Based Priority Routing Protocol for
UWSNs,” International journal of Computer Networks & Communications, vol. 9, no. 6, pp. 01–20,
December 2017, doi: 10.5121/ijcnc.2017.9601.
16. An IDE for Android Mobile Phones with Extended Functionalities Using Best
Developing Methodologies
Sakila Banu1 and Kanakasabapathi Vijayakumar2
1
College of Computer Science and Information Technology, Taif University, Taif, Saudi Arabia
2
Department of Mathematics,Anna University,Chennai,India.
ABSTRACT
Google's Android platform is a widely anticipated open source operating system for mobile phones. The
mobile phone landscape changed with the introduction of smart phones running Android, a platform marketed
by Google. Android phones are the first credible threat to the iPhone market. Google not only target the
consumers of iPhone, it also aimed to win the hearts and minds of mobile application developers. As a Result,
application developers are developing new software’s everyday for Android Smart Phones and are competing
with the previous in Market. But so far there is no Specific IDE developed to create mobile application easily
by just Drag and Drop method to make even the non-programmers to develop application for the smart phones.
This paper presents an IDE with Extended Functionalities for Developing Mobile Applications for Android
Mobile Phones using the Best developing Methodologies. The New IDE comes with the Extended
Functionalities like Executing the created Application, Previewing the Application Created, Roll Back and
Cancel Functions with the newly added Icons like Execute, Preview, Roll Back and Cancel Respectively.
Another important feature of this paper is that the IDE is developed using the Best Developing Methodologies
by presenting the possible methods for developing the IDE using JAVA SWING GUI Builder in Android
ADT plug-in. The developed IDE is tested using the Android Runtime Emulator in Eclipse Framework.
KEYWORDS
IDE-Integrated Development Environment, GUI-Graphical User Interface, ADT-Android
Development Tool.
For More Details: https://airccse.org/journal/cnc/5413cnc11.pdf
Volume Link: https://airccse.org/journal/ijc2013.html
17. REFERENCES
[1] Understanding Android Security by Enck, W.; Ongtang, M.; McDaniel, P.; Pennsylvania State Univ.,
University Park, PA
[2] Android: Changing the Mobile Landscap by Margaret Butler from
http://developerlife.com/tutorials/?p=289
[3] Android – How to build a service-enabled Android app – Part 1/3 UI Posted June 4th, 2008 by
Nazmul
[4] Android-An Open Handset Alliance Project. http://code.google.com/android/.
[5] Bloom S.Book, M.Gruhn, V.Hrushchak, R.Kohler, A.(2008). Write Once Run Anywhere. A survey of
Mobile Runtime Environments. Proceedings of the 3rd International Conference On Grid and Pervasive
Computing(GPC2008):132-137
[6] Holzer, A.Ondrus,J.(2009). Trends in Mobile Application Development. Proceedings of the 2nd
International Conference Mobile Wireless Middleware, Operating Systems and Applications(Mobile ware
2009):55-64
[7] http://www.vogella.com/articles/AndroidDragAndDrop/article.html
[8] http://javapapers.com/android/android-drag-and-drop/
[9] http://developer.android.com/guide/topics/ui/drag-drop.html
[10] http://en.wikipedia.org/wiki/App_Inventor_for_Android
[11] JForm Designer from http://www.formdev.com/jformdesigner/
[12] http://beta.appinventor.mit.edu/about/moreinfo/
[13] Jigloo GUI Builder ,http://www.ibm.com/developerworks/opensource/tutorials/
18. ITA: THE IMPROVED THROTTLED ALGORITHM OF LOAD
BALANCING ON CLOUD COMPUTING
Hieu N. Le1
and Hung C. Tran2
1
Department of Information Technology, Ho Chi Minh City Open University, Ho Chi Minh City,
Vietnam
2
Posts and Telecommunication Institute of Technology, Ho Chi Minh City, Vietnam
ABSTRACT
Cloud computing makes the information technology industry boom. It is a great solution for businesses who
want to save costs while ensuring the quality of service. One of the key issues that make cloud computing
successful is the load balancing technique used in the load balancer to minimize time costs and optimize costs
economically. This paper proposes an algorithm to enhance the processing time of tasks so that it can help
improve the load balancing capacity on cloud computing. This algorithm, named as Improved Throttled
Algorithm (ITA), is an improvement of Throttled Algorithm. The paper uses the Cloud Analyst tool to
simulate. The selected algorithms are used to compare: Equally Load, Round Robin, Throttled and TMA. The
simulation results show that the proposed algorithm ITA has improved the processing time of tasks, time spent
processing requests and reduced the cost of Datacenters compared to the selected popular algorithms as above.
The improvement of ITA is because of selecting virtual machines in an index table that is available but in
order of priority. It helps response times and processing times remain stable, limits the idling resources, and
cloud costs are minimized compared to selected algorithms
KEYWORDS
Cloud Computing, Load Balancing, Processing Time, Improved Throttle Algorithm.
For More Details: https://aircconline.com/ijcnc/V14N1/14122cnc02.pdf
Volume Link: https://airccse.org/journal/ijc2022.html
19. REFERENCES
[1] S. Kemp, “Digital 2019: global internet use accelerates,” 30 January 2019. [Online]. Available:
https://wearesocial.com/blog/2019/01/digital-2019-global-internet-use-accelerates.
[2] Soni Gulshan and Mala Kalra, “A novel approach for load balancing in cloud datacenter,” Advance
Computing Conference (IACC), 2014 IEEE International, 2014.
[3] Y. Wen and C. Chang, "Load balancing job assignment for cluster-based cloud computing," 2014 Sixth
International Conference on Ubiquitous and Future Networks (ICUFN), pp. 199-204, 2014.
[4] K. Verma, "Cloud Computing and its Types," Cloudkul, [Online]. Available:
https://cloudkul.com/blog/what-is-cloud-computing/.
[5] Calheiros, R.N., Ranjan, R., Beloglazov, A., De Rose, C.A.F. and Buyya, R., ""CloudSim: atoolkit for
modeling and simulation of cloud computing environments and evaluation of resource provisioning
algorithms," Journal of Software: Practice and Experience, vol. 41, pp. 23-50, 2010.
[6] D. C.Marinescu, Cloud Computing (Second edition), Elsevier, 2018.
[7] Bui Thanh Khiet, Nguyen Thi Nguyet Que, Ho Dac Hung, Pham Tran Vu, Tran Cong Hung, "A Fair
VM Allocation for Cloud Computing based on Game Theory," Proceedings of the 10th National
Conference on Fundamental and Applied Information Technology Research (FAIR'10), 2017.
[8] Bhaskar, R., Deepu, S.R., Shylaja, B.S., "Dynamic allocation method for efficient load balancing in
virtual machines for cloud computing," Advanced Computing An International Journal, vol. 3, 2012.
[9] Rajwinder Kaur, Pawan Luthra, "Load Balancing in Cloud Computing," Recent Trends in Information,
Telecommunication and Computing, Association of Computer Electronics and Electrical Engineers, pp.
374-381, 2014.
[10] Bhathiya Wickremasinghe and Assoc Prof and Rajkumar Buyya Contents, "Cloud Analyst: A
CloudSim- based Tool for Modelling and Analysis of Large Scale Cloud Computing Environments," 2010.
[11] D. Asir Antony Gnana Singh, R. Priyadharshini and E. Jebamalar Leavline, "Analysis of Cloud
Environment Using CloudSim," in Springer.
[12] Klaithem Al Nuaimi, Nader Mohamed, Mariam Al Nuaimi and Jameela Al-Jaroodi, "A Survey of
Load Balancing in Cloud Computing: Challenges and Algorithms," Second Symposium on Network Cloud
Computing and Applications, 2012.
[13] Abhay Kumar Agarwal and Atul Raj, "A New Static Load Balancing Algorithm in Cloud Computing,"
International Journal of Computer Applications, vol. 132, p. 0975 – 8887, 2015.
[14] N.Swarnkar, A. K. Singh and Shankar, "A Survey of Load Balancing Technique in Cloud Computing,"
International Journal of Engineering Research & Technology(IJERT), vol. 2, pp. 800- 804, 2013.
[15] S. S. Moharana, R. D. Ramesh and D. Powar, "Analysis of Load Balancers in Cloud Computing,"
International Journal of Computer Science and Engineering (IJCSE), vol. 2, pp. 101-108, 2013.
[16] Vikas Kumar, Shiva Prakash, "Modified Active Monitoring Load Balancing Algorithm in Cloud
Computing Environment," International Journal for Scientific Research and Development (IJSRD), vol. 2,
pp. 132-135, 2014.
[17] A. Makroo and D. Dahiya, "An efficient VM load balancer for Cloudm," in The 2014 International
Conference on Applied Mathematics, Computational Science & Engineering (AMCSE 2014), Varna, 2014.
20. [18] Rakesh Kumar Mishra, Sreenu Naik Bhukya, "Service Broker Algorithm for CloudAnalyst,"
International Journal of Computer Science and Information Technology (IJCSIT), pp. 3957-3962, 2017.
[19] Er. Imtiyaz Ahmad , Er. Shakeel Ahmad, Er. Sourav Mirdha, "An Enhanced Throttled Load Balancing
Approach for Cloud Environment," International Research Journal of Engineering and Technology
(IRJET), 2017.
[20] Nguyen Xuan Phi, Tran Cong Hung, "LOAD BALANCING ARGORITHM TO IMPROVE
REPSPONSE TIME ON CLOUD COMPUTING," International Journal on Cloud Computing: Services
and Architecture (IJCCSA), 2017.
[21] Nguyen Xuan Phi, Cao Trung Tin, Luu Nguyen Ky Thu, Tran Cong Hung, "Proposed Load Balancing
Algorithm to Reduce Response time and Processing time on Cloud Computing," International Journal of
Computer Networks & Communications (IJCNC), 2018.
[22] Gupta, S., Dixit, N., & Yadav, P., "An Advanced Throttled (ATH) Algorithm and Its Performance
Analysis with Different Variants of Cloud Computing Load Balancing Algorithm," Communication,
Networks and Computing, pp. 385-399, 2018.
[23] Tran Cong Hung, Phan Thanh Hy, Le Ngoc Hieu, Nguyen Xuan Phi, "MMSIA: Improved Max-Min
Scheduling Algorithm for Load Balancing on Cloud Computing," Proceedings of The 3rd International
Conference on Machine Learning and Soft Computing (CMLSC 2019), pp. 60-64, 2019.
[24] Moses, A. K., Joseph, A., Oluwaseun, O. R., Misra, S., & Emmanuel, A., "APPLICABILITY OF
MMRR LOAD BALANCING ALGORITHM IN CLOUD COMPUTING," International Journal of
Computer Mathematics: Computer Systems Theory, 2020.
[25] B. P. Mulla, C. Rama Krishna, and R. Kumar Tickoo, “Load balancing algorithm for efficient VM
allocation in heterogeneous cloud,” International Journal of Computer Networks & Communications
(IJCNC), vol. 12, no. 1, pp. 83–96, 2020.
[26] A. S. a. P. A. T. J. B. Durga Devi, “Modified adaptive neuro fuzzy inference system based load
balancing for virtual machine with security in cloud computing environment,” Journal of Ambient
Intelligence and Humanized Computing, vol. 12, no. 3, pp. 3869-3876, 2021.
[27] N. Z. J. a. A. A. D. A. Shafiq, “Load balancing techniques in cloud computing environment: A review,”
Journal of King Saud University – Computer and Information Sciences, 2021.
21. A DEEP LEARNING TECHNIQUE FOR WEB PHISHING DETECTION
COMBINED URL FEATURES AND VISUAL SIMILARITY
Saad Al-Ahmadi1
and Yasser Alharbi 2
1
College of Computer and Information Science, Computer Science Department, King Saud
University, Riyadh, Saudi Arabia
2
College of Computer and Information Science, Computer Engineering Department, King Saud
University, Riyadh, Saudi Arabia
ABSTRACT
The most popular way to deceive online users nowadays is phishing. Consequently, to increase
cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper,
we propose an approach that rely on websites image and URL to deals with the issue of phishing
website recognition as a classification challenge. Our model uses webpage URLs and images to
detect a phishing attack using convolution neural networks (CNNs) to extract the most important
features of website images and URLs and then classifies them into benign and phishing pages. The
accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the
proposed model in detecting a web phishing attack.
KEYWORDS
Phishing detection, URL, visual similarity, deep learning, convolution neural network.
For More Details: https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf
Volume Link: https://airccse.org/journal/ijc2020.html
22. REFERENCES
[1] H. Thakur, “Available Online at www.ijarcs.info A Survey Paper On Phishing Detection,” vol.
7, no. 4, pp. 64–68, 2016.
[2] G. Varshney, M. Misra, and P. K. Atrey, “A survey and classification of web phishing detection
schemes,” Security and Communication Networks. 2016, doi: 10.1002/sec.1674.
[3] E. S. Aung, T. Zan, and H. Yamana, “A Survey of URL-based Phishing Detection,” pp. 1–8,
2019, [Online]. Available: https://db-event.jpn.org/deim2019/post/papers/201.pdf.
[4] S. Nakayama, H. Yoshiura, and I. Echizen, “Preventing false positives in content-based phishing
detection,” in IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding
and Multimedia Signal Processing, 2009, doi: 10.1109/IIH-MSP.2009.147.
[5] A. K. Jain and B. B. Gupta, “Phishing detection: Analysis of visual similarity based approaches,”
Security and Communication Networks. 2017, doi: 10.1155/2017/5421046.
[6] A. Khan, A. Sohail, U. Zahoora, and A. S. Qureshi, “A Survey of the Recent Architectures of
Deep Convolutional Neural Networks,” pp. 1–68, 2019, doi: 10.1007/s10462-020-09825-6.
[7] J. Mao et al., “Phishing page detection via learning classifiers from page layout feature,” Eurasip
J. Wirel. Commun. Netw., 2019, doi: 10.1186/s13638-019-1361-0.
[8] I. F. Lam, W. C. Xiao, S. C. Wang, and K. T. Chen, “Counteracting phishing page polymorphism:
An image layout analysis approach,” in Lecture Notes in Computer Science (including subseries
Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2009, doi:
10.1007/978-3-642- 02617-1_28.
[9] T. C. Chen, T. Stepan, S. Dick, and J. Miller, “An anti-phishing system employing diffused
information,” ACM Trans. Inf. Syst. Secur., vol. 16, no. 4, 2014, doi: 10.1145/2584680.
[10] A. S. Bozkir and E. A. Sezer, “Use of HOG descriptors in phishing detection,” in 4th
International Symposium on Digital Forensics and Security, ISDFS 2016 - Proceeding, 2016, doi:
10.1109/ISDFS.2016.7473534.
[11] F. C. Dalgic, A. S. Bozkir, and M. Aydos, “Phish-IRIS: A New Approach for Vision Based
Brand Prediction of Phishing Web Pages via Compact Visual Descriptors,” ISMSIT 2018 - 2nd Int.
Symp. Multidiscip. Stud. Innov. Technol. Proc., 2018, doi: 10.1109/ISMSIT.2018.8567299.
[12] K. L. Chiew, E. H. Chang, S. N. Sze, and W. K. Tiong, “Utilisation of website logo for phishing
detection,” Comput. Secur., 2015, doi: 10.1016/j.cose.2015.07.006.
[13] K. L. Chiew, J. S. F. Choo, S. N. Sze, and K. S. C. Yong, “Leverage Website Favicon to Detect
Phishing Websites,” Secur. Commun. Networks, 2018, doi: 10.1155/2018/7251750.
[14] Y. Zhou, Y. Zhang, J. Xiao, Y. Wang, and W. Lin, “Visual similarity based anti-phishing with
the combination of local and global features,” in Proceedings - 2014 IEEE 13th International
Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014,
2015, doi: 10.1109/TrustCom.2014.28.
23. [15] A. P. E. Rosiello, E. Kirda, C. Kruegel, and F. Ferrandi, “A layout-similarity-based approach
for detecting phishing pages,” in Proceedings of the 3rd International Conference on Security and
Privacy in Communication Networks, SecureComm, 2007, doi: 10.1109/SECCOM.2007.4550367.
[16] J. Mao, P. Li, K. Li, T. Wei, and Z. Liang, “BaitAlarm: Detecting phishing sites using similarity
in fundamental visual features,” in Proceedings - 5th International Conference on Intelligent
Networking and Collaborative Systems, INCoS 2013, 2013, doi: 10.1109/INCoS.2013.151.
[17] S. Haruta, H. Asahina, and I. Sasase, “Visual Similarity-Based Phishing Detection Scheme
Using Image and CSS with Target Website Finder,” in 2017 IEEE Global Communications
Conference, GLOBECOM 2017 - Proceedings, 2017, doi: 10.1109/GLOCOM.2017.8254506.
[18] H. Zhang, G. Liu, T. W. S. Chow, and W. Liu, “Textual and visual content-based anti-phishing:
A Bayesian approach,” IEEE Trans. Neural Networks, 2011, doi: 10.1109/TNN.2011.2161999.
[19] E. Medvet, E. Kirda, and C. Kruegel, “Visual-similarity-based phishing detection,” Proc. 4th
Int. Conf. Secur. Priv. Commun. Networks, Secur., no. September 2008, 2008, doi:
10.1145/1460877.1460905.
[20] S. G. Selvaganapathy, M. Nivaashini, and H. P. Natarajan, “Deep belief network based detection
and categorization of malicious URLs,” Inf. Secur. J., vol. 27, no. 3, pp. 145–161, 2018, doi:
10.1080/19393555.2018.1456577.
[21] Y. Ding, N. Luktarhan, K. Li, and W. Slamu, “A keyword-based combination approach for
detecting phishing webpages,” Comput. Secur., vol. 84, pp. 256–275, 2019, doi:
10.1016/j.cose.2019.03.018.
[22] H. huan Wang, L. Yu, S. wei Tian, Y. fang Peng, and X. jun Pei, “Bidirectional LSTM Malicious
webpages detection algorithm based on convolutional neural network and independent recurrent
neural network,” Appl. Intell., vol. 49, no. 8, pp. 3016–3026, 2019, doi: 10.1007/s10489-019-01433-
4.
[23] M. Zouina and B. Outtaj, “A novel lightweight URL phishing detection system using SVM and
similarity index,” Human-centric Comput. Inf. Sci., vol. 7, no. 1, pp. 1–13, 2017, doi:
10.1186/s13673-017-0098-1.
[24] S. Parekh, D. Parikh, S. Kotak, and S. Sankhe, “A New Method for Detection of Phishing
Websites: URL Detection,” Proc. Int. Conf. Inven. Commun. Comput. Technol. ICICCT 2018, no.
Icicct, pp. 949–952, 2018, doi: 10.1109/ICICCT.2018.8473085.
[25] H. Le, Q. Pham, D. Sahoo, and S. C. H. Hoi, “URLNet: Learning a URL Representation with
Deep Learning for Malicious URL Detection,” no. i, 2018, [Online]. Available:
http://arxiv.org/abs/1802.03162.
[26] J. Saxe and K. Berlin, “eXpose: A Character-Level Convolutional Neural Network with
Embeddings For Detecting Malicious URLs, File Paths and Registry Keys,” 2017, [Online].
Available: http://arxiv.org/abs/1702.08568.
[27] K. Shima et al., “Classification of URL bitstreams using bag of bytes,” 21st Conf. Innov. Clouds,
Internet Networks, ICIN 2018, pp. 1–5, 2018, doi: 10.1109/ICIN.2018.8401597.
24. [28] R. Vinayakumar, K. P. Soman, and P. Poornachandran, “Evaluating deep learning approaches
to characterize and classify malicious URL’s,” J. Intell. Fuzzy Syst., vol. 34, no. 3, pp. 1333–1343,
2018, doi: 10.3233/JIFS-169429.
[29] O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection
from URLs,” Expert Syst. Appl., vol. 117, pp. 345–357, 2019, doi: 10.1016/j.eswa.2018.09.029.
[30] W. Wang, F. Zhang, X. Luo, and S. Zhang, “PDRCNN: Precise Phishing Detection with
Recurrent Convolutional Neural Networks,” Secur. Commun. Networks, 2019, doi:
10.1155/2019/2595794.
[31] S. Khan, H. Rahmani, S. A. A. Shah, and M. Bennamoun, “A Guide to Convolutional Neural
Networks for Computer Vision,” Synth. Lect. Comput. Vis., 2018, doi:
10.2200/s00822ed1v01y201712cov015.
[32] V. Karthikeyani and S. Nagarajan, “Machine Learning Classification Algorithms to Recognize
Chart Types in Portable Document Format (PDF) Files,” Int. J. Comput. Appl., 2012, doi:
10.5120/4789- 6997.
[33] M. A. Adebowale, K. T. Lwin, and M. A. Hossain, “Deep learning with convolutional neural
network and long short-term memory for phishing detection,” 2019 13th Int. Conf. Software,
Knowledge, Inf. Manag. Appl. Ski. 2019, no. March 2019, doi:
10.1109/SKIMA47702.2019.8982427.
[34] C. Opara, B. Wei, and Y. Chen, “HTMLPhish: Enabling Phishing Web Page Detection by
Applying Deep Learning Techniques on HTML Analysis,” no. October 2018, 2019, [Online].
Available: http://arxiv.org/abs/1909.01135.
25. IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE
LIFETIME OF WIRELESS SENSOR NETWORKS
D. Naga Ravikiran1
and C.G. Dethe2
1
Research Scholar, ECE Department, Priyadarshini Institute of Engineering and Technology
(PIET), Nagpur, Maharashtra.
2
Director, UGC-Human Resource Development Centre, RTM Nagpur University, Nagpur, India
ABSTRACT
Wireless sensor network (WSN) brings a new paradigm of real-time embedded systems with
limited computation, communication, memory, and energy resources that are being used fora huge
range of applications. Clustering in WSNs is an effective way to minimize the energy consumption
of sensor nodes. In this paper improvements in various parameters are compared for three different
routing algorithms. First, it is started with Low Energy Adaptive Cluster Hierarchy (LEACH)which
is a famed clustering mechanism that elects a CH based on the probability model. Then, work
describes a Fuzzy logic system initiated CH selection algorithm for LEACH. Then Artificial Bee
Colony (ABC)which is an optimisation protocol owes its inspiration to the exploration behaviour
of honey bees. In this study ABC optimization algorithm is proposed for fuzzy rule selection. Then,
the results of the three routing algorithms are compared with respect to various parameters
KEYWORDS
Wireless Sensor Network (WSN), LEACH, Clustering, Artificial Bee Colony (ABC), Fuzzy logic
system.
For More Details: https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf
Volume Link: https://airccse.org/journal/ijc2020.html
26. REFERENCES
[1] Abad, M.F.K. and Jamali, M.A.J. (2011) ‘Modify LEACH algorithm for wireless sensor network’,
IJCSI International Journal of Computer Science Issues, Vol. 8, No. 5.
[2] Abraham, A., Jatoth, R.K. and Rajasekhar, A. (2012) ‘Hybrid differential artificial bee colony
algorithm’, Journal of Computational and Theoretical Nanoscience, Vol. 9, No. 2, pp.249–257.
[3] Selvakumar, K., &Selvi, M. S. (2014). Efficient Load Balanced Routing Algorithm Based On Genetic
And Particle Swarm Optimization.
[4] Manjusha, M. S., &Kannammal, K. E. (2014). Efficient Cluster Head Selection Method For Wireless
Sensor Network
[5] Bee-Sensor-C: An Energy-Efficient and Scalable Multipath Routing Protocol for Wireless Sensor
Networks.Celik, F., Zengin, A. and Tuncel, S. (2010)
[6] ‘A survey on swarm intelligence based routing protocols in wireless sensor networks’, International
Journal of Physical Sciences, Vol. 5, No. 14, pp.2118–2126.
[7] Saini, M., &Saini, R. K. (2013). Solution of Energy-Efficiency of sensor nodes in Wireless sensor
Networks. International Journal of Advanced Research in Computer Science and Software Engineering,
3(5), 353-357.
[8] Han, L. (2010, October). LEACH-HPR: An energy efficient routing algorithm for Heterogeneous
WSN. In Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on
(Vol. 2, pp. 507-511).IEEE.
[9] Gou, H., &Yoo, Y. (2010, April). An energy balancing LEACH algorithm for wireless sensor
networks. In Information Technology: New Generations (ITNG), 2010 Seventh International Conference
on (pp. 822-827). IEEE.
[10] Farooq, M. O., Dogar, A. B., & Shah, G. A. (2010, July). MR-LEACH: multi-hop routing with low
energy adaptive clustering hierarchy. In Sensor Technologies and Applications (SENSORCOMM), 2010
Fourth International Conference on(pp. 262-268). IEEE.
[11] El-Saadawy, M., &Shaaban, E. (2012, May). Enhancing S-LEACH security for wireless sensor
networks.In Electro/Information Technology (EIT), 2012 IEEE International Conference on (pp. 1-
6).IEEE.
[12] Chang, J-Y. andJu, P-H. (2012) ‘An efficient cluster-based power saving scheme for wireless sensor
networks’, EURASIP Journal on Wireless Communications and Networking, Article 172, Vol. 2012.
[13] Hadjila, M., Guyennet, H. and Feham, M. (2013) ‘Energy- efficient in wireless sensor networks
using fuzzy C-means clustering approach’, International Journal of Sensors and Sensor Networks, Vol.
1, No. 2, pp.21–26.
[14] Hemavathi, N. and Sudha, S. (2014) ‘A fuzzy based predictive cluster head selection scheme for
wireless sensor networks’, in The Proceedings of 8th International Conference on Sensing Technology
& International Journal on Smart Sensing and Intelligent Systems, pp.560–567.
27. [15] Jerusha, S., Kulothungan, K. and Kannan, A. (2012) International Journal of Computer &
Communication Technology, Vol. 3, No. 5, pp.0975–7449.
[16] Kaur, J. and Soni, N. (2015) ‘Performance evaluation of on demand energy efficient routing protocol
for WSN’, International Journal of Future Generation Communication and Networking, Vol. 8, No. 5,
pp.81–88.
[17] Khalid, H., Abdullah, K.M., AhsanAwan, F. and Hussain, A. (2013) ‘Cluster head election schemes
for WSN and MANET: a survey’, World Applied Sciences Journal, Vol. 23, No. 5, pp.611–620.
[18] Kour, H. and Sharma, A.K. (2010) ‘Hybrid energy efficient distributed protocol for heterogeneous
wireless sensor network’, International Journal of Computer Applications, July, Vol. 4, No. 6,pp.0975–
8887.
[19] Malarvizhi, M. and Gnanambal, I. (2015) ‘Harmonics elimination in multilevel inverter with
unequal DC sources by fuzzy-ABC algorithm’, Journal of Experimental & Theoretical Artificial
Intelligence, Vol. 27, No. 3, pp.273–292.
[20] Nayak, P. and Devulapalli, A. (2016) ‘A fuzzy logic-based clustering algorithm for WSN to extend
the network lifetime’, Sensors Journal, IEEE, Vol. 16, No. 1, pp.137–144.
[21] Ran, G., Zhang, H. and Gong, S. (2010) ‘Improving on LEACH protocol of wireless sensor networks
using fuzzy logic’, Journal of Information & Computational Science, Vol. 7, No. 3, pp.767–775.
[22] Rana, S., Bahar, A. N., Islam, N., & Islam, J. (2015). Fuzzy Based Energy Efficient Multiple Cluster
Head Selection Routing Protocol for Wireless Sensor Networks.
[23] Kumar, R., &Prakash, N., (2013) Energy Efficient Approach for Wireless Sensor Network, 3(6)
[24] Singh, S. P., & Sharma, S. C. (2015). A Survey on Cluster Based Routing Protocols in Wireless
Sensor Networks. Procedia Computer Science, 45, 687-695.
[25] Taruna, S., &Shringi, S. (2013). A cluster based routing protocol for prolonging network lifetime in
heterogeneous wireless sensor networks. Taruna et al., International Journal of Advanced Research in
HYBRIDComputer Science and Software Engineering, 3(4), 658-665.
[26] Yoon, M., & Chang, J. (2011, September). Design and implementation of cluster-based routing
protocol using message success rate in sensor networks. In HPCC, 2011 IEEE 13th International
Conference on (pp. 622-627).IEEE.
[27] PhanThiThe, Ngo QuangQuyen, Vu Ngoc Phan and Tran Cong Hung. (2017). A Proposal to
Improve SEP Routing Protocol Using Insensitive Fuzzy C-Means in Wireless Sensor Network,
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.6, November 2017.
[28] SaeidPourroostaeiArdakani. (2017). Data aggregation routing protocols in wireless sensor networks:
a taxonomy, International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.2,
March 2017.
[29] Tran Cong Hung and Ly Quoc Hung. (2016).Energy consumption improvement of traditional
clustering method in wireless sensor network, International Journal of Computer Networks &
Communications (IJCNC) Vol.8, No.5, September 2016.