The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Smart Pill Reminder and Monitoring SystemIRJET Journal
This document describes a proposed smart pill reminder and monitoring system using IoT technology. The system uses an Arduino microcontroller connected to an IR sensor to detect when medication is taken from a pill box. An ESP module and Android app are used to update the caregiver on medication adherence. The proposed system aims to address limitations of existing methods by integrating additional components like the ESP module and buzzer to send alerts and save data in the cloud. This allows caregivers to remotely monitor patients and ensures medication is taken on schedule.
seminar report iot based health monitoring system 2023.pdfriddheshbore97
This document provides an overview of a seminar report on an IoT-based health monitoring system. The report was submitted by Prerna Ravi Shirsath for their Bachelor of Engineering degree. The report discusses the development of a system that measures a patient's body temperature, heartbeat, and oxygen saturation levels using sensors and sends the data to a mobile application via Bluetooth. It presents the architecture of an IoT health monitoring system which includes medical sensors, a smart gateway, and a back-end system. The report also covers the advantages of such systems in enabling remote monitoring and prevention, reducing healthcare costs, and improving treatment management. Some disadvantages around security, risk of failure, and cost are also discussed.
Telehealth care enhancement using the internet of things technologyjournalBEEI
Chronic diseases quickly become broader public health issues because of the difficulty in obtaining appropriate, often long-term health care. So that, it requires the extension of health care for patients with chronic diseases beyond the clinic to include patient’s home and work environment. To reduce costs and provide more appropriate healthcare, we need telehealth care where internet of things (IoT) technology plays an important role. The integration of the IoT and medical science offers opportunities to improve healthcare quality, and efficiency and to better coordinate healthcare delivery at home and in the workplace. In this paper, we present the realization of a remote healthcare system based on the IoT technology. The function of this system is the transmission via a gateway of internet collected data using biomedical sensors node based Arduino board (e.g., temperature, electrical activity of the heart, heart rate monitor). These data will be stored automatically in a cloud. The health can then be monitored by the doctor or patient using a web page in real-time from anywhere at any time in the world using laptops or smart phones, etc. This method also reduces the need for direct interaction between doctor and patient.
An innovative IoT service for medical diagnosis IJECEIAES
The document proposes an innovative IoT service for medical diagnosis that utilizes IoT and cloud infrastructure to provide a shared environment for medical data between patients and doctors, predicts medical diagnoses and treatments based on multiple classifiers to ensure high accuracy, and includes functionalities such as searching for scientific papers and disease descriptions for unrecognized symptom combinations.
Big data analytics and internet of things for personalised healthcare: opport...IJECEIAES
With the increasing use of technologies and digitally driven healthcare systems worldwide, there will be several opportunities for the use of big data in personalized healthcare. In addition, With the advancements and availability of internet of things (IoT) based point-of-care (POC) technologies, big data analytics and artificial intelligence (AI) can provide useful methods and solutions in monitoring, diagnosis, and self-management of health issues for a better personalized healthcare. In this paper, we identify the current personalized healthcare trends and challenges. Then, propose an architecture to support big data analytics using POC test results of an individual. The proposed architecture can facilitate an integrated and self-managed healthcare as well as remote patient care by adapting three popular machine learning algorithms to leverage the current trends in IoT, big data infrastructures and data analytics for advancing personalized healthcare of the future.
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Smart Pill Reminder and Monitoring SystemIRJET Journal
This document describes a proposed smart pill reminder and monitoring system using IoT technology. The system uses an Arduino microcontroller connected to an IR sensor to detect when medication is taken from a pill box. An ESP module and Android app are used to update the caregiver on medication adherence. The proposed system aims to address limitations of existing methods by integrating additional components like the ESP module and buzzer to send alerts and save data in the cloud. This allows caregivers to remotely monitor patients and ensures medication is taken on schedule.
seminar report iot based health monitoring system 2023.pdfriddheshbore97
This document provides an overview of a seminar report on an IoT-based health monitoring system. The report was submitted by Prerna Ravi Shirsath for their Bachelor of Engineering degree. The report discusses the development of a system that measures a patient's body temperature, heartbeat, and oxygen saturation levels using sensors and sends the data to a mobile application via Bluetooth. It presents the architecture of an IoT health monitoring system which includes medical sensors, a smart gateway, and a back-end system. The report also covers the advantages of such systems in enabling remote monitoring and prevention, reducing healthcare costs, and improving treatment management. Some disadvantages around security, risk of failure, and cost are also discussed.
Telehealth care enhancement using the internet of things technologyjournalBEEI
Chronic diseases quickly become broader public health issues because of the difficulty in obtaining appropriate, often long-term health care. So that, it requires the extension of health care for patients with chronic diseases beyond the clinic to include patient’s home and work environment. To reduce costs and provide more appropriate healthcare, we need telehealth care where internet of things (IoT) technology plays an important role. The integration of the IoT and medical science offers opportunities to improve healthcare quality, and efficiency and to better coordinate healthcare delivery at home and in the workplace. In this paper, we present the realization of a remote healthcare system based on the IoT technology. The function of this system is the transmission via a gateway of internet collected data using biomedical sensors node based Arduino board (e.g., temperature, electrical activity of the heart, heart rate monitor). These data will be stored automatically in a cloud. The health can then be monitored by the doctor or patient using a web page in real-time from anywhere at any time in the world using laptops or smart phones, etc. This method also reduces the need for direct interaction between doctor and patient.
An innovative IoT service for medical diagnosis IJECEIAES
The document proposes an innovative IoT service for medical diagnosis that utilizes IoT and cloud infrastructure to provide a shared environment for medical data between patients and doctors, predicts medical diagnoses and treatments based on multiple classifiers to ensure high accuracy, and includes functionalities such as searching for scientific papers and disease descriptions for unrecognized symptom combinations.
Big data analytics and internet of things for personalised healthcare: opport...IJECEIAES
With the increasing use of technologies and digitally driven healthcare systems worldwide, there will be several opportunities for the use of big data in personalized healthcare. In addition, With the advancements and availability of internet of things (IoT) based point-of-care (POC) technologies, big data analytics and artificial intelligence (AI) can provide useful methods and solutions in monitoring, diagnosis, and self-management of health issues for a better personalized healthcare. In this paper, we identify the current personalized healthcare trends and challenges. Then, propose an architecture to support big data analytics using POC test results of an individual. The proposed architecture can facilitate an integrated and self-managed healthcare as well as remote patient care by adapting three popular machine learning algorithms to leverage the current trends in IoT, big data infrastructures and data analytics for advancing personalized healthcare of the future.
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field
IRJET- A Wearable Device Data Sharing and Collaboration in Mobile Healthcare ...IRJET Journal
This document summarizes a research paper that proposes a mobile application using wearable devices to monitor heart rate and location. The application would send notifications to nearby individuals if abnormalities are detected in a user's heart rate or speed. It utilizes sensors in wearable devices to collect heart rate and speed data. If heart rate is high and speed is low, it would notify nearby emergency contacts that the user may need help. If heart rate and speed are both high during exercise, it would notify contacts the user is working out. It uses KNN and Bluetooth algorithms to identify and notify the nearest individuals. The proposed system aims to help users experiencing heart issues and promote safety.
This document summarizes literature on health care monitoring systems using wireless sensors and cloud storage. It discusses technologies like ZigBee, embedded microcontrollers, and Bluetooth that are used in wireless sensor networks to monitor patient vitals. The data collected is stored in the cloud and can be accessed by doctors. Challenges discussed include ensuring reliability, quality of service, security, and privacy of patient data. The literature proposes systems for continuous remote patient monitoring, early warning systems, and alerting doctors and caregivers of any issues.
Predictive Data Mining for Converged Internet ofJames Kang
Kang, J. J., Adibi, S., Larkin, H., & Luan, T. (2016). Predictive data mining for Converged Internet of Things: A Mobile Health perspective. In Telecommunication Networks and Applications Conference (ITNAC), 2015 International (pp. 5-10). IEEE Xplore: IEEE. doi: http://dx.doi.org/10.1109/ATNAC.2015.7366781
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET Journal
This document summarizes a research paper on a health monitoring system using IoT and Arduino Uno. The system measures body temperature and pulse rate using sensors interfaced with an Arduino board. Wireless data transmission is done through an ESP8266 WiFi module to an IoT platform called ThingSpeak. The collected sensor data is stored on the ThingSpeak server and can be viewed by authorized users. The system aims to provide easy and affordable health monitoring to address issues like lack of resources and doctors in rural areas. It reduces the time and cost of regular health checkups.
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx4934bk
This document summarizes a research article that proposes a conceptual privacy framework for health information collected by wearable devices. The framework consists of 10 principles and 9 checklists to provide comprehensive privacy protection for users. It was constructed based on an analysis of existing mobile technologies and security standards, and incorporates market share data. The framework is evaluated based on stringent CIA and HIPAA privacy and security principles.
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET Journal
This document summarizes a research paper that conducted a comprehensive survey on using the Internet of Things (IoT) for smart healthcare monitoring of patients. The key aspects covered are:
1) IoT enables remote patient monitoring through wearable devices that allow healthcare professionals to monitor patients' conditions without being physically present.
2) The survey reviewed various existing works on IoT-based remote patient monitoring systems that transmit patients' health data like temperature and oxygen levels to doctors via wireless networks and mobile apps.
3) Ensuring patient privacy and security while monitoring and accessing health data remotely is an important challenge addressed in some of the existing research.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
This document provides a systematic survey of fog and IoT driven healthcare technologies. It discusses the architecture of fog computing in healthcare, which involves an IoT layer with body sensor devices, a fog layer for data analysis and alerts, and a cloud layer for long-term storage. The document compares different healthcare technologies and sensors used for diseases like heart disease, diabetes and more. It identifies several challenges with fog and IoT healthcare systems including increased data processing requirements, limited storage capacity, and need for improved scalability and reduced latency. The survey aims to help researchers understand open issues and directions for future work in this area.
Today, health monitoring relies heavily on technological advancements. This
study proposes a low-power wide-area network (LPWAN) based, multinodal
health monitoring system to monitor vital physiological data. The suggested
system consists of two nodes, an indoor node, and an outdoor node, and the
nodes communicate via long range (LoRa) transceivers. Outdoor nodes use an
MPU6050 module, heart rate, oxygen pulse, temperature, and skin resistance
sensors and transmit sensed values to the indoor node. We transferred the data
received by the master node to the cloud using the Adafruit cloud service. The
system can operate with a coverage of 4.5 km, where the optimal distance
between outdoor sensor nodes and the indoor master node is 4 km. To further
predict fall detection, various machine learning classification techniques have
been applied. Upon comparing various classifier techniques, the decision tree
method achieved an accuracy of 0.99864 with a training and testing ratio of
70:30. By developing accurate prediction models, we can identify high-risk
individuals and implement preventative measures to reduce the likelihood of
a fall occurring. Remote monitoring of the health and physical status of elderly
people has proven to be the most beneficial application of this technology.
Transforming Healthcare Industry by Implementing Cloud Computingijtsrd
In the present generation, healthcare has become the foremost imperative sector in todays medicinal eon. The massive private documents, responsive details are kept in a scalable manner. The healthcare industry has become more competitive in the digital world. As a thriving industry, its challenging for doctors to understand the moving technology in the healthcare sector. This also deals with the patient's nursing and maintains their portfolios. The overview of the project depicts a role played by the doctors, patients, management, and resource suppliers by implementing cloud technology in the healthcare industry. The platform was designed and developed for user friendly interactions where patients can connect with the management and doctors at any corner of the world. The peculiarity of the project was to withdraw the pen paper method followed by the sector for ages. Cloud computing CC has played a vital role in the project that helped and managed to store, secure large data files. The features while operating the system were QR codes, generating e mails, SMS text, and free trunk calls. This approach assists on track with each individuals health related documents, henceforward approving with the doctors to access the knowledge throughout the flow of emergency and firmly access policy. Besides the facts, it rescues the lifetime of the patients and mutually helps the doctors figure it out comfortably. The utilization of mobile aid applications may be a dynamic field and has received the attention of late. This development provides mobile technology additional enticing for mobile health m health applications. The m health defines as wireless telemedicine involving the utilization of mobile telecommunications and multimedia system technologies and their integration with mobile health care delivery systems. As well as human authentication protocols, whereas guaranteeing, has not been straightforward in light weight of their restricted capability of calculation and remembrance. Ms. Rohini Kulkarni | Pratibha Gayke "Transforming Healthcare Industry by Implementing Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46455.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/46455/transforming-healthcare-industry-by-implementing-cloud-computing/ms-rohini-kulkarni
This document summarizes a research paper about developing an intelligent medicine box system using IoT technologies. The system uses sensors and wireless communication to monitor patients' vital signs and medication adherence. If abnormal readings are detected, alerts would be sent via SMS to predefined caregivers. The system aims to provide personalized healthcare monitoring while patients are at home. It incorporates an ARM controller, wireless sensors, and WiFi to remotely track health data and environmental conditions in real-time. The feasibility of the system was proven through field testing, with the goal of improving home healthcare services.
The most fundamental expectation from the healthcare sector is that it provides a safe and reliable environment to serve patients. Medical supplies and equipment have also improved with technological advancements, making them easier to use, providing a better experience, and increasing their longevity. With advancement in technology, medical services can also be tracked for efficiency.
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing
applications aimed at providing healthcare services to all the people through mobile communication
devices. Pervasive computing devices are resource constrained devices such as battery power, memory,
processing power and bandwidth. In pervasive environment data privacy is a key issue. In this
application a secured frame work is developed for receiving the patient’s medical data periodically,
updates automatically in Patient Record Database and generates a Checkup Reminder. In the present
work a light weight asymmetric algorithm proposed by the authors [26] is used for encrypting the data to
ensure data confidentiality for its users. Challenge response onetime password mechanism is applied for
authentication process
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
Ecis final paper-june2017_two way architecture between iot sensors and cloud ...Oliver Neuland
Improving health care with IoT - Research into a weight monitoring bed - ECIS 2017 paper.
Resulting from smart furniture applications research project in Germany, Oliver Neuland and partners from AUT developed a smart bed concept which utilizes weight monitoring for AAL and elderly care. Initially strategies were applied to find meaningful use cases, later a prototype was developed. Here a paper presented during ECIS in Portugal which describes the architecture of the prototype.
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET Journal
This document proposes an Android-based healthcare monitoring and management system using the Internet of Things (IoT). The system uses a body sensor network (BSN) where sensors attached to a patient's body can monitor vital signs wirelessly. The sensor data is sent to a healthcare center via the BSN. The healthcare center then analyzes the data and provides real-time feedback and alerts to patients and their families. This ensures remote patient monitoring and management while improving comfort and healthcare quality. The document discusses the system functionality, literature review on similar systems, algorithms used and security analysis to show how the proposed system addresses security needs in BSN-based healthcare more effectively than previous systems.
Survey on IoT Based Health Monitoring System: “IoT Based Biomedical Instrumen...IRJET Journal
This document summarizes a survey on an IoT-based health monitoring system called "IoT Based Biomedical Instrumental Portable Device". The proposed system would develop a portable device that uses sensors to monitor heart rate, blood oxygen level, body temperature, and blood pressure. The sensor data would be sent to a mobile app via Bluetooth and also uploaded to the cloud. The mobile app would analyze the data and notify the user of any health issues. It would also allow doctors to access the data to provide prescriptions and medical advice. The system aims to provide convenient, remote health monitoring to improve medical care access and outcomes.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
Contenu connexe
Similaire à February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IRJET- A Wearable Device Data Sharing and Collaboration in Mobile Healthcare ...IRJET Journal
This document summarizes a research paper that proposes a mobile application using wearable devices to monitor heart rate and location. The application would send notifications to nearby individuals if abnormalities are detected in a user's heart rate or speed. It utilizes sensors in wearable devices to collect heart rate and speed data. If heart rate is high and speed is low, it would notify nearby emergency contacts that the user may need help. If heart rate and speed are both high during exercise, it would notify contacts the user is working out. It uses KNN and Bluetooth algorithms to identify and notify the nearest individuals. The proposed system aims to help users experiencing heart issues and promote safety.
This document summarizes literature on health care monitoring systems using wireless sensors and cloud storage. It discusses technologies like ZigBee, embedded microcontrollers, and Bluetooth that are used in wireless sensor networks to monitor patient vitals. The data collected is stored in the cloud and can be accessed by doctors. Challenges discussed include ensuring reliability, quality of service, security, and privacy of patient data. The literature proposes systems for continuous remote patient monitoring, early warning systems, and alerting doctors and caregivers of any issues.
Predictive Data Mining for Converged Internet ofJames Kang
Kang, J. J., Adibi, S., Larkin, H., & Luan, T. (2016). Predictive data mining for Converged Internet of Things: A Mobile Health perspective. In Telecommunication Networks and Applications Conference (ITNAC), 2015 International (pp. 5-10). IEEE Xplore: IEEE. doi: http://dx.doi.org/10.1109/ATNAC.2015.7366781
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET Journal
This document summarizes a research paper on a health monitoring system using IoT and Arduino Uno. The system measures body temperature and pulse rate using sensors interfaced with an Arduino board. Wireless data transmission is done through an ESP8266 WiFi module to an IoT platform called ThingSpeak. The collected sensor data is stored on the ThingSpeak server and can be viewed by authorized users. The system aims to provide easy and affordable health monitoring to address issues like lack of resources and doctors in rural areas. It reduces the time and cost of regular health checkups.
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx4934bk
This document summarizes a research article that proposes a conceptual privacy framework for health information collected by wearable devices. The framework consists of 10 principles and 9 checklists to provide comprehensive privacy protection for users. It was constructed based on an analysis of existing mobile technologies and security standards, and incorporates market share data. The framework is evaluated based on stringent CIA and HIPAA privacy and security principles.
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET Journal
This document summarizes a research paper that conducted a comprehensive survey on using the Internet of Things (IoT) for smart healthcare monitoring of patients. The key aspects covered are:
1) IoT enables remote patient monitoring through wearable devices that allow healthcare professionals to monitor patients' conditions without being physically present.
2) The survey reviewed various existing works on IoT-based remote patient monitoring systems that transmit patients' health data like temperature and oxygen levels to doctors via wireless networks and mobile apps.
3) Ensuring patient privacy and security while monitoring and accessing health data remotely is an important challenge addressed in some of the existing research.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
This document provides a systematic survey of fog and IoT driven healthcare technologies. It discusses the architecture of fog computing in healthcare, which involves an IoT layer with body sensor devices, a fog layer for data analysis and alerts, and a cloud layer for long-term storage. The document compares different healthcare technologies and sensors used for diseases like heart disease, diabetes and more. It identifies several challenges with fog and IoT healthcare systems including increased data processing requirements, limited storage capacity, and need for improved scalability and reduced latency. The survey aims to help researchers understand open issues and directions for future work in this area.
Today, health monitoring relies heavily on technological advancements. This
study proposes a low-power wide-area network (LPWAN) based, multinodal
health monitoring system to monitor vital physiological data. The suggested
system consists of two nodes, an indoor node, and an outdoor node, and the
nodes communicate via long range (LoRa) transceivers. Outdoor nodes use an
MPU6050 module, heart rate, oxygen pulse, temperature, and skin resistance
sensors and transmit sensed values to the indoor node. We transferred the data
received by the master node to the cloud using the Adafruit cloud service. The
system can operate with a coverage of 4.5 km, where the optimal distance
between outdoor sensor nodes and the indoor master node is 4 km. To further
predict fall detection, various machine learning classification techniques have
been applied. Upon comparing various classifier techniques, the decision tree
method achieved an accuracy of 0.99864 with a training and testing ratio of
70:30. By developing accurate prediction models, we can identify high-risk
individuals and implement preventative measures to reduce the likelihood of
a fall occurring. Remote monitoring of the health and physical status of elderly
people has proven to be the most beneficial application of this technology.
Transforming Healthcare Industry by Implementing Cloud Computingijtsrd
In the present generation, healthcare has become the foremost imperative sector in todays medicinal eon. The massive private documents, responsive details are kept in a scalable manner. The healthcare industry has become more competitive in the digital world. As a thriving industry, its challenging for doctors to understand the moving technology in the healthcare sector. This also deals with the patient's nursing and maintains their portfolios. The overview of the project depicts a role played by the doctors, patients, management, and resource suppliers by implementing cloud technology in the healthcare industry. The platform was designed and developed for user friendly interactions where patients can connect with the management and doctors at any corner of the world. The peculiarity of the project was to withdraw the pen paper method followed by the sector for ages. Cloud computing CC has played a vital role in the project that helped and managed to store, secure large data files. The features while operating the system were QR codes, generating e mails, SMS text, and free trunk calls. This approach assists on track with each individuals health related documents, henceforward approving with the doctors to access the knowledge throughout the flow of emergency and firmly access policy. Besides the facts, it rescues the lifetime of the patients and mutually helps the doctors figure it out comfortably. The utilization of mobile aid applications may be a dynamic field and has received the attention of late. This development provides mobile technology additional enticing for mobile health m health applications. The m health defines as wireless telemedicine involving the utilization of mobile telecommunications and multimedia system technologies and their integration with mobile health care delivery systems. As well as human authentication protocols, whereas guaranteeing, has not been straightforward in light weight of their restricted capability of calculation and remembrance. Ms. Rohini Kulkarni | Pratibha Gayke "Transforming Healthcare Industry by Implementing Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46455.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/46455/transforming-healthcare-industry-by-implementing-cloud-computing/ms-rohini-kulkarni
This document summarizes a research paper about developing an intelligent medicine box system using IoT technologies. The system uses sensors and wireless communication to monitor patients' vital signs and medication adherence. If abnormal readings are detected, alerts would be sent via SMS to predefined caregivers. The system aims to provide personalized healthcare monitoring while patients are at home. It incorporates an ARM controller, wireless sensors, and WiFi to remotely track health data and environmental conditions in real-time. The feasibility of the system was proven through field testing, with the goal of improving home healthcare services.
The most fundamental expectation from the healthcare sector is that it provides a safe and reliable environment to serve patients. Medical supplies and equipment have also improved with technological advancements, making them easier to use, providing a better experience, and increasing their longevity. With advancement in technology, medical services can also be tracked for efficiency.
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing
applications aimed at providing healthcare services to all the people through mobile communication
devices. Pervasive computing devices are resource constrained devices such as battery power, memory,
processing power and bandwidth. In pervasive environment data privacy is a key issue. In this
application a secured frame work is developed for receiving the patient’s medical data periodically,
updates automatically in Patient Record Database and generates a Checkup Reminder. In the present
work a light weight asymmetric algorithm proposed by the authors [26] is used for encrypting the data to
ensure data confidentiality for its users. Challenge response onetime password mechanism is applied for
authentication process
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
Ecis final paper-june2017_two way architecture between iot sensors and cloud ...Oliver Neuland
Improving health care with IoT - Research into a weight monitoring bed - ECIS 2017 paper.
Resulting from smart furniture applications research project in Germany, Oliver Neuland and partners from AUT developed a smart bed concept which utilizes weight monitoring for AAL and elderly care. Initially strategies were applied to find meaningful use cases, later a prototype was developed. Here a paper presented during ECIS in Portugal which describes the architecture of the prototype.
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET Journal
This document proposes an Android-based healthcare monitoring and management system using the Internet of Things (IoT). The system uses a body sensor network (BSN) where sensors attached to a patient's body can monitor vital signs wirelessly. The sensor data is sent to a healthcare center via the BSN. The healthcare center then analyzes the data and provides real-time feedback and alerts to patients and their families. This ensures remote patient monitoring and management while improving comfort and healthcare quality. The document discusses the system functionality, literature review on similar systems, algorithms used and security analysis to show how the proposed system addresses security needs in BSN-based healthcare more effectively than previous systems.
Survey on IoT Based Health Monitoring System: “IoT Based Biomedical Instrumen...IRJET Journal
This document summarizes a survey on an IoT-based health monitoring system called "IoT Based Biomedical Instrumental Portable Device". The proposed system would develop a portable device that uses sensors to monitor heart rate, blood oxygen level, body temperature, and blood pressure. The sensor data would be sent to a mobile app via Bluetooth and also uploaded to the cloud. The mobile app would analyze the data and notify the user of any health issues. It would also allow doctors to access the data to provide prescriptions and medical advice. The system aims to provide convenient, remote health monitoring to improve medical care access and outcomes.
Similaire à February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf (20)
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
1. February 2024: Top
10 Read Articles in
Computer Networks
& Communications
International Journal of Computer
Networks& Communications (IJCNC)
http://airccse.org/journal/ijcnc.html
(Scopus, ERA Listed, WJCI Indexed)
Scopus Cite Score 2022—1.8
ISSN 0974 - 9322 (Online); 0975 - 2293 (Print)
Citations, h-index, i10-index
2. REAL TIME WIRELESS HEALTH MONITORING APPLICATION
USING MOBILE DEVICES
Amna Abdullah, Asma Ismael, Aisha Rashid, Ali Abou-ElNour, and Mohammed Tarique
Department of Electrical Engineering, Ajman University of Science and Technology, P.O. Box
2202, Fujairah, United Arab Emirates
ABSTRACT
In the last decade the healthcare monitoring systems have drawn considerable attentions of the
researchers. The prime goal was to develop a reliable patient monitoring system so that the
healthcare professionals can monitor their patients, who are either hospitalized or executing their
normal daily life activities. In this work we present a mobile device based wireless healthcare
monitoring system that can provide real time online information about physiological conditions of
a patient. Our proposed system is designed to measure and monitor important physiological data
of a patient in order to accurately describe the status of her/his health and fitness. In additionthe
proposed system is able to send alarming message about the patient’s critical health data by text
messages or by email reports. By using the information contained in the text or e-mail message the
healthcare professional can provide necessary medical advising. The system mainly consists of
sensors, the data acquisition unit, microcontroller (i.e., Arduino), and software (i.e., LabVIEW).
The patient’s temperature, heart beat rate, muscles, blood pressure, blood glucose level, and ECG
data are monitored, displayed, and stored by our system. To ensure reliabilityand accuracy the
proposed system has been field tested. The test results show that our system is able to measure the
patient’s physiological data with a very high accuracy.
KEYWORDS
ZigBee, remote healthcare, mobile device, patient monitoring, LabView
For More Details: https://airccse.org/journal/cnc/7315cnc02.pdf
Volume Link: https://airccse.org/journal/ijc2015.html
3. REFERENCES
[1] Global Challenges for Humanity available at
http://www.millenniumproject.org/millennium/challenges.html
[2] A Right to Health available at http://www.who.int/mediacentre/factsheets
[3] FRANCIS S. COLLINS, “MOBILE TECHNOLOGY AND HEALTHCARE”,
AVAILABLE at http://www.nlm.nih.gov/medlineplus/magazine/issues/winter11
[4] How the Smartphone Can Revolutionize Healthcare available at http://www.mdtmag.com/
[5] mHealth App Developer Economics(2014) available at
http://mhealtheconomics.com/mhealthdeveloper-economics-report/
[6] Bourouis, A., Feham, M., and Bouchachia, A.(2011), “ Ubiquitous Mobile Health Monitoring
System for Elderly (UMHMSE)”, International Journal of Computer Science and Information
Technology, Vol.2, No. 3, June, pp. 74-82
[7] Lee, Y.D. and Chung, W.Y. (2009) “Wireless Sensor Network Based Wearable Smart Shirt
for Ubiquitous Health and Activity Monitoring”, Sensors and Actuators B: Chameical, Vol. 140,
No. 2, July, pp. 390-395
[8] Orlando R. E. P., Caldeira, M. L. P. Lei S., and Rodrigues, J.P.C (2014), “An Efficient and
Low Cost Windows Mobile BSN Monitoring SystemBased on TinyOS”, Journal of
Telecommunication Systems, Vol. 54, No. 1, pp. 1-9
[9] Yuce, M. R.(2010)” Implementation of wireless body area networks for healthcare systems”,
Sensor and Actuators A:Physical, Vol. 162, No. 1, July, pp. 116-129
[10] Lei Clifton, David A. Clifton, Marco A. F. Pimentel, Peter J. Watkinson, and Lionel
Tarassenko (2014),” Predictive Monitoring of Mobile Patients by Combining Clinical
Observations with Data From Wearable Sensors”, IEEE Journal of Biomedical and Health
Informatics, Vol. 18, No. 3, May , pp. 722-730
[11] Parane, K.A., Patil, N.C. ; Poojara, S.R. ; Kamble, T.S(2014) “Cloud based Intelligent
Healthcare Monitoring System”, In the proceedings of International Conference on Issues and
Challenges in Intelligent Computing Techniques (ICICT), February 7-8, Ghaziabad, Indian, pp.
697-701
[12] Xiaoliang Wang ; Qiong Gui ; Bingwei Liu ; Zhanpeng Jin et al (2014), “Enabling Smart
Personalized Healthcare: A Hybrid Mobile-Cloud Approach for ECG Telemonitoring”, IEEE
Journal of Biomedical and Health Informatics, Vol. 18, No. 3, May, pp. 739 – 745
[13] Dunsmuir, D., Payne, B. ; Cloete, G. ; Petersen, C.(2014), “Development of m-Health
Applications for Pre-eclampsia Triage”, IEEE Journal of Biomedical and Health Informatics, Vol.
PP, No. 99, January , pp. 2168-2194
4. [14] Tello, J.P. ; Manjarres, O. ; Quijano, M. ; Blanco, A. et al(2013) , “ Remote Monitoring
System of ECG and Human Body Temperature Signals”, IEEE Latin American Transaction,
Vol. 11, No. 1, February, pp. 314-318
[15] Moreira, H. ; Oliveira, R. ; Flores, N.(2013), “STAlz: Remotely supporting the diagnosis,
tracking and rehabilitation of patients with Alzheimer's”, In the Proceedings of the 15th IEEE
Conference on E-health Networking, Applications, and Services, October 9-12, Lisbob, pp. 580-
584
[16] Touati, F. ; Tabish, R. ; and Ben Mnaouer, A.(2013), “Towards u-health: An indoor
6LoWPAN based platform for real-time healthcare monitoring”, In the proceedings of the IFIP
International Conference on Wireless and Mobile Networking, April 20-23, 2013,Dubai, pp. 1-4
[17] Strisland, F. ; Sintef,; Svagard, I. ; Seeberg, T.M.(2013) “ESUMS: A mobile system for
continuous home monitoring of rehabilitation patient”, In the proceedings of the 35th IEEE Annual
International Conference on Engineering in Medicine and Biology Society, July 3-7, 2013, Osaka,
pp. 4670-4673
[18] Yun-Hong Noh ; Jiunn Huei Yap ; and Do-Un Jeong(2013) “Implementation of the
Abnormal ECG Monitoring System Using Heartbeat Check Map Technique”, In the proceedings
of International Conference on IT Convergence and Security, December 16-18, 2013, Macao, pp.
1-4
[19] Triantafyllidis, A.K. ; Koutkias, V.G. ; Chouvarda, I. ; Maglaveras, N.(2013) “A Pervasive
Health System Integrating Patient Monitoring, Status Logging, and Social Sharing”, IEEE Journal
on Biomedical and Health Informatics, Vol. 17, No. 1, January , pp. 30-37
[20] Bin Yu ; Lisheng Xu ; Yongxu Li(2012) “Bluetooth Low Energy (BLE) based mobile
electrocardiogram monitoring system”, In the proceedings of International Conference on
Information and Automation, June 6-8, 2012, Shenyang, pp. 763-767
[21] Mitra, P. ; Poellabauer, C.(2012) ,” Emergency response in smartphone-based Mobile Ad-
Hoc Networks”, In the proceedings of IEEE International Conference on Communication, June
10-15, Ottawa, pp. 6091 - 6095
[22] Ospino, M.R. ; Ariza, L.C. ; Rojas, J.G., (2012), ”Mobile system for monitoring
measurements in hypertensive patients”, In the proceedings of the IEEE Colombian
Communication conference, May 16-18, CA, pp. 1-6
[23] Ruipeng Gao ; Liqiong Yang ; Xinyu Wu ; and Tao Wang, (2012) “A phone-based e-health
system for OSAS and its energy issue”, In the proceedings of the International Symposium on
Information Technology in Medicine and Education, August 3-5, 2012, Hokodate, Hokkaido, pp.
682-696
[24] https://www.zigbee.org/
5. [25] The IEEE 802.15.4 standard available at
http://standards.ieee.org/getieee802/download/802.15.4d2009.pdf
Bluetooth Developer Portal available at
https://developer.bluetooth.org/TechnologyOverview/Pages/Compare.aspx
DYNAMIC ROUTING OF IP TRAFFIC BASED ON QOS PARAMETERS
Martin Kriška1 , Jozef Janitor2 and Peter Fecilak3
6. 1Computer Networks Laboratory, Technical University of Kosice, Slovakia 2 Institute of
Computer Technology, Technical University of Kosice, Slovakia 3Department of Computers and
Informatics, Technical University of Kosice, Slovakia
ABSTRACT
The article looks into the current state of the art of dynamic routing protocols with respect to
their possibilities to react to changes in the Quality of Service when selecting the best route towards
a destination network. New options that could leverage information about the ever changing QoS
parameters for data communication are analysed and a Cisco Performance Routing solution is
described more in detail. The practical part of this work focuses on a design and implementation
of a test bed that provides a scalable laboratory architecture to manipulate QoS parameters of
different data communications flowing through it. The test bed is used in various use cases that
were used to evaluate Cisco Performance Routing optimization capabilitiesin different scenarios.
KEYWORDS
Performance Routing, PfR, Quality of Service, QoS, Optimized Edge Routing
For More Details: https://airccse.org/journal/cnc/6414cnc02.pdf
Volume Link: https://airccse.org/journal/ijc2014.html
7. REFERENCES
[1] Information Sciences Institute, University of Southern California. RFC 791 INTERNET
PROTOCOL - DARPA INTERNET PROGRAM, PROTOCOL SPECIFICATION. s.l. : Internet
Engineering Task Force, 1981.
[2] Cisco Systems, Inc. Route Selection in Cisco Routers. Cisco. [Online] 2008. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/8651/21.pdf.
[3] D. Savage, et. al.: Enhanced Interior Gateway Routing Protocol. IETF. [Online] 2013 [Date:
25th of October 2013.] http://tools.ietf.org/html/draft-savage-eigrp-00.
[4] Teare Diane: Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide.
Indianapolis: Cisco Press, 2010. ISBN 1587058820.
[5] Cisco Systems, Inc. BGP Best Path Selection Algorithm. Cisco. [Online] 2012. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/13753/25.pdf.
[6] Doyle Jeff, Carroll Jennifer: CCIE Professional Development Routing TCP/IP Volume I.
Indianapolis: Cisco Press, 2006. ISBN 1587052024.
[7] D. Awduche, et. al.: RSVP-TE: Extensions to RSVP for LSP Tunnels. IETF. [Online] 2013
[Date: 11th of November 2013.] http://tools.ietf.org/html/rfc3209.
[8] X. Fu, et. al.: RSVP-TE extensions for Loss and Delay Traffic Engineering. IETF. [Online]
2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/draft-fuxh-mpls-delay-loss-rsvp-
te-ext02.
[9] Z. Seils. Defining SDN Overview of SDN Terminology & Concepts. Cisco. [Online] 2013.
[Date: 4 th of October 2013.] https://learningnetwork.cisco.com/docs/DOC-21946.
[10] Cisco Systems, Inc. onePK Chat and Demo at Cisco Live. SlideShare. [Online] 2012. [Date:
4th of October 2013.] http://www.slideshare.net/getyourbuildon/onepk-chat-and-demo-at-cisco-
live.
[11] S. Cadora. Hitchhiker's Guide to onePK. Cisco. [Online] 2013. [Date: 12th of September
2013.] https://learningnetwork.cisco.com/docs/DOC-22910.
[12] R. Trunk. Understanding Performance Routing (PfR). Chesapeake Netcraftsmen. [Online]
2009. [Date: 15th of November 2013.] http://netcraftsmen.net/archived-documents/c-mug-
articlearchive/7-20090922-cmug-understanding-performance-routing/file.html?limit=10.
[13] Kalita Hemanta Kumar, Nambiar Manoj K.: Designing WANem: A Wide Area Network
Emulator tool. Bangalore, 2011. ISBN 9780769546186.
[14] R. Pandi Selvam, V.Palanisamy: An efficient cluster based approach for multi-source
multicast routing protocol in mobile ad hoc networks, International Journal of Computer
8. GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND
EFFECTIVE SOLUTIONS
Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin
School of Computer Sciences, Universiti Sains Malaysia, Malaysia
ABSTRACT
Today, Global Positioning System (GPS) is widely used in almost every aspect of our daily life.
Commonly, users utilize the technology to track the position of a vehicle or an object of interest.
They also use it to safely navigate to the destination of their choice. As a result, there are countless
number of GPS based tracking application that has been developed. But, a main recurring issue that
exists among these applications are the inaccuracy of the tracking faced by users and this issue has
become a rising concern. Most existing research have examined the effects that the inaccuracy of
GPS have on users while others identified suitable methods to improve the accuracy of GPS based
on one or two factors. The objective of this survey paper is to identify the common factors that affects
the accuracy of GPS and identify an effective method which could mitigate or overcome most of
those factors. As part of our research, we conducted a thorough examination of the existing factors
for GPS inaccuracies. According to an initial survey that we have collected, most of the respondents
has faced some form of GPS inaccuracy. Among the common issues faced are inaccurate object
tracking and disconnection of GPS signal while using an application. As such, most of the
respondents agree that it is necessary to improve the accuracy of GPS. This leads to another objective
of this paper, which is to examine and evaluate existing methods as well as to identify the most
effective method that could improve the accuracy of GPS.
KEYWORDS
GPS, accuracy factors, improve accuracy, global positioning system
For More Details: https://aircconline.com/ijcnc/V8N2/8216cnc11.pdf
Volume Link: https://airccse.org/journal/ijc2016.html
9. REFERENCES
[1] Lin, J.Y, Yang, B.K., Tuan A.D., and Chen, H.C. (2013). “The Accuracy Enhancement of GPS
Track in Google Map”, 2013 Eighth International Conference on Broadband and Wireless
Computing, Communication and Applications, Compiegne, France. pp. 524-527.
[2] Iqbal, A., Mahmood. H., Farooq, U., Kabir, M.A. and Asad, M.U.. (2009). “An Overview of the
Factors Responsible for GPS Signal Error: Origin and Solution”, 2009 International Conference on
Wireless Networks and Information Systems, Shanghai, China. pp. 294-299.
[3] Bajaj, R., Ranaweera, S.L., Agrawal, D.P.. (2002). “GPS: Location-tracking Technology”,
Computer, vol.35, no..4, pp. 92-94.
[4] Huang, J.Y., and Tsai, C.H.. (2008). “Improve GPS Positioning Accuracy with Context
Awareness”, 2008 First IEEE International Conference on Ubi-Media Computing, Lanzhou, China,
pp. 94-99.
[5] Wubbena, G., Andreas, B., Seeber, G., Boder, V. and Hankemeier, P., (1996). “Reducing
Distance Dependant Errors for Real-Time Precise DGPS Applications by Establishing Reference
Station Networks”. In Proceedings of the 9th International Technical Meeting of the Satellite
Division of the Institute of Navigation (ION GPS-96)
[6] Enge, P., Walter, T., Pullen, S., Kee, C., Chao, Y. and Tsai, Y. (1996). “Wide area augmentation
of the global positioning system”. Proceedings of the IEEE, vol. 84 Aug. 1996, pp. 1063–1088.
[7] Qi, H. and Moore, J. B. (2002). “Direct Kalman Filtering Approach for GPS/INS Integration”,
IEEE Trans. Aerosp, Electron. System. vol. 38, no. 2, 2002, pp. 687-693.
[8] Malleswari, B.L., MuraliKrishna, I.V., Lalkishore, K., Seetha, M., Nagaratna, P. H. “The Role of
Kalman Filter in the Modelling of GPS Errors”, Journal of Theoretical and Applied Information
Technology, pp. 95-101.
[9] White, C.E., Bernstein, D. and Kornhauser, Alain L.. (2000). “Some map matching algorithms
for personal navigation assistants”. Transportation Research Part C, No. 8, 2000, pp. 91-108.
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE
COMPUTING IN SOFTWARE-DEFINED WIDE AREA NETWORKS
Felipe Rodriguez Yaguache and Kimmo Ahola
5G Networks & Beyond, Technical Research Centre of Finland (VTT), Espoo, Finland
ABSTRACT
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology
10. adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the
opportunities for deploying edge-computing containerized applications running over SD-WAN are
vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the
lack of research focused on service discovery in these scenarios. In this article, an in-house service
discovery solution that works alongside Kubernetes’ master node for allowing improved traffic
handling and better user experience when running micro-services is developed. The service
discovery solution was conceived following a design science research approach. Our research
includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster
that allows us to deploy custom services and delimit the necessary characteristics of our in-house
solution. Also, the implementation's performance is tested based on the required times for updating
the discovery solution according to service updates. Finally, some conclusions and modifications are
pointed out based on the results, while also discussing possible enhancements.
KEYWORDS
SD-WAN, Edge computing, Virtualization, Kubernetes, Containers, Services
For More Details: https://aircconline.com/ijcnc/V11N5/11519cnc07.pdf
Volume Link: https://airccse.org/journal/ijc2019.html
REFERENCES
[1] Padhy, R., Patra, M., Satapathy, S. Virtualization Techniques & Technologies: State-of-The-Art.
Journal of Global Research in Computer Science, 2018, vol. 2, nro.12. ISSN: 2229-371X. Available
https://www.researchgate.net/publication/264884756_VIRTUALIZATION_TECHNIQUES_TEC
HN OLOGIES_STATE-OF-THE-ART.
[2] Horrel, J., Karimullah, A. SD-WAN Set to Transform WAN in Australia. IDC Custom Solutions,
Framingham, 2017.
[3] Jakma, P. Quagga Routing Software Suite. Quagga Routing Suite. Visited: 15.02.2019. Available
at: https://www.quagga.net/
[4] Open Network Operating System (ONOS). ONOS features. Open Networking Foundation & The
Linux Foundation, San Francisco, 2019. Visited 15.02.2019. Available at:
11. https://onosproject.org/features/
[5] Open Networking Foundation. Atomix. Open Networking Foundation. Visited 15.02.2019.
Available at: https://atomix.io/docs/latest/user-manual/introduction/what-is-atomix/
[6] Kubernetes. DNS for services and pods. The Linux Foundation, San Francisco, 2019. Visited
15.02.2019. Available at: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/
[7] Kubernetes. Access services running on clusters. The Linux Foundation, San Francisco, 2019.
Visited 15.02.2019. Available at: https://kubernetes.io/docs/tasks/administer-cluster/access-cluster-
services/
[8] MetalLB Metal Load-Balancer (MetalLB). Google. Visited 15.02.2019. Available at:
https://metallb.universe.tf/
[9] Stanford-Clark, A., Nipper, A. Message Queuing Telemetry Transport (MQTT). Organization
for the Advancement of Structured Information Standards (OASIS). Visited 15.02.2019. Available
at: http://mqtt.org
[10] Jarraya, Y., Madi, T., Debbabi, M., 2014. A Survey and a Layered Taxonomy of Software
Defined Networking. IEEE Communications Surveys & Tutorials 16,1955–1980. URL:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6805151, doi:
10.1109/COMST.2014.2320094.
[11] Kreutz, D., Ramos, F.M.V. , Esteves Verissimo, P., Esteve Rothenberg, C., Azodolmolky, S.,
Uhlig, S., 2015. Software-Defined Networking: A Comprehensive Survey. Proceedings of the IEEE
103,14– 76. URL: http://ieeexplore.ieee.org/document/6994333/,
doi:10.1109/JPROC.2014.2371999.
[12] Taleb, T., Samdanis, K., Mada, B., Flinck, H., Dutta, S., & Sabella, D. (2017). On Multi-Access
Edge Computing:A Survey of the Emerging 5G Network Edge Cloud Architecture and
Orchestration. IEEE Communications Surveys and Tutorials, 19(3), 1657-1681. [7931566].
https://doi.org/10.1109/COMST.2017.2705720
[13] Eugene, TS., Zhang, Hui. Predicting Internet Network Distance with Coordinates-Based
Approaches. Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and
Communications Societies, 2002, DOI: 10.1109/INFCOM.2002.1019258, ISSN: 0743-166X.
Available at: https://www.cs.rice.edu/~eugeneng/papers/INFOCOM02.pdf
[14] Miao, Rui., Hongyi, Zeng., Changhoon, Kim., Jeongkeun, Lee., Minlan, Yu. SilkRoad: Making
Stateful Layer-4 Load Balancing Fast andCheap Using Switching ASICs. Association for Computing
Machinery’s Special Interest Group on Data Communications (SIGCOMM), 2017, DOI:
10.1145/3098822.3098824, ISBN: 78-1-4503-4653-5/17/08. Available at:
https://eastzone.bitbucket.io/paper/sigcomm17-silkroad.pdf
[15] Changhoon, Kim., Sivaraman, Anirudh., Katta, Naga., Bas, Antonin., Wobker, Lawrence J. In-
band Network Telemetry via Programmable Dataplanes. 2015, Visited 12.05.2019. Available at:
https://pdfs.semanticscholar.org/a3f1/9dc8520e2f42673be7cbd8d80cd96e3ec0c1.pdf?_ga=2.76525
46 8.802012735.1559031914-713298922.1559031914
12. [16] Ranganathan, R. A highly available and scalable microservice architecture for access
management. Aalto University, 2018. Available at:
https://aaltodoc.aalto.fi/bitstream/handle/123456789/34401/master_Ranganathan_Rajagopalan_201
8. pdf?sequence=1&isAllowed=y
[17] Rodriguez Yaguache F., Ahola K. Enabling Edge Computing Using Container Orchestration
and Software Defined Wide Area Networks. 9th International Conference on Computer Science,
Engineering and Applications (CCSEA 2019), 353-372. ISBN: 978-1-925953-05-3. Available at:
http://aircconline.com/csit/papers/vol9/csit90930.pdf
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY
AND STEGANOGRAPHY
Saleh Saraireh
Department of Communications and Electronic Engineering, Philadelphia University, Amman,
Jordan
ABSTRACT
The information security has become one of the most significant problems in data communication.
So it becomes an inseparable part of data communication. In order to address this problem,
cryptography and steganography can be combined. This paper proposes a secure communication
system. It employs cryptographic algorithm together with steganography. The jointing of these
techniques provides a robust and strong communication system that able to withstand against
attackers. In this paper, the filter bank cipher is used to encrypt the secret text message, it provide
high level of security, scalability and speed. After that, a discrete wavelet transforms (DWT) based
steganography is employed to hide the encrypted message in the cover image by modifying the
wavelet coefficients. The performance of the proposed system is evaluated using peak signal to noise
ratio (PSNR) and histogram analysis. The simulation results show that, the proposed system provides
high level of security.
KEYWORDS
Steganography, Cryptography, DWT, Filter bank, PSNR
13. For More Details: https://airccse.org/journal/cnc/5313cnc10.pdf
Volume Link: https://airccse.org/journal/ijc2013.html
REFERENCES
[1] Obaida Mohammad Awad Al-Hazaimeh, (2013) "A New Approach for Complex Encrypting and
Decrypting Data" International Journal of Computer Networks & Communications (IJCNC) Vol.5,
No.2.
[2] Katzenbeisser, S. and Petitcolas, F.A.P. 2000, Information Hiding Techniques for Steganography
and Digital Watermarking. Artech House, Inc., Boston, London.
[3] Xinpeng Zhang and Shuozhong Wang, (2005), "Steganography Using MultipleBase Notational
System and Human Vision Sensitivity", IEEE signal processing letters, Vol. 12, No. 1.
[4] Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE signal processing letters, Vol. 13,
No. 5.
[5] Piyush Marwaha, Paresh Marwaha, (2010), "Visual Cryptographic Steganography in images",
IEEE, 2nd International conference on Computing, Communication and Networking Technologies.
[6] G.Karthigai Seivi, Leon Mariadhasan and K. L. Shunmuganathan, (2012), " Steganography Using
Edge Adaptive Image " IEEE, International Conference on Computing, Electronics and Electrical
Technologies.
[7] Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, (2012), " A Secure and High
Capacity Image Steganography Technique", Signal & Image Processing : An International Journal
(SIPIJ) Vol.4, No.1.
14. [8] Tong L.and Zheng-ding, Q, (2002), "DWT-based color Images Steganography Scheme", IEEE
International Conference on Signal Processing, 2:1568-1571.
[9] Mandal J.K. and Sengupta M., (2010), “Authentication/Secret Message Transformation Through
Wavelet Transform based Subband Image Coding (WTSIC).”, Proceedings of International
Symposium on Electronic System Design, IEEE Conference Publications, pp 225 – 229.
[10] Septimiu F. M., Mircea Vladutiu and Lucian P., (2011),"Secret data communication system
using Steganography, AES and RSA", IEEE 17th International Symposium for Design and
Technology in Electronic Packaging.
[11] H. Tian, K. Zhou, Y. Huang, D. Feng, J. Liu, (2008), "A Covert Communication Model Based
on Least Significant Bits Steganography in Voice over IP", IEEE The 9th International Conference
for Young Computer Scientists, pp. 647-652.
[12] Y. Huang, B. Xiao, H. Xiao, (2008), "Implementation of Covert Communication Based on
Steganography", IEEE International Conference on Intelligent Information Hiding and Multimedia
Signal Processing, pp. 1512-1515.
[13] Cheddad, A, Condell, Joan, Curran, K and McKevitt, Paul,(2008), "Securing Information
Content using New Encryption Method and Steganography", IEEE Third International Conference
on Digital Information Management.
[14] Rasul E., Saed F. and Hossein S, (2009), " Using the Chaotic Map in Image Steganography",
IEEE, International Conference on Signal Processing Systems.
[15] Majunatha R. H. S. and Raja K B, (2010), "High Capacity and Security Steganography using
Discrete Wavelet Transform", International Journal of Computer Science and Security (IJCSS), Vol.
3: Issue (6) pp 462-472.
[16] Saraireh S. and Benaissa M., (2009), “A Scalable Block Cipher Design using Filter Banks and
Lifting over Finite Fields” In IEEE International Conference on Communications (ICC), Dresden,
Germany.
[17] El Safy, R.O, Zayed. H. H, El Dessouki. A, (2009), “An adaptive steganography technique based
on integer wavelet transform,” ICNM International Conference on Networking and Media
Convergence, pp 111-117.
15. VISUALIZE NETWORK ANOMALY DETECTION BY USING K-MEANS
CLUSTERING ALGORITHM
A. M. Riad1
, Ibrahim Elhenawy2
, Ahmed Hassan3
and Nancy Awadallah1
1
Faculty of Computer Science and Information Systems, Mansoura University, Egypt
2
Faculty of Computer Science and Information Systems ,Zagazig University, Egypt
3
Faculty of Engineering Mansoura University , Egypt
ABSTRACT
With the ever increasing amount of new attacks in today’s world the amount of data will keep
increasing, and because of the base-rate fallacy the amount of false alarms will also increase. Another
problem with detection of attacks is that they usually isn’t detected until after the attack has taken
place, this makes defending against attacks hard and can easily lead to disclosure of sensitive
information. In this paper we choose K-means algorithm with the Kdd Cup 1999 network data set to
evaluate the performance of an unsupervised learning method for anomaly detection. The results of
the evaluation showed that a high detection rate can be achieve while maintaining a low false alarm
rate .This paper presents the result of using k-means clustering by applying Cluster 3.0 tool and
visualized this result by using TreeView visualization tool .
KEYWORDS
Intrusion detection, Clustering, K-means, Kdd Cup 99, Cluster 3.0, Visualization, TreeView
For More Details: https://airccse.org/journal/cnc/5513cnc14.pdf
Volume Link: https://airccse.org/journal/ijc2013.html
16. REFERENCES
[1] J. F. Nieves ,"Data Clustering for Anomaly Detection in Network Intrusion Detection "
,Research Alliance in Math and Science , August, pp.1-12, 2009 .
[2] L. Portnoy , E. Eskin , S. Stolfo , " Intrusion detection with unlabeled data using clustering",
In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001) ,
Philadelphia , PA,USA ,2001.
[3] E.Eskin, A.Arnold, , M. Prerau, L.Portnoy, S. Stolfo, "A geometric framework for
unsupervised anomaly detection: Detecting intrusions in unlabeled data", Applications of Data
Mining in Computer Security(2002), Norwell, MA, USA, Dec., pp. 78–100,2002.
[4] K. Nyarko, T. Capers, C. Scott, K. Ladeji-Osias,” Network Intrusion Visualization with
NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration”, IEEE, 2002.
[5] K.Labib, V. R. Vemuri, "Anomaly Detection Using S Language Framework: Clustering and
Visualization of Intrusive Attacks on Computer Systems". Fourth Conference on Security and
Network Architectures, SAR'05, Batz sur Mer, France, June 2005
[6] P. Ren , Y. Gao , Z. Li , Y. Chen and B. Watson , “IDGraphs: Intrusion Detection and
AnalysisUsing Histographs” ,IEEE , 2005 .
[7] P. Laskov, K. Rieck, C. Schäfer, K.R. Müller, “Visualization of anomaly detection using
prediction sensitivity”, Proc.of Sicherheit, April 2005, 197- 208.
[8] A. Mitrokotsa, C. Douligeris ,” Detecting Denial of Service Attacks Using Emergent Self-
Organizing Maps” , Signal Processing and Information Technology, 2005. Proceedings of the
Fifth IEEE International Symposium , pp. 375 – 380 ,IEEE,2005.
[9] J. Peng, C. Feng, J.W. Rozenblit , “A Hybrid Intrusion Detection and Visualization System”
, Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International
Symposium and Workshop , , pp. – 506, IEEE ,2006.
[10] X.Cui, J.Beaver, T. Potok and L.Yang , “Visual Mining Intrusion Behaviors by Using
Swarm Technology” , System Sciences (HICSS), 2011 44th Hawaii International Conference ,
pp. 1 – 7, IEEE 2011.
[11] A.Frei, M. Rennhard ,” Histogram Matrix: Log File Visualization for Anomaly Detection”,
IEEE , 2007 .
[12] L. Dongxia , Z. Yongbo ,” An Intrusion Detection System Based on Honeypot Technology”
,Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on
IEEE, Vol.1,2012 .
17. [13] M. Jianliang , S. Haikun, B. Ling, "The Application on Intrusion Detection Based on K-
means Cluster Algorithm" , IFITA '09 Proceedings of the 2009 International Forum on
Information , Technology and Applications – Vol.1,pp. 150-152,IEEE ,2009.
[14] B. K. Kumar , A. Bhaskar , “Identifying Network Anomalies Using Clustering Technique
in Weblog Data”, International Journal of Computers & Technology, Vol. 2 No. 3, June, 2012.
[15] S. Akbar , K.Nageswara Rao , J.A.Chandulal ," Intrusion Detection System Methodologies
Based on Data Analysis",International Journal of Computer Applications ,Vol. 5 , No.2 , August
2010.
[16] K.Bharti, S. Shukla, S. Jain ,"Intrusion detection using clustering", IJCCT, Vol.1 , 2010
[17] S.Jain , M. Aalam , M.Doja , “ K-means clustering using weka interface” , Proceedings of
the 4th National Conference; INDIACom, Computing For Nation Development, 2010.
[18] The Third International Knowledge Discovery and Data Mining Tools Competition, May
2002,Available from http://kdd.ics.uci.edu/databases/kddcup99.kddcup99.html.
[19] M. Sabhnani ,G. Serpen, “Application of Machine Learning Algorithms to KDD Intrusion
Detection Dataset within Misuse Detection Context “, In Proceedings of the International
Conference on Machine Learning, Models, Technologies and Applications (MLMTA 2003),
Vol. 1, (2003).
[20] F.S.Gharehchopogh, Neda Jabbari, Zeinab Ghaffari Azar ,“Evaluation of Fuzzy K-Means
And KMeans Clustering Algorithms In Intrusion Detection Systems” , International Journal of
Scientific & Technology Research ,Vol. 1, issue 11, December 2012.
[21] M. E. Elhamahmy, H. N. Elmahdy , I. A. Saroit ,"A New Approach for Evaluating Intrusion
Detection System" , International Journal of Artificial Intelligent Systems and Machine
Learning, Vol. 2, No 11, November 2010 .
[22] Dr.S.Siva Sathya, Dr. R.Geetha Ramani and K.Sivaselvi. "Discriminant Analysis based
Feature Selection in KDD Intrusion Dataset ", International Journal of Computer Applications
31(11):1-7, October 2011.
[23] P. G.Jeya , M. Ravichandran and C. S. Ravichandran ," Efficient Classifier for R2L and
U2R Attacks. International Journal of Computer Applications 45(21):29-32, May 2012 .
[24] F. N. M. Sabri, N. M.Norwawi, K. Seman," "Identifying False Alarm Rates for Intrusion
Detection System with Data Mining", International Journal of Computer Science and Network
Security, VOL. 11 No. 4, April 2011
[25] P. Divya , R. Priya," Clustering Based Feature Selection and Outlier Analysis
",International Journal of Computer Science & Communication Networks, Vol 2(6), pg.647-
652.
18. [26] C.Ahlberg, B. Shneiderman ,” Visual information seeking: tight coupling of dynamic query
filters with starfield displays” , In proceeding of: Conference on Human Factors in Computing
Systems, CHI 1994, Boston, Massachusetts, USA, pp. 313-317,April 24-28, 1994.
[27] S. Noel , M. Jacobs , P. Kalapa , S. Jajodia “Multiple Coordinated Views for Network
Attack Graphs”, Visualization for Computer Security,.(VizSEC 05). IEEE Workshop on, 99-
106,2005
[28]http://www.researchgate.net/publication/27521564_The_Information_Mural_A_Techniqu
e_for_ Displaying_and_Navigating_Large_Information_Spaces
[29] http://www.ukessays.com/essays/information-technology/intrusion-detection-system-
methodologiesdata-analysis-information-technology-essay.php
[30] http://dl.acm.org/citation.cfm?id=1106724
[31] http://www.computer.org/csdl/proceedings/vizsec/2005/2782/00/27820005-abs.html
[32] http://dl.acm.org/citation.cfm?id=1106719
[33] Ms. P. K. Karmore and MS. S. T. Bodkhe ,"A Survey on Intrusion in Ad Hoc Networks
and its Detection Measures" , International Journal on Computer Science and Engineering
(IJCSE) ,3(5),pp.1896-1903,May 2011 .
[34] http://bonsai.hgc.jp/~mdehoon/software/cluster/cluster3.pdf - Last visiting at 21.06.2013.
On the Migration of a Large Scale Network from IPv4 to IPv6 Environment
Muhammad Yeasir Arafat1
, Feroz Ahmed2
and M Abdus Sobhan3
Department of Electrical and Electronic Engineering, School of Engineering and Computer
Science, Independent University, Bangladesh
ABSTRACT
This work mainly addresses the design a large scale network using dual stack mechanisms. We
focused on the most important theoretical concepts of the IPv6 protocol, such as addressing, address
19. allocation, routing with the OSPF and BGP protocols and routing protocols performance in dual
stack network using GNS3 and Wireshark simulators. we have a tendency to measure a perfect model
and a true large-scale network atmosphere victimization out there end-to-end activity techniques that
focuses on a large-scale IPv4 and IPv6 backbone and created performance the IPv4 and IPv6
network. In this paper, we compiled IPv6 address planning in large scale network, performance
statistics of each network in terms of TCP throughput, delay jitters, packet loss rate, and round trip
time. It is found that, a minor degradation within the throughput of the TCP, delay jitter, a lower
packet loss rate, and a rather longer round trip time are occurred in a real large scale dual stack
network.
KEYWORDS
IPv6, IPv4, double stack, BGPv4, OSPFv3, ISP, throughput, TCP and RTT
For More Details: https://airccse.org/journal/cnc/6214cnc10.pdf
Volume Link: https://airccse.org/journal/ijc2014.html
REFERENCES
[1] Tahir Abdullah, Shahbaz Nazeer, Afzaal Hussain, “NETWORK MIGRATION AND
PERFORMANCE ANALYSIS OF IPv4 AND IPv6”, European Scientific Journal, vol. 8, No.5, 2013
[2] Lefty Valle-Rosado, Lizzie Narváez-Díaz, Cinhtia González-Segura and Victor Chi-Pech,
“Design and Simulation of an IPv6 Network Using Two Transition Mechanisms”, IJCSI
International Journal of Computer Science Issues, Vol.9, No.6, pp: 60-65, Nov. 2012.
[3] Internet Engineering Task Force (IETF) RFC 6052, 3513, 4291, 6104, http://tools.ietf.org/html/
[4] Febby Nur Fatah, Adang Suhendra , M Akbar Marwan , Henki Firdaus Henki Firdaus ,
“Performance Measurements Analysis of Dual Stack IPv4-IPv6”, Proc. of the Second Intl.
Conference on Advances in Information Technology — AIT, 2013..
[5] Y. Wang, S. Ye, and X. Li, “Understanding Current IPv6 Performance: A Measurement Study”,
20. 10th IEEE Symposium on Computer Communications, June 2005.
[6] Cebrail CIFLIKLI, Ali GEZER and Abdullah Tuncay OZSAHIN, “Packet traffic features of IPv6
and IPv4 protocol traffic, Turk”, J Elec Eng & Comp Science, Vol.20, No5, pp: 727-749, 2012
[7] Alex Hinds, Anthony Atojoko, and Shao Ying Zhu, “Evaluation of OSPF and EIGRP Routing
Protocols for IPv6”, International Journal of Future Computer and Communication (IJFCC), Vol.2,
No.4, pp: 287-291, Aug. 2013.
[8] T. Bates, R. Chandra, D. Katz, and Y. Rekhter, “Multiprotocol Extensions for BGP-4,” Internet
Request for Comments, vol. RFC 4760, Jan. 2007.
[9] Ing. Luis Marrone, Lic. Andr´es Barbieri and Mg. Mat ‘as Robles, “TCP Performance - CUBIC,
Vegas & Reno”, JCS&T, Vol.13, No.1, pp:1-8, April 2013
[10] Kevin R. Fall and W. Richard Stevens, “TCP/IP Illustrated”, volume 1, published by
Addisonwisely professional computer series, Pearson Education, 2012
21. PERFORMANCE ANALYSIS AND MONITORING OF VARIOUS
ADVANCED DIGITAL MODULATION AND MULTIPLEXING
TECHNIQUES OF F.O.C WITHIN AND BEYOND 400 GB/S.
Sumant Ku. Mohapatra, Ramya Ranjan Choudhury, Rabindra Bhojray and Pravanjan Das
Department of Electronics & Telecommunication Engineering, Trident Academy of
Technology, B.P.U.T, Bhubaneswar, Odisha, India
ABSTRACT
To achieve better calculative performance in optical fiber communication and for simplicity of
implementation different digital modulation, detection and multiplexing techniques are used.
These techniques maximize the spectral efficiency. This paper reviews a tabular comparative
analysis with 3D graphical representation for different optical digital modulation formats and
multiplexing techniques within and beyond 400 Gb/s. In this particular article we survey about
different parameters related to digital fiber optic communication.
KEYWORDS
OFDM, Digital Modulation formats, Multiplexing techniques, QAM & WDM.
For More Details : https://airccse.org/journal/cnc/6214cnc13.pdf
Volume Link : https://airccse.org/journal/ijc2014.html
22. REFERENCES
[1] K.-P. Ho, “Exact evaluation of the capacity for intensity-modulated direct-detection channels
with optical mplifier noises,” IEEE Photon. Technol. Lett. 17, 858−860 (2005).
[2] T. Pfau, S. Hoffmann, R. Peveling, S. Bhandard, S. Ibrahim, O. Adamczyk, M. Porrmann, R.
Noé and Y. Achiam, “First real-time data recovery for synchronous QPSK transmission with
standard DFB lasers,” IEEE Photon. Technol. Lett. 18, 1907–1909 (2006).
[3] A. Leven, N. Kaneda, U.-V. Koc and Y.-K. Chen, “Coherent receivers for practical optical
communication systems,” in Proceedings of IEEE Conference on Optical Fiber Communications,
(Institute of Electrical and Electronics Engineers, Anaheim, 2007), Paper OThK4.
[4] J. Hongo, K. Kasai, M. Yoshida and M. Nakazawa, “1-Gsymbol/s 64-QAM coherent optical
transmission over 150 km,” IEEE Photon. Technol. Lett. 19, 638–640 (2007).
[5] M. Nazarathy and E. Simony, “Multichip differential phase encoded optical transmission,”
IEEE Photon. Technol. Lett. 17, 1133–1135 (2005).
[6] D. Divsalar and M. Simon, “Multiple-symbol differential detection of MPSK,” IEEE Trans.
Commun. 38, 300–308 (1990).
[7] S. Benedetto and P. Poggiolini, “Theory of polarization shift keying modulation,” IEEE Trans.
Commun. 40, 708−721 (1992).
[8] E. Ip and J.M. Kahn, “Digital equalization of chromatic dispersion and polarization mode
dispersion,” J. Lightwave Technol. 25, 2033-2043 (2007).
[9] S. Tsukamoto, K. Katoh and K. Kikuchi, “Coherent demodulation of optical multilevel
phaseshift-keying signals using homodyne detection and digital signal processing,” IEEE Photon.
Technol. Lett. 18, 1131– 1133 (2006).
[10] C. D. Poole, R. W. Tkach, A. R. Chraplyvy and D. A.Fishman, “Fading in lightwave
systems due to polarization-mode dispersion,” IEEE Photon. Technol. Lett. 3, 68–70 (1991).
[11] H. Bülow, W. Baumert, H. Schmuck, F. Mohr, T. Schulz, F. Küppers and W. Weiershausen,
“Measurement of the maximum speed of PMD fluctuation in installed field fiber,” in Proceedings
of IEEE Conference on Optical Fiber Communications, (Institute of Electrical and Electronics
Engineers, San Diego, 1999), Paper OWE4.
[12] H. Sunnerud, C. Xie, M. Karlsson, R. Samuelsson and P. Andrekson, “A comparison
between different PMD compensation techniques,” J. Lightwave Technol. 20, 368–378 (2002)..
[13] K.-P. Ho, Phase-Modulated Optical Communication Systems, (Springer, New York, 2005).
[14] K.-P. Ho and J. M. Kahn, “Detection technique to mitigate Kerr effect phase noise,” J.
Lightwave Technol. 22, 779−783 (2004).
23. [15] A. P. T. Lau and J. M. Kahn, “Signal design and detection in presence of nonlinear phase
noise,” J. Lightwave Technol. 25, 3008−3016 (2007).
[16] S.K Mohapatra, R. Bhojray and S.K Mandal, “Analog And Digital Modulation Formats Of
Optical Fiber Communication Within And Beyond 100 Gb/S: A Comparative Overview”,IJECET
Volume 4, Issue 2, March – April, 2013, ISSN-0976-6472(online).
[17] IEEE Std 802.3ba-2010, Amendment to IEEE Std 802.3-2008: Media Access control
parameters, physical layers, and management parameter for 40 Gb/s and 100 Gb/s operation, June
2010. [18] Gizem, Aksahya & Ayese, Ozcan (2009) Coomunications & Networks, NetworkBooks,
ABC Publishers.
[18] P.J. Winzer et al., 10 _ 107-Gb/s NRZ-DQPSK transmission at 1.0 b/s/Hz over 12 _ 100 km
including 6 optical routing nodes, in: Proc. OFC 2007, post deadline paper PDP24.
[19] K. Kikuchi, “Coherent detection of phase-shift keying signals using digital carrier-phase
estimation,” in Proceedings of IEEE Conference on Optical Fiber Communications, (Institute of
Electrical and Electronics Engineers, Anaheim, 2006), Paper OTuI4.
[20] P. Serena, A. Orlandini and A. Bononi, “Parametric-Gain approach to the analysis of
singlechannel DPSK/DQPSK systems with nonlinear phase noise,” J. Lightwave Technol. 24,
2026−2037 (2006).
[21] K.P. Ho and H.C. Wang, “Comparison of nonlinear phase noise and intrachannel four-wave
mixing for RZDPSK signals in dispersive transmission systems,” IEEE Photon. Technol. Lett.
17, 1426−1428 (2005).
[22] K. Kikuchi, “Phase-diversity homodyne detection of multilevel optical modulation with
digital carrier phase estimation,” J. Sel. Top. Quantum Electron. 12, 563−570 (2006).
[23] M. G. Taylor, “Accurate digital phase estimation process for coherent detection using a
parallel digital processor,” in Proceedings ECOC 2005, Glasgow, UK, 2005, Paper Tu4.2.6.
[24] D.-S. Ly-Gagnon, S. Tsukamoto, K. Katoh and K. Kikuchi, “Coherent detection of optical
quadrature phase-shift keying signals with coherent phase estimation,” J. Lightwave Technol. 24,
12–21, (2006).
[25] W. Shieh, X. Yi, and Y. Tang, “Experimental demonstration of transmission of coherent
optical OFDM Systems,” in Proceedings of IEEE Conference on Optical Fiber Communications,
(Institute of Electrical and Electronics Engineers, Anaheim, 2007), Paper OMP2.
[26] W. Shieh and C. Athaudage, “Coherent optical orthogonal frequency division
multiplexing,” Electron. Lett. 42, 587−589 (2006).
[27] N. Cvijetic, L. Xu and T. Wang, “Adaptive PMD compensation using OFDM in long-haul
10 Gb/s DWDM systems,” in Proceedings of IEEE Conference on Optical Fiber
24. Communications, (Institute of Electrical and Electronics Engineers, Anaheim, 2007), Paper
OTuA5
[28] A. Lowery and J. Armstrong, “Orthogonal-frequency-division multiplexing for optical
dispersion compensation,” in Proceedings of IEEE Conference on Optical Fiber Communications,
(Institute of Electrical and Electronics Engineers, Anaheim, 2007), PaperOTuA4.
[29] J. Jang, K. B. Lee and Y.-H. Lee, “Transmit power and bit allocations for OFDM systems in
a fading channel,” in Proceedings of IEEE GLOBECOM, (Institute of Electrical and Electronics
Engineers, San Francisco, 2003), pp. 858−862.
[30] D.-S. Ly-Gagnon, “Information recovery using coherent detection and digital signal
pocessing for phaseshift- keying modulation formats in optical communication systems,” M.S.
Thesis, University of Tokyo (2004).
[31] Eugen Lach,Wilfried Idler “modulation formats for 100 G and beyond” ELSEIVIER optical
fiber technology 17(2011) 377-386.
[32] J. M. Kahn and K.-P. Ho, “Spectral efficiency limits and modulation/detection techniques
for DWDM Systems,” ,” J. Sel. Top. Quantum Electron. 10, 259–271 (2004).
[33] M. Rohde,C.Caspar,N.Heimes,M.Konitzer,E-J.Bachus and N.Hanik, “Robustness of DPSK
direct detection transmission format in standard fiber WDM systems” Electron.Lett,vol
36,pp.1483-1484,2000.
[34] W. Idler et al., WDM field trial over 764 km SSMF with 16 _ 112 Gb/s NRZDQPSK
copropagating with 10.7 Gb/s NRZ, in: ECOC 2010, paper We.8.C.5.
[35] Sano et al., 14-Tb/s (140 _ 111-Gb/s PDM/WDM) CSRZ-DQPSK transmission over 160
km using 7-THz bandwidth extended L-band EDFAs, in: ECOC 2006, post- Deadline paper
Th4.1.1.
[36] W. Idler et al., 16 _ 112 Gb/s NRZ-DQPSK WDM transmission over 604 km SSMF including
high PMD fibers, in: OECC 2010, paper 9B1-2.
[37] Michael H. Eiselt et al., Requirements for 100-Gb/s metro networks, in: OFC 2009, paper
OTuN6.
[38] Brian Teipen et al., 100 Gb/s DPSK-3ASK modulation format for metro networks:
experimental results, in: ITG Photonische Netze, 2009.
[39] M. Eiselt, B. Teipen, DPSK-3ASK transmission optimization by adapting modulationLevels,
in: APOC 2008, paper 3171-17.
25. [40] Xiang Liu et al., Transmission of a 448-Gb/s reduced-guard-interval COOFDM signal with
a 60-GHz optical bandwidth over 2000 km of ULAF and five 80-GHz-grid ROADMs, in: OFC
2010, post deadline paper PDPC2.
[41] K. Roberts et al., 100G and beyond with digital coherent signal processing, IEEE Commun.
Mag. (2010) 62–69.
[42] Xiang Zhou, Jianjun Yu, Advanced coherent modulation formats and algorithms: higher-
order multi-level coding for high-capacity system based on 100 Gbps channel, in: OFC 2010, paper
OMJ3.
[43] G. Bosco et al., Performance limits of Nyquist-WDM and CO-OFDM in high speed PM-
QPSK systems,IEEE Photon. Technol. Lett. 22 (2010) 1129–1131.
[44] G. Bosco et al., Performance limits of Nyquist-WDM and CO-OFDM in high speed PM-
QPSK systems,IEEE Photon. Technol. Lett. 22 (2010) 1129–1131.
[45] Xiang Liu et al., Efficient digital coherent detection of a 1.2-Tb/s 24-carrier no-guard-
interval CO-OFDM signal by simultaneously detecting multiple carriers per sampling, in: OFC
2010, paper OWO2.
[46] P. Hofmann, E. E. Basch, S. Gringeri, R. Egorov, D. A. Fishman, and W. A. Thompson,
“DWDM Long Haul Network Deployment for the Verizon GNI Nationwide Network,” Proc.
Optical Fiber Communication Conf. (OFC „05), Vol. 2, (2005).
[47] M. Nakazawa et al., 256 QAM (64 Gb/s) coherent optical transmission over 160 km with an
optical bandwidth of 5.4 GHz, in: OFC 2010, paper OMJ5.
[48] A. Sano et al., 100 _ 120-Gb/s PDM 64-QAM transmission over 160 km using line
widthtolerant pilotless digital coherent detection, in: ECOC 2010, post deadline paper PD2.4.
[49] M. Alfiad et al., Transmission of 11 _ 224 Gb/s POLMUX-RZ-16QAM over 1500 km of
LongLine and pure-silica SMF, in: ECOC 2010, paper We.8.C.2.
[50] T. Xia et al., Field experiment with mixed line-rate transmission (112 Gb/s, 450 Gb/s, and
1.15 Tb/s) over 3560 km of installed fiber using filter less coherent receiver and EDFAs only, in:
OFC 2011, PDPA3.
[51] Y. More et al., 200-km transmission of 100-Gb/s 32-QAM dual-polarization signals using a
digital coherent receiver, in: ECOC 2010, paper 8.4.6.
[52] S. Okamoto et al., 512 QAM (54 Gb/s) coherent optical transmission over 150 km with an
optical bandwidth of 4.1 GHz, in: ECOC 2010, post-deadline paper.
[53] M. Rhode, C. Caspar, N. Heimes, M. Konitzer, E. J. Bachus, and N. Hanik, “ Robustness of
DPSK direct detection transmission format in standard fiber WDM systems,” Electronics Letters,
26(17):1483–1484, August 2000.
[54] C. Wree, J. Leibrich, and W. Rosenkranz, “RZ-DQPSK format with high spectral efficiency
and high robustness towards fiber nonlinearities,” European Conference on Optical
Communication (ECOC), 4(9.6.6), September 2002.
26. [55] Abhijit Banerjee and B. N. Biswas, “Stability Analysis of a Modified PSK Homodyne Optical
Receiver”, International Journal of Electronics and Communication Engineering & Technology
(IJECET), Volume 3, Issue 2, 2012, pp. 32 - 40, ISSN Print: 0976- 6464, ISSN Online: 0976 –
6472.
[56] C.Xie,L.Moller,H.Haunstein and S.Hunsche “comparison of system tolerance to
polarization mode dispersion between different modulation formats” , IEEE photons.
Technol.Lett.vol.15,pp.1168-1170,Aug.2003
[57] Yu Yu,Bingrong zou,Wenhan Wu and Xinliang zhang “all optical parallel NRZ- DPSK to
RZ-DPSK format conversion at 40 Gb/s based on XPM effect in a single SOA”.
[58] I. Morita et al., High speed transmission technologies for 100-Gb/s-classEthernet, in: ECOC
2007, invited paper Mo1.3.1.
[59] M. Daikoku et al., 100-Gb/s DQPSK transmission experiment without OTDMfor 100G
Ethernet transport, J. Lightw. Technol. 25 (1) (2007).
[60] M. Daikoku, I. Morita, H. Taga, H. Tanaka, T. Kawanishi, T. Sakamoto, T.Miyazaki, T.
Fujita,100 Gb/s DQPSK transmission experiment without OTDMfor 100G Ethernet transport, in:
OFC 2006, post-deadline paper PDP36.
[61] P.J. Winzer et al., 2000 km-WDM transmission of 10 _ 107 Gb/s RZ-DQPSK, in:, ECOC
2006, Cannes, post-deadline paper Th4.1.3.
[62] Xiang Zhou, Jianjun Yu, Mei Du, Guodong Zhang, 2 Tb/s (20 _ 107 Gb/s) RZDQPSK
straight-line transmission over 1005 km of standard single mode fiber (SSMF) without Raman
amplification in: Proc. OFC 2008, paper OMQ3.
[63] G. Raybon et al., 107-Gb/s transmission over 700 km and one intermediate ROADMusing
Lambda Xtreme_ transport system, in: OFC 2008, paper OMQ4.
[64] Mei Du et al., Unrepeatered transmission of 107 Gb/s RZ-DQPSK over 300 km NZDSF
with bi-directional Raman amplification, in: Proc. OFC 2008, paper JThA47.
[65] Brian Teipen, Impact of modulator characteristicson multi-level signal Transmission
performance, in: ITG Workshopp Fachgruppe 5.3.1, 2008 (Kiel).
27. [66] Brian Teipen et al., 107 Gb/s DPSK-3ASK optical transmission over SSMF, in:OFC 2010,
paper NMB1.
[67] ITU-T Recommendation G.709, Interfaces for the Optical Transport Network (OTN),
December 2009.
[68] M. Eiselt, B.Teipen, DPSK-3ASK transmission optimization by adapting modulation
Levels, in: APOC 2008, paper 3171-17.
[69] D. van den Borne et al., Coherent equalization versus direct detection for 111- Gb/s Ethernet
transport, in: LEOS Summer Topical Meeting, 2008, paper MA2-4.
[70] J.X. Cai et al., 20Tbit/s capacity transmission over 6860 km, in: Proceedings OFC, 2011,
PDPB4.
[71] A.H. Gnauck et al., 10 _ 224-Gb/s WDM transmission of 28-Gbaud PDM 16-QAM on a 50-
GHz grid over 1200 km of fiber, in: OFC 2010, post deadline paper PDPB8.
[72] P.J. Winzer et al., Spectrally efficient long-haul optical networking using 112- Gb/s
polarizationmultiplexed 16-QAM, J. Lighw. Technol. 28 (4) (2010).
[73] M. Alfiad et al., Transmission of 11 _ 224 Gb/s POLMUX-RZ-16QAM over 1500 km of
LongLine and pure-silica SMF, in: ECOC 2010, paper We.8.C.2.
[74] P.J. Winzer et al., Generation and 1200-km transmission of 448-Gb/s ETDM 56-Gbaud
PDM 16-QAM using a single I/Q modulator, in: ECOC 2010, post dead line paper PD2.2.
[75] B.-E. Olsson et al., RF-assisted optical dual-carrier 112 Gb/s polarization multiplexed 16-
QAM transmitter, in: OFC 2010, paper OMK5.
[76] William Shieh, OFDM for adaptive ultra high-speed optical networks, in: OFC2010, paper
OWO1.
[77] Fred Buchali et al., Nonlinear limitations in a joint transmission of 100 Gb/s OOFDM and 40
Gb/s DPSK over a 50 GHz channel grid, in: OFC 2010, paper OTuL4.
[78] S. Chandrasekhar et al., Transmission of a 1.2-Tb/s 24-carrier no-guard interval coherent
OFDM super channel over 7200-km of ultra-large-area fiber, in: ECOC 2009, post- deadline paper
PD 2.6.
[79] Haiying Julie Zhu, Roshdy H.M. Hafez and John Sydor, “Cross Layer Scheduling Algorithms for
Different Rate Traffic OFDM Broadband Wireless Systems ” , IJCNC Vol No.1,No.3,October 2009
[80] Asim M. Mazin and Garth V. Crosby, “Reducing the Peak Average Power Ratio of MIMO- OFDM
Systems”, IJCNC Vol.5, No.3, May 2013.
28. A DEEP LEARNING TECHNIQUE FOR WEB PHISHING DETECTION
COMBINED URL FEATURES AND VISUAL SIMILARITY
Saad Al-Ahmadi1
and Yasser Alharbi 2
1
College of Computer and Information Science, Computer Science Department, King Saud
University, Riyadh, Saudi Arabia 2
College of Computer and Information Science, Computer
Engineering Department, King Saud University, Riyadh, Saudi Arabia
ABSTRACT
The most popular way to deceive online users nowadays is phishing. Consequently, to increase
cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper,
we propose an approach that rely on websites image and URL to deals with the issue of phishing
website recognition as a classification challenge. Our model uses webpage URLs and images to
detect a phishing attack using convolution neural networks (CNNs) to extract the most important
features of website images and URLs and then classifies them into benign and phishing pages. The
accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the
proposed model in detecting a web phishing attack.
KEYWORDS
Phishing detection, URL, visual similarity, deep learning, convolution neural network.
For More Details: https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf
Volume Link: https://airccse.org/journal/ijc2020.html
29. REFERENCES
[1] H. Thakur, “Available Online at www.ijarcs.info A Survey Paper On Phishing Detection,” vol.
7, no. 4, pp. 64–68, 2016.
[2] G. Varshney, M. Misra, and P. K. Atrey, “A survey and classification of web phishing detection
schemes,” Security and Communication Networks. 2016, doi: 10.1002/sec.1674.
[3] E. S. Aung, T. Zan, and H. Yamana, “A Survey of URL-based Phishing Detection,” pp. 1–8,
2019, [Online]. Available: https://db-event.jpn.org/deim2019/post/papers/201.pdf.
[4] S. Nakayama, H. Yoshiura, and I. Echizen, “Preventing false positives in content-based phishing
detection,” in IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding
and Multimedia Signal Processing, 2009, doi: 10.1109/IIH-MSP.2009.147.
[5] A. K. Jain and B. B. Gupta, “Phishing detection: Analysis of visual similarity based approaches,”
Security and Communication Networks. 2017, doi: 10.1155/2017/5421046.
[6] A. Khan, A. Sohail, U. Zahoora, and A. S. Qureshi, “A Survey of the Recent Architectures of
Deep Convolutional Neural Networks,” pp. 1–68, 2019, doi: 10.1007/s10462-020-09825-6.
[7] J. Mao et al., “Phishing page detection via learning classifiers from page layout feature,” Eurasip
J. Wirel. Commun. Netw., 2019, doi: 10.1186/s13638-019-1361-0.
[8] I. F. Lam, W. C. Xiao, S. C. Wang, and K. T. Chen, “Counteracting phishing page polymorphism:
An image layout analysis approach,” in Lecture Notes in Computer Science (including subseries
Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2009, doi:
10.1007/978-3-642- 02617-1_28.
[9] T. C. Chen, T. Stepan, S. Dick, and J. Miller, “An anti-phishing system employing diffused
information,” ACM Trans. Inf. Syst. Secur., vol. 16, no. 4, 2014, doi: 10.1145/2584680.
[10] A. S. Bozkir and E. A. Sezer, “Use of HOG descriptors in phishing detection,” in 4th
International Symposium on Digital Forensics and Security, ISDFS 2016 - Proceeding, 2016, doi:
10.1109/ISDFS.2016.7473534.
[11] F. C. Dalgic, A. S. Bozkir, and M. Aydos, “Phish-IRIS: A New Approach for Vision Based
Brand Prediction of Phishing Web Pages via Compact Visual Descriptors,” ISMSIT 2018 - 2nd Int.
Symp. Multidiscip. Stud. Innov. Technol. Proc., 2018, doi: 10.1109/ISMSIT.2018.8567299.
[12] K. L. Chiew, E. H. Chang, S. N. Sze, and W. K. Tiong, “Utilisation of website logo for phishing
detection,” Comput. Secur., 2015, doi: 10.1016/j.cose.2015.07.006.
[13] K. L. Chiew, J. S. F. Choo, S. N. Sze, and K. S. C. Yong, “Leverage Website Favicon to Detect
Phishing Websites,” Secur. Commun. Networks, 2018, doi: 10.1155/2018/7251750.
[14] Y. Zhou, Y. Zhang, J. Xiao, Y. Wang, and W. Lin, “Visual similarity based anti-phishing with
the combination of local and global features,” in Proceedings - 2014 IEEE 13th International
Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014,
2015, doi: 10.1109/TrustCom.2014.28.
30. [15] A. P. E. Rosiello, E. Kirda, C. Kruegel, and F. Ferrandi, “A layout-similarity-based approach
for detecting phishing pages,” in Proceedings of the 3rd International Conference on Security and
Privacy in Communication Networks, SecureComm, 2007, doi: 10.1109/SECCOM.2007.4550367.
[16] J. Mao, P. Li, K. Li, T. Wei, and Z. Liang, “BaitAlarm: Detecting phishing sites using similarity
in fundamental visual features,” in Proceedings - 5th International Conference on Intelligent
Networking and Collaborative Systems, INCoS 2013, 2013, doi: 10.1109/INCoS.2013.151.
[17] S. Haruta, H. Asahina, and I. Sasase, “Visual Similarity-Based Phishing Detection Scheme
Using Image and CSS with Target Website Finder,” in 2017 IEEE Global Communications
Conference, GLOBECOM 2017 - Proceedings, 2017, doi: 10.1109/GLOCOM.2017.8254506.
[18] H. Zhang, G. Liu, T. W. S. Chow, and W. Liu, “Textual and visual content-based anti-phishing:
A Bayesian approach,” IEEE Trans. Neural Networks, 2011, doi: 10.1109/TNN.2011.2161999.
[19] E. Medvet, E. Kirda, and C. Kruegel, “Visual-similarity-based phishing detection,” Proc. 4th
Int. Conf. Secur. Priv. Commun. Networks, Secur., no. September 2008, 2008, doi:
10.1145/1460877.1460905.
[20] S. G. Selvaganapathy, M. Nivaashini, and H. P. Natarajan, “Deep belief network based detection
and categorization of malicious URLs,” Inf. Secur. J., vol. 27, no. 3, pp. 145–161, 2018, doi:
10.1080/19393555.2018.1456577.
[21] Y. Ding, N. Luktarhan, K. Li, and W. Slamu, “A keyword-based combination approach for
detecting phishing webpages,” Comput. Secur., vol. 84, pp. 256–275, 2019, doi:
10.1016/j.cose.2019.03.018.
[22] H. huan Wang, L. Yu, S. wei Tian, Y. fang Peng, and X. jun Pei, “Bidirectional LSTM Malicious
webpages detection algorithm based on convolutional neural network and independent recurrent
neural network,” Appl. Intell., vol. 49, no. 8, pp. 3016–3026, 2019, doi: 10.1007/s10489-019-01433-
4.
[23] M. Zouina and B. Outtaj, “A novel lightweight URL phishing detection system using SVM and
similarity index,” Human-centric Comput. Inf. Sci., vol. 7, no. 1, pp. 1–13, 2017, doi:
10.1186/s13673-017-0098-1.
[24] S. Parekh, D. Parikh, S. Kotak, and S. Sankhe, “A New Method for Detection of Phishing
Websites: URL Detection,” Proc. Int. Conf. Inven. Commun. Comput. Technol. ICICCT 2018, no.
Icicct, pp. 949–952, 2018, doi: 10.1109/ICICCT.2018.8473085.
[25] H. Le, Q. Pham, D. Sahoo, and S. C. H. Hoi, “URLNet: Learning a URL Representation with
Deep Learning for Malicious URL Detection,” no. i, 2018, [Online]. Available:
http://arxiv.org/abs/1802.03162.
[26] J. Saxe and K. Berlin, “eXpose: A Character-Level Convolutional Neural Network with
Embeddings For Detecting Malicious URLs, File Paths and Registry Keys,” 2017, [Online].
Available: http://arxiv.org/abs/1702.08568.
[27] K. Shima et al., “Classification of URL bitstreams using bag of bytes,” 21st Conf. Innov. Clouds,
Internet Networks, ICIN 2018, pp. 1–5, 2018, doi: 10.1109/ICIN.2018.8401597.
31. [28] R. Vinayakumar, K. P. Soman, and P. Poornachandran, “Evaluating deep learning approaches
to characterize and classify malicious URL’s,” J. Intell. Fuzzy Syst., vol. 34, no. 3, pp. 1333–1343,
2018, doi: 10.3233/JIFS-169429.
[29] O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection
from URLs,” Expert Syst. Appl., vol. 117, pp. 345–357, 2019, doi: 10.1016/j.eswa.2018.09.029.
[30] W. Wang, F. Zhang, X. Luo, and S. Zhang, “PDRCNN: Precise Phishing Detection with
Recurrent Convolutional Neural Networks,” Secur. Commun. Networks, 2019, doi:
10.1155/2019/2595794.
[31] S. Khan, H. Rahmani, S. A. A. Shah, and M. Bennamoun, “A Guide to Convolutional Neural
Networks for Computer Vision,” Synth. Lect. Comput. Vis., 2018, doi:
10.2200/s00822ed1v01y201712cov015.
[32] V. Karthikeyani and S. Nagarajan, “Machine Learning Classification Algorithms to Recognize
Chart Types in Portable Document Format (PDF) Files,” Int. J. Comput. Appl., 2012, doi:
10.5120/4789- 6997.
[33] M. A. Adebowale, K. T. Lwin, and M. A. Hossain, “Deep learning with convolutional neural
network and long short-term memory for phishing detection,” 2019 13th Int. Conf. Software,
Knowledge, Inf. Manag. Appl. Ski. 2019, no. March 2019, doi:
10.1109/SKIMA47702.2019.8982427.
[34] C. Opara, B. Wei, and Y. Chen, “HTMLPhish: Enabling Phishing Web Page Detection by
Applying Deep Learning Techniques on HTML Analysis,” no. October 2018, 2019, [Online].
Available: http://arxiv.org/abs/1909.01135.
32. A COMPREHENSIVE STUDY OF DSCP MARKINGS' IMPACT ON
VOIP QOS IN HFC NETWORKS
Shaher Daoud and Yanzhen Qu
School of Computer Science, Colorado Technical University, Colorado Springs, USA
ABSTRACT
Various factors can have a significant degrading impact on the residential Voice over Internet
Protocol (VoIP) phone services’ quality. Hybrid fibre- coaxial (HFC) networks typically carry three
types of traffic that include voice, data, and video. Unlike data and video, some delays or packet loss
can result in a noticeable degraded impact on a VoIP’s phone conversation. This paper will analyze
and assess VoIP traffic prioritization and its impact on VoIP’s quality of service (QoS) based on the
concept of differentiated services code point (DSCP) markings. Call testing examines two types of
calls. The first set of tests focus on calls that originate from a VoIP network and terminate on a
signalling system 7 (SS7) network. The second experiment focuses on calls that originate from SS7
network and terminate on a VoIP network. The research results provide DSCP markings
configurations that can improve phone conversations’ quality.
KEYWORDS
QoS , VoIP, DSCP Marking , jitter, HFC Network, MOS.
For More Details: https://aircconline.com/ijcnc/V11N5/11519cnc01.pdf
Volume Link: https://airccse.org/journal/ijc2019.html
33. REFERENCES
[1] Daoud, S., & Qu, Y. (2019). A Comparison Research on DSCP Marking’s Impact to the QoS
of VoIP-based and SS7-based Phone Calls.
[2] Daoud, S., & Qu, Y. (2019). Optimizing DSCP Marking to Ensure VoIP’s QoS over HFC
Network.
[3] Mathiyalakan, S. (2015). VoIP adoption: Issues & concerns. Communications of the IIMA,
6(2), 3.
[4] Khitmoh, N., Wuttidittachotti, P., & Daengsi, T. (2014, February). A subjective—VoIP quality
estimation model for G. 729 based on native Thai users. In Advanced Communication Technology
(ICACT), 2014 16th International Conference on (pp. 48-53). IEEE.
[5] Xiao, Y., Qu, G., & Kiseon, K. (2015). A new DiffServ edge router with controlled UDP.
Chinese Journal of Electronics, 24(1).
[6] Kamarudin, I. E., Sharif, S. A. M., & Herawan, T. (2013). Performance analysis on the effect
of G. 729, Speex and GSM speech codec on 802.11 g wireless local area network over VoIPvusing
packet jitter. International Journal of Control and Automation, 6(4), 387-395.
[7] Broß, J. F., & Meinel, C. (2008). Can VoIP live up to the QoS standards of traditional wireline
telephony? In Telecommunications, 2008. AICT'08. Fourth Advanced International Conference
on (pp. 126-132). IEEE.
[8] Singh, P. & Kaur, R. (2014). VOIP over Wimax: A comprehensive review. International
Journal of Computer Science & Information Technologies, 5(4).
[9] Yuan, Z. (2002). SIP-based VoIP network and its interworking with the PSTN. Electronics &
Communication Engineering Journal, 14(6), 273-282.
[10] Ali, M. A., Rashid, I., & Khan, A. A. (2013). Selection of VoIP CODECs for different
networks based on QoS analysis. International Journal of Computer Applications (IJCA), 84(5),
14575-2702.
[11] Chen, J. J., Lee, L., & Tseng, Y. C. (2011). Integrating SIP and IEEE 802.11 e to support
handoff and multi-grade QoS for VoIP-over-WLAN applications. Computer Networks, 55(8),
1719-1734.
[12] Assem, H., Malone, D., Dunne, J., & O'Sullivan, P. (2013, January). Monitoring VoIP call
quality using improved simplified E-model. In Computing, Networking and Communications
(ICNC), 2013 International Conference on (pp. 927-931). IEEE.
[13] FCC. (2013, June). Local telephone competition: Status as of June30, 2012.
[14] FCC. (2014, June). FCC releases new data on Internet access services and local telephone
competition.
[15] Vijayakumar, M., Karthikeyani, V., & Omar, M. (2013). Implementation of queuing
algorithm in multipath dynamic routing architecture for effective and secured data transfer in
34. VoIP. International Journal of Engineering Trends and Technology, 4(4), 1226-1230.
[16] Gray, R. M. (2005). The 1974 origins of VoIP. Signal Processing Magazine, IEEE, 22(4), 87-
90.
[17] Vlaovic, B., & Brezocnik, Z. (2001, July). Packet based telephony. InEUROCON'2001,
Trends in Communications, International Conference on. (Vol. 1, pp. 210-213). IEEE.
[18] Bridova, I., Vaculik, M., & Brida, P. (2011). Impact of background traffic on VoIP QoS
parameters in GPON upstream link. Electronics and Electrical Engineering.–Kaunas:
Technologija, (1), 104.
[19] Naeem, M., Naz, S., & Asghar, S. (2013). QoS guarantee for VOIP over wireless LANs.
International Journal of Hybrid Information Technology, 6(3), 25-32.
[20] Mohammed, H. A., Ali, A. H., & Mohammed, H. J. (2013). The affects of different queuing
algorithms within the router on QoS VoIP application using OPNET. arXiv preprint
arXiv:1302.1642.
[21] Rivas, F. J., Díaz, A., & Merino, P. (2013). Obtaining more realistic cross-layer QoS
measurements: A VoIP over LTE Use Case. Journal of Computer Networks and Communications,
2013.
[22] Mahajan, S., & Chopra, V. (2013). Performance evaluation of MANET routing protocols with
scalability using QoS metrics of VOIP applications. International Journal, 3(2).
[23] Chen, J. J., Lee, L., & Tseng, Y. C. (2011). Integrating SIP and IEEE 802.11 e to support
handoff and multi-grade QoS for VoIP-over-WLAN applications. Computer Networks, 55(8),
1719-1734.
[24] Miraz, M. H., Molvi, S. A., Ali, M., Ganie, M. A., & Hussein, A. H. (2017). Analysis of QoS
of VoIP traffic through WiFi-UMTS networks. arXiv preprint arXiv:1708.05068.
[25] Charonyktakis, P., Plakia, M., Tsamardinos, I., & Papadopouli, M. (2016). On user-centric
modular qoe prediction for voip based on machine-learning algorithms. IEEE Transactions on
mobile computing, 15(6), 1443-1456.
[26] Silva, S., Soares, S., Reis, M. J., Neves, F., & Assuncao, P. A. (2017, July). A dynamic
programming algorithm to select optimal high-priority voice segments using Arduino. In IEEE
EUROCON 2017- 17th International Conference on Smart Technologies (pp. 271-276). IEEE.
[27] Baharudin, M. A. B., Quang, T. M., & Kamioka, E. (2015). Improvement of handover
performance based on bio-inspired approach with received signal strength and mean opinion score.
Arabian Journal for Science and Engineering, 40(6), 1623-1636.
[28] ITU-T. (1996). Methods for objective and subjective assessment of quality. ITU-T
Recommendation, 830.
[29] Al-Sayyed, R., Pattinson, C., & Dacre, T. (2007, February). VoIP and database traffic
coexistence over IEEE 802.11 b WLAN with redundancy. In Proceedings of the International
Conference on Computer, Information and Systems Science and Engineering (pp. 25-27).
35. [30] Vijayakumar, M., Karthikeyani, V., & Omar, M. (2013). Implementation of queuing
algorithm in multipath dynamic routing architecture for effective and secured data transfer in
VoIP. International Journal of Engineering Trends and Technology, 4(4), 1226-1230.
[31] Chen, S., Wang, X., & Jajodia, S. (2006). On the anonymity and traceability of peer-to-peer
VoIP calls. IEEE Network, 20(5), 32-37.
[32] Ahmed, D. T., & Shirmohammadi, S. (2012). Improving online gaming experience using
location awareness and interaction details. Multimedia Tools and Applications, 61(1), 163-180.
[33] Englander, M. (2012). The interview: Data collection in descriptive phenomenological human
scientific research*. Journal of Phenomenological Psychology, 43(1), 13-35.
[34] Martinek, R., & Zidek, J. (2012). Application of synthetic instrumentation that applies the
trend of software-based approach for measuring on the field of modern wireless transfer systems.
International Journal of Digital Information and Wireless Communications (IJDIWC), 2(3), 208-
221.
[35] Creswell, J. (2013). Qualitative inquiry and research design: choosing among five approaches.
Los Angeles: SAGE Publications.
[36] Raychaudhuri, D., Seskar, I., Ott, M., Ganu, S., Ramachandran, K., Kremo, H., ... & Singh,
M. (2005, March). Overview of the ORBIT radio grid testbed for evaluation of nextgeneration
wireless network protocols. In Wireless Communications and Networking Conference, 2005 IEEE
(Vol. 3, pp. 1664- 1669). IEEE.