IJCNIS Vol. 10, No. 8, Aug. 2018
Cover page and Table of Contents: PDF (size: 175KB)
The knowledge of bandwidth in communication networks can be useful in various applications. Some popular examples are validation of service level agreements, traffic engineering and capacity planning support, detection of congested or underutilized links, optimization of network route selection, dynamic server selection for downloads and visualizing network topologies, to name just a few. Following these various motivations, a variety of bandwidth estimation techniques and tools have been proposed in the last decade and still, several new ones are currently being introduced. They all show a wide spectrum of different assumptions, characteristics, advantages and limitations. In this paper, the bandwidth estimation literature is reviewed, with focus on introducing four specific bandwidth-related metrics including capacity, available bandwidth, achievable throughput and bulk transfer capacity (BTC); describing the main characteristics, strengths and weaknesses of major bandwidth estimation techniques as well as classifying the respective tool implementations. Also, the fundamental challenges, practical issues and difficulties faced by designing and implementing bandwidth estimation techniques are addressed.[...] Read more.
The Internet is a communication network where two or more than two users communicate and exchange the data. Black hole attack is a security threat in which a malicious node drops some or all of the packets. The proposed framework implements a biometric authentication system into the communication network to verify the user and to save the user from any internal or external threat. The main objective is to integrate the biometric security with the communication network. The attack is supposed to be a Black hole which has been considered as a smart attack. Feature extraction of Fingerprint dataset will be done using minutiae extractor. This will extract ridge endings and ridge bifurcation from the thinned image. Genetic algorithm is usedto reduce the features to useful pool. If the user is authentic only then prevention mechanism against black hole is applied. Genetic Algorithm is used to find out black hole node based on the fitness function. Proposed model’s performance is evaluated using various metrics like delay, throughput, energy consumption and packet delivery ratio.[...] Read more.
The biswapped network hyper hexa-cell is recently reported optoelectronic network architecture for delivering excellent performance especially for mapping numerical problems which demands frequent routing and broadcasting. This network contains some important benefits such as smaller diameter, higher bisection width, and lower network’s total and optical cost as compared to counter-part OTIS hyper hexa-cell network. It is also advantageous as compared to the traditional biswapped network mesh containing smaller diameter and higher minimum node degree. In this paper, we present a parallel algorithm for mapping prefix sum of data elements on a dh-dimensional biswapped network hyper hexa-cell of processors (assuming each processor contain single data element). It demands total + 10 intra-cluster (electronic) and 3 inter-cluster (optical) moves.[...] Read more.
The issue of Crimes been committed in our society these days has become an issue that every government and the society in general has to be concerned with. Stolen of vehicle has increased tremendously and sometimes such vehicle are used in committing criminal activities such as armed robbery, kidnapping and of recent insurgency as it is been witness in some part of Nigeria. In view of these challenges, adequate provision or records of stolen, identified and recovered vehicle are not readily available and as such very important. The development of vehicle movement notification and location is one of the solutions to vehicles owner in order to ensure speedy notification, identification and recovery of their vehicles and as well reduce criminal activities in the society. The system uses a developed application installed in a mobile phone device which will be embedded in a vehicle to notify the owner when the vehicle is driven by unauthorized user. A GSM mobile phone was used to communicate with the vehicle owner whereby the user sends SMS to communicate with the mobile phone sensor installed in the vehicle. A web application was also developed to determine the real-time vehicle location and as well as record of database information system of found or missing vehicles. The system was test run and the results obtained shows how effectiveness is it in determining vehicle movement, location and notification as it is been driven within or outside its jurisdiction.[...] Read more.
A solution for water factories in Vietnam using automatic meter reading technology is proposed in this paper. The water meters and water quality meters for water factories in Vietnam have been designed and prototyped. Water meters differ from conventional meters in that they record the water consumption and communicate that information back to the water suppliers for monitoring and billing without the need for manual readings. Water quality meters monitor multiple parameters relating to water quality such as pH, electro-conductivity, temperature, etc., and transmit these parameters to a server via GPRS network. Therefore, customers and water suppliers can monitor the water consumption, water quality parameters from anywhere via the Internet. This project has been conducted in a water factory located in Thai Nguyen Province, Vietnam. The results have shown that the consideration of this solution has been operated well in the real condition in Vietnam.[...] Read more.
Mobile ad-hoc network or MANET is an auto-organizing network of mobile nodes. It lacks centralized control and is connected by wireless links. One of the many benefits of MANETs is that it can be utilized where there is no proper infrastructural support for wireless access and wired backbone is not possible. One major drawbacks of MANET is that as it is an infracture-less network, created on the fly, so here each node also functions as a router. So, each node participates in the routing of packets and information along the network. Due to this feature in MANETs, it is convenient to attack one of the nodes of MANET and then organize an attack on the whole network. To, secure the routing protocols in MANETs there are already a number of security features included in many of the unicast and multicast routing protocols. Like the use of unique signature and the use of secured algorithmic approach to secure against the various network layer routing attacks in MANETs. In this paper it is proposed that the use of hashing and secured algorithmic approaches like, Alpha Numeric Routing, when combined can introduce a unique security feature to On-Demand Routing protocols both in its multicast and unicast avatars. Some comparison, is done in the end of the new approach combines with the existing approaches by only using, Alpha Numeric Reflex Routing Algorithm. The outcome of the implementation was as expected, the results satisfied the input algorithms. Last but not the least analysis of the results is done and there is a discussion about the obtained results.[...] Read more.
Malware is a worldwide epidemic and studies suggest that with the evolution of internet it is getting even worse. There is a new virus implemented every minute and various relevant strategies and tactics have been proposed to alleviate and eradicate cyber threats. Therefore, major concern for the researchers today is to detect and mitigate such programs. In this paper an effort has been made to propose a system which will detect some dangerous viruses and some features of the recently emerged new form of malware in cyberspace known as Ransomware. Imposing serious threats to information assets protection ransomware victimizes the internet users by hijacking user files, encrypting them, then demanding a ransom to be paid in exchange of the decryption key. The proposed program aims to scan the system to get hold of all vulnerable files present on the system and to detect the malicious one’s and remove them.[...] Read more.