{"title":"Statistical analysis of outage time of commercial telecommunication networks in Ghana","authors":"F. Oduro-Gyimah, J. Azasoo, K. Boateng","doi":"10.1109/ICASTECH.2013.6707520","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707520","url":null,"abstract":"The increasing demand by customers and the exponential growth in the telecommunication services in Ghana require a reliable telecommunication networks. To improve on the satisfaction of customers, it is incumbent on telecommunication network operators to ensure network availability. Designing resilient networks with low downtime and low recovery time is of paramount importance. This study describes a data set of daily outage measurement collected at the Network Operation Centre (NOC) from January 2012 to December 2012. A statistical analysis of the data was done to model telecommunication network availability pattern. Following the Box-Jenkins approach, Autoregressive Integrated Moving Average (ARIMA) was employed to analyze daily network outage. The study was mainly intended to forecast the telecommunication network outage duration in Ghana. The steps of model identification, parameter estimation, and diagnostic checking are performed as recommended. A model-selection strategy based on the corrected Akaike Information Criterion (AICc), Bayesian Information Criterion and Akaike Information Criterion (AIC) are adopted to determine the correct model specification. The results of the study indicate that ARIMA (2, 0, 2) model is suitable in predicting the network outage of telecommunication networks. Using five statistical indicators, namely, Root Mean Square Error (RMSE), Mean Absolute Percentage Error (MAPE), Mean Square Error (MSE), Mean Percentage Error (MPE) and Mean Absolute Error (MAE), the prediction accuracy of the proposed model is compared with the accuracies obtained with other results. The results showed that the outages and recovery time of a telecommunication network can be predicted which will help in fault management, network planning and optimization.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A quality of service aware multi-level strategy for selection of optimal web service","authors":"A. Akingbesote, M. Adigun, J. Oladosu, E. Jembere","doi":"10.1109/ICASTECH.2013.6707518","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707518","url":null,"abstract":"The Utility-Infrastructure providers serve as an intermediary between the service providers and the service consumers. The challenge of selecting optimal Web service by these service providers based on service consumer's preference using aggregate, score or degree has been tackled to a certain extent where optimal service selection is done in the context of subjective criterion alone. One major challenge being faced by these providers is the selection of optimal Web service when there are ties with the used criterion where the performance alternatives have the same score. We propose a Quality of Service aware multi-level strategy for selection of optimal Web services for Utility-Infrastructure providers. To get optimal Web service selection, the service consumer's Quality of Service preference is compared with the Web service Quality of Service offerings. The offering that best matches the Quality of Service preference is taken to be the optimal one. We consider two alternative e-Market services for our Quality of Service driven service selection: the Information services and the Complex services. We concentrate on the Information services and our model uses the non deterministic Quality of Service metrics. In our experiment, we use Web service data set Quality of Service information as our input and the experimental results show that our proposed multilevel strategy model can satisfy service consumers' request based on our non-functional requirements.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115484524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gender classification using face recognition","authors":"Terishka Bissoon, Serestina Viriri","doi":"10.1109/ICASTECH.2013.6707489","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707489","url":null,"abstract":"This paper addresses the issue of gender classification using the method of Principal Component Analysis (PCA) for face recognition and classification of human faces. The use of the PCA algorithm has a maximum success rate of 82%. The gender classification system is then improved by using the Linear Discriminant Analysis (LDA. This algorithm has a machine-learning framework by which it trains on a database and using this trained environment to predict the outcome of other images. The classification is restricted to two classes - male and female. Upon using LDA, the success rate increased to approximately 85%. The database used in this paper for the training and testing of images is called the FERET database.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123934073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new hybrid asymmetric key-exchange and visual cryptographic algorithm for securing digital images","authors":"Q. Kester, Laurent Nana, A. Pascu","doi":"10.1109/ICASTECH.2013.6707497","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707497","url":null,"abstract":"In today's cyber world where interception of data by third parties is very common, there is a demanding need for encryption of data via secured and unsecured communication networks. Sensitive digital images stored in databases, such as in the cloud, need to be encrypted. This paper proposed a hybrid method of encryption of digital images based on asymmetric encryption algorithm and a visual cryptographic algorithm. The encryption key used was based on a public key-exchange algorithm and the algorithm was implemented using MATLAB on an mxn image size.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"1815 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129720566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Renier van Heerden, H. Pieterse, I. Burke, B. Irwin
{"title":"Developing a virtualised testbed environment in preparation for testing of network based attacks","authors":"Renier van Heerden, H. Pieterse, I. Burke, B. Irwin","doi":"10.1109/ICASTECH.2013.6707509","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707509","url":null,"abstract":"Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphereESXi environment which is able to simulate: thirty workstations, ten servers, three distinct network segments and the accompanying network traffic. The VSphere environment provided added benefits, such as the ability to pause, restart and snapshot virtual computers. These abilities enabled the authors to reset the simulation environment before each test and mitigated against the damage that an attack potentially inflicts on the test network. Without simulated network traffic, the virtualised network was too sterile. This resulted in any network event being a simple task to detect, making network traffic simulation a requirement for an event detection test bed. Five main kinds of traffic were simulated: Web browsing, File transfer, e-mail, version control and Intranet File traffic. The simulated traffic volumes were pseudo randomised to represent differing temporal patterns. By building a virtualised network with simulated traffic we were able to test IDS' and other network attack detection sensors in a much more realistic environment before moving it to a live network. The goal of this paper is to present a virtualised testbedenvironmentin which network attacks can safely be tested.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125249828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilising cognitive work analysis for the design and evaluation of command and control user interfaces","authors":"Eugene Gous","doi":"10.1109/ICASTECH.2013.6707495","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707495","url":null,"abstract":"This paper reports on the design and evaluation of distributed net-centric command and control user interfaces for future air defence operations. The design was based on the Cognitive Work Analysis framework to identify the required capabilities and constraints in which the system would operate. The framework comprises of five phases that are populated using subject matter expert inputs. Each phase highlights a different facet of the work domain. Of particular interest is the final phase - Worker Competency Analysis - that is based on Rasmussen's human performance model. The model is used to capture the skills-, rules- and the knowledge-levels required by the operator. The author suggest that the model closely resembles the three levels of Situation Awareness - perception, comprehension and projection - and can be used to identify the measures with which to evaluate the developed user interface using Situation Awareness Evaluation techniques. The results are then used to scrutinise the conformance of the user interface design to its intended purpose.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131214359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Animal identification based on footprint recognition","authors":"Mohammed Nazir Alli, Serestina Viriri","doi":"10.1109/ICASTECH.2013.6707488","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707488","url":null,"abstract":"Animals can be identified using their footprints. Several features contained within an animal footprint can be used to aid in the identification of an animal. Amongst these features, the most common and most used by humans to manually identify the animal is the number and size of blobs in the footprint. Using image processing techniques an algorithm was created to segment and extract the best possible representation of the footprint which varied across color. Connected Components was then used to count the number of blobs contained within the footprint and measure the size of each blob. Using this information alone, it was found that a footprint could accurately be classified as either hoofed, padded or full print. Finally morphological feature extraction techniques were investigated to fully classify the footprint. The system implemented boasted a 97% accuracy rate.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134275530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of routing protocols performance using wireless mesh network simulation and testbed","authors":"O. Oki, P. Mudali, J. Oladosu, M. Adigun","doi":"10.1109/ICASTECH.2013.6707507","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707507","url":null,"abstract":"Wireless Mesh Network (WMN) has received considerable attention as a means to achieve connectivity in community and commercial networks. Protocols at different stack layers have varying effects both on the energy consumption and the general performance of WMN backbone nodes. Previous studies have shown that, simulations have often been used to obtain protocol performance data, but simulation results are at best an abstraction of the real world network performance. Thus, simulations often provide an unrealistic measure of protocol performance and testbed-based studies are proving more realistic. This paper analyses the performance of AODV and OLSR routing protocols in WMN using both simulation and indoor testbed. Although, the simulation and testbed results aligned with each other for Packet delivery ratio and average throughput, but the magnitude of the difference between the two results is wide. However, the simulation result contradicts that of the testbed for the lifetime. Based on the results of this study, we argue that simulation results only give a rough estimate of the real world network performance. Hence, whenever it is feasible, validating simulation results using a testbed is highly recommended in order to improve our understanding of protocol performance.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129121102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The case for cyber counterintelligence","authors":"P. Duvenage, S. von Solms","doi":"10.1109/ICASTECH.2013.6707493","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707493","url":null,"abstract":"A paradigmatic shift in thinking on cyber security in the 21st century is gaining momentum. This turn in thinking is rooted in a widening acknowledgement that conventional cyber security solutions no longer offer adequate protection in the face of threats posed by role players such as nation states, criminal syndicates, corporate spies, terrorists, hacktivists and rogue individuals. It is clear that securing cyber space depends not only on raising the bar in respect of existing measures, but also on taking proactive action focussing on threat agents. Views are, however, not so clear on what such proactive action should entail and how this should be integrated with conventional cyber security measures. Similarly, conceptual clarity is lacking on the configuration of an integrated response congruent with the challenges posed by the fast changing threatscape. The paper examines firstly the cyber threatscape and the challenges this poses. It proceeds with advancing cyber counterintelligence as a conceptual and practicable option to meeting cyber security challenges coherently and proactively. Although cyber counterintelligence is not a novel concept, it is academically under-explored as open-source literature on this subject is relatively sparse. In particular, the quest for an integrated conceptual model for cyber counterintelligence is still in its infancy. This paper does not purport to offer a refined model, but endeavours to propose a few contours useful to its construction. Compiled for a wide target audience that includes business professionals and academia, the paper is underpinned by principles and constructs derived from statutory counterintelligence theory and practice.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133080939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud-based security mechanisms for critical information infrastructure protection","authors":"B. van Niekerk, Pierre Jacobs","doi":"10.1109/ICASTECH.2013.6707515","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707515","url":null,"abstract":"In this paper the suitability of cloud-based security services (SECaaS) for critical information infrastructure protection (CIIP) is discussed. A background of cloud-based security services is provided. The suitability of these services for CIIP is discussed, and it is concluded that a mixed cloud and traditional solution is best. A model for providing cloud-based protection to critical infrastructure in this manner is proposed.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116114151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}