Murat Berk, Onder Aycicek, Ismail Ay, Seda Gonenc, S. Tosun
{"title":"Number Analysis and Operator Detection in Telecommunication Systems","authors":"Murat Berk, Onder Aycicek, Ismail Ay, Seda Gonenc, S. Tosun","doi":"10.1109/ISNCC.2019.8909154","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909154","url":null,"abstract":"In telecommunication systems, if there is a call (voice or short message) from one operator to another, the called number must be analyzed to determine its destination operator and to check if it has enough credit to start this call. This process must be very fast to reduce the switching cost of the call. Considering the dynamically updated number portability list and bulk calls, the number analysis process may take too much time, resulting in call drops. In this study, we present a number analysis system that is developed in order to start bulk calls in the fastest way. The developed system is able to detect the operators of the numbers by scanning both the continuously updated number potability list and the number data base having a large number of entries. In our experiments, we compared the proposed method with the classical relational database inquiry methods in terms of response times. We achieved 177X speed up for the analysis of thousand numbers. Reducing the number analysis times brought significant reductions in forwarding costs.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127482135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Matching-Theoretic Approach to Distributed SWIPT in Ad-Hoc Wireless Networks","authors":"M. W. Baidas, Masoud M. Afghah, F. Afghah","doi":"10.1109/ISNCC.2019.8909121","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909121","url":null,"abstract":"This paper studies the problem of stable node matching for distributed simultaneous wireless information and power transfer in multi-user amplify-and-forward (AF) ad-hoc wireless networks. Particularly, each source node aims to be paired with another node that acts an AF relay to forward its signal to the destination, such that the achievable rate is improved, in return for some payment. In turn, a matching-theoretic solution based on the one-to-one Stable Marriage Matching game is considered, and a distributed polynomial-time complexity algorithm is proposed to pair each source node with its best potential relaying node based on the power-splitting ratios. Simulation results are presented to validate the proposed matching algorithm, and show that it yields sum-utility and sum-payment that are comparable to those of centralized schemes, with the added merits of low-complexity, and network stability.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131191553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Employing a Continuous Measurement Process During Digital Tool Validation","authors":"Nicolas Hughes, Khaled Rabieh, A. Aydogan","doi":"10.1109/ISNCC.2019.8909102","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909102","url":null,"abstract":"As digital forensic laboratories face regulation and seek accreditation, examiners must fully validate the software and hardware used during forensic analysis. Tool validation is critical to any laboratory science as it provides analysts the empirical data necessary to draw conclusions about how laboratory instruments perform in realistic conditions. While digital forensic tools perform many common tasks, few robust validation methods exist for evaluating how tools perform those tasks. Developing validation methods that are feasible and robust is critical to both establishing digital forensics as a reliable discipline and accreditation requirements. This paper proposes a more comprehensive model of tool validation by taking continuous measurements a tool validation process. This continuous measurement process could later be repeated over all the scenarios that lab would expect to encounter in day-to-day operations. We attempt to determine whether or not a continuous model provides the sort of data necessary for empirical analysis of a digital forensic tool. Moreover, we propose a fully automated model for tool validation, permitting researchers to concentrate on validation study design rather than performing time-consuming, error-prone tasks on the test platform.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117261980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A High capacity Double-Layer Gray Code Based Security Scheme for Secure Data Embedding","authors":"Ghadir Mostafa, Wassim Alexan","doi":"10.1109/ISNCC.2019.8909192","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909192","url":null,"abstract":"With the recent amelioration in digital communication and cloud storage, security remains a concern. Even though cryptographic algorithms have been readily used, they have been proved to be vulnerable to brute force and side channels attacks. Hence an additional security layer must be integrated to overcome the suspicion introduced by cryptography which is only concerned with the secrecy of the transmitted data. Adjacently, steganography tackles the secrecy of communication in the first place and hence a hybrid double layer security scheme that integrates both systems safeguards the data in terms of secrecy and imperceptibility. In this paper, we propose a double layer blind reversible security scheme which deploys Blowfish encryption as a cryptographic layer followed by a least significant bit image steganographic layer which spreads the encrypted secret data required to be transmitted over the pixels of an image cover medium. Our scheme also spreads the data again over the color channels of the pixels selected for embedding according to a gray code sequence. In order to judge the performance of our proposed scheme, the values of peak signal to noise ratio, mean squared error and structural similarity index have been computed and compared to other least significant bit schemes in the literature. The proposed scheme has been proved superior in terms of capacity, imperceptibility and computational complexity.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132019706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Swapna Chintakunta, K. R. Rao, P. Nkwari, K. Ouahada
{"title":"Low-cost sensor using a dsPIC for measuring a specific heat capacity of liquids","authors":"Swapna Chintakunta, K. R. Rao, P. Nkwari, K. Ouahada","doi":"10.1109/ISNCC.2019.8909086","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909086","url":null,"abstract":"This paper describes a low-cost sensor using a microcontroller dsPIC30F6014A. A simple method to measure the specific heat capacity of liquids using transient technique. A sensor has been designed to measure time and temperature accurately which in turn lead to the measurement of the specific heat capacity of liquids. To test the proposed solution in the present work, different liquids have been used include organic compounds, inorganic compounds and polymers. The results obtained using our sensor have been validated using data available in the literature.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115258838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Exploratory Data Analytics Platform for Factories of Future","authors":"E. Zeydan, Ömer Dedeoglu","doi":"10.1109/ISNCC.2019.8909119","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909119","url":null,"abstract":"Factories of Future (FoF) is an emerging vertical sector towards 5G network evolution. Fine-grained monitoring the network performance of FoF environment can help to extract insight on the quality-of-service (QoS) of a given industrial service provided by next generation cellular technologies. However, one of the main solutins that mobile network operators (MNOs) are investing today is on data evaluation tools that can be integrated withing their network infrastructure. In this paper using the open-source analytics tools, we analyze the industrial network traffic characteristics behaviour of an operational cellular network of a MNO. Our results finds out the relationship between various key performance indicators (KPIs) and extract insights on the performance and operational aspects of a factory environment using the cellular networks data with ElasticSearch stack's data analytics capabilities.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126370343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of Multi-Beam Interference Impact on State-of-Polarization OCDMA Optical Networks","authors":"N. Tarhuni","doi":"10.1109/ISNCC.2019.8909165","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909165","url":null,"abstract":"Optical Code Division Multiple Access (OCDMA) is a promising technology for efficiently sharing resource of future optical networks among multiple nodes while managing the unavoidable Multiple Beam Interference (MBI). MBI arises when multiple users share the optical channel concurrently using signature codes. In this work, we investigate the impact of MBI on OCDMA network based on State of Polarization (SOP) encoding. The signature codes rotate the beam SOP for each node attached to the optical network. The considered signature codes are the asynchronous Gold code set and the Synchronous Hadamard code set. It is well known that conventional CDMA systems provide significant processing gain improvement in terms of the required Signal to Noise Ratio SNR, to achieve a given Bit Error Rate (BER) performance for single node transmission. However, the performance deteriorates as more active concurrent nodes transmit on shared channel. Interestingly, we show that the BER performance improves as number of active nodes increases when synchronous Hadamard code set is used as the signature waveform. To the best of our knowledge, this is a novel behavior in OCDMA systems. For instance, it is found that, by using intensive numerical simulations, a Hadamard code set of length 32 chips at a fixed SNR of −4 dB, the BER drops from~~ 10−2 for a single user scenario to ~~ 10−6 for 32 concurrent users, i.e., a four order of magnitude improvement in BER performance.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124424715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quadrature Spatial Modulation OFDM System Performance in the Presence of High Power Amplifier Nonlinearities","authors":"A. A. Ashqar, R. Mesleh","doi":"10.1109/ISNCC.2019.8909100","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909100","url":null,"abstract":"This paper proposes a combination between quadrature spatial modulation (QSM) multiple-input multiple-output (MIMO) system and orthogonal frequency division multiplexing (OFDM) aiming to benefit from their superior inherent advantages. The proposed system uses multiple transmit antennas and applies QSM technique on the different OFDM sub-carriers transmitted from the multiple antennas. Therefore, at each frequency sub-carrier, one antenna will be transmitting a real part of the modulated symbol and another or the same antenna will be transmitting the imaginary part of that symbol. As such, many of the transmitted sub-carriers in one OFDM symbol will be un-modulated and transmitting no data, which promises major reduction in the peak to average power ratio (PAPR). Typical OFDM systems generally suffer from high PAPR, which causes major performance degradation in the presence of high power amplifier (HPA) nonlinearities. It is revealed, in this paper, that the proposed system achieves superior performance as compared to it's spatial modulation and spatial multiplexing counterpart systems. Analytical analysis on the overall bit error probability is provided and corroborated through Monte Carlo simulation results.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125287923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"It is Probably Me: A Bayesian Approach to Weighting Digital Identity Sources","authors":"Juanita Blue, J. Condell, T. Lunney","doi":"10.1109/ISNCC.2019.8909201","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909201","url":null,"abstract":"As human-kind becomes increasingly dependent on online services to conduct the fundamental aspects of daily life, digital footprints and the associated online service digital identities have the capacity to provide verification that an individual is a ‘real person’ and possesses a true identity. A recognized challenge in utlising this data in this manner is that different types of online services possess different levels of reliability. This paper explores the application of naïve Bayes theorem to subsets of attributes contained within various types of online accounts that are presented as ‘identity sources’. This seeks to demonstrate that less reliable sources such as social media accounts will produce lower trust scores than more reliable sources following application of Bayes theorem. The results for which will be used to determine if digital identity sources can be relied upon in place of traditional paper identification documentation. This research and testing has been conducted as an element of a larger intelligent identity authentication system that seeks to create a solution that proves an identity is genuine via an individual's digital footprint.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130108873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-adapting Linear Network Coding Emulation","authors":"N. B. Coelho, F. A. Monteiro, Rui J. Lopes","doi":"10.1109/ISNCC.2019.8909124","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909124","url":null,"abstract":"Linear network coding (LNC) introduced a new paradigm for routing data across networks where the transported packets are not the original information packets but rather linear combinations of the original packets. This is known to allow a more efficient use of the network resources. With LNC based on systematic network codes, the network's capacity is chiefly defined by the rank of the end-to-end equivalent transfer matrix. This paper presents a network-layer emulator based on the obj ect-oriented programming paradigm, which allows, for any network topology, to have the network's capacity self-optimized by adapting the coding operations performed at each node, depending on the impact the changes have on the global rank of the global transfer matrix, and on a metric related to the use of network's resources.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132594440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}