H. A. S. S. Noorfatimah, H. M. J. Norhuraizah, S. Suresh, B. M. B. Nurafiqah
{"title":"Application of Cloud Technology in the Management of Electronic Payslips-Brunei Case Study","authors":"H. A. S. S. Noorfatimah, H. M. J. Norhuraizah, S. Suresh, B. M. B. Nurafiqah","doi":"10.7763/JACN.2014.V2.129","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.129","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"68 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131924150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. .. Kishk, N. Messiha, N. El-Fishawy, Abdelrahman A. Elkafs, A. Madian
{"title":"Channel Encryption in Wireless Camera Sensor Network","authors":"A. .. Kishk, N. Messiha, N. El-Fishawy, Abdelrahman A. Elkafs, A. Madian","doi":"10.7763/JACN.2014.V2.95","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.95","url":null,"abstract":"Data security is one of the greatest problems in Wireless Camera Sensor Network. Many encryption algorithms are used for encryption purposes. A new encryption algorithm is proposed in this paper. It depends on three secret parameters and four key-updating processes. It is compared with other encryption algorithm depending on key-updating beside Chaos encryption algorithm. Correlation Coefficient (CC), Spatial Frequency )SF(, processing time, and histogram are the metrics used for comparison purpose.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132110227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Implementation of Rate-Adaptive IPTV System on DSP","authors":"Yen-Jen Chen, Chih-Chung Wang, Jr-Jen Huang","doi":"10.7763/JACN.2013.V1.3","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.3","url":null,"abstract":"Abstract—This paper proposes an implementation of rate-adaptive IPTV system on DSP. The system has a client-server based architecture. The server-side and client-side are communicated with network socket connection. The server-side hosting on the DSP platform encodes the video signal from the TV cable. The client-side using JavaScript Language decodes and plays the multimedia video of DSP server-side instantly. The video quality mechanism is controlled by network bandwidth detection to improve the video play quality. The client-side detects the used bandwidth of the video stream from the server-side. The bandwidth utilization information is sent to the server-side to adjust the video encoding rate. The DSP platform used for this work is TMS320DM6437 EVM, produced by TI, implementing H.264 and AAC Encoders. The Encoder program uses the codec source code wrapped by TI, which conforms to the xDAIS (eXpress DSP Algorithm Interoperability Standard), and it is integrated with TI DSP network developer's kit and TV tuner to implement a TV over the Internet with the channel selection control.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132115108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Programming for Minimal Cost Topology with Reliability Constraint","authors":"Basima Elshqeirat, S. Soh, S. Rai, M. Lazarescu","doi":"10.7763/JACN.2013.V1.57","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.57","url":null,"abstract":"This paper addresses an NP-hard problem, called NTD-CR, to design a minimal-cost communication network topology that satisfies a pre-defined reliability constraint. Since reliability is always a major issue in the network design, the problem is practical for critical applications requiring minimized cost. The paper formulates a dynamic programming (DP) scheme to solve NTD-CR problem. DP approach, called DPCR-ST, generates the topology using a selected set of spanning trees of the network, STXmin. We propose three greedy heuristics to generate and order only k spanning trees of the network. Each heuristic allows DPCR-ST to enumerate STXmin using only k spanning trees, which improves the time complexity while producing near optimal topology. Simulations based on fully connected networks that contain up to 2.3×109 spanning trees show the merits of ordering methods and the effectiveness of our algorithm vis-a-vis four existing state-of-the-art techniques; DPCR-ST produces 81.5% optimal results, while using only 0.77% of the spanning trees contained in network.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129996031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fatma E.-Z. A. Elgamal, N. A. Hikal, F. Abou-Chadi
{"title":"A Trust Management Scheme for Sharing Secure Medical Images over Cloud Computing Environment","authors":"Fatma E.-Z. A. Elgamal, N. A. Hikal, F. Abou-Chadi","doi":"10.7763/JACN.2013.V1.40","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.40","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130223268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Data Collection Capability in a Large-Scale Smart Metering System Based on Receiver-Driven Multihop Communication","authors":"M. Sugano, Taichi Shimizu, N. Wakamiya","doi":"10.7763/JACN.2013.V1.62","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.62","url":null,"abstract":"We consider a large-scale smart metering system based on intermittent receiver driven transmission and potential-based routing, both of which have been developed for wireless sensor networks. In this paper, we evaluate the performance of such a system by simulations and show that it is possible to collect 99% of data within 10 minutes in a system of 1600 nodes.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132686111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods Used in Computer-Assisted Bone Age Assessment of Children","authors":"S. Aydoğdu, F. Basçiftçi","doi":"10.7763/JACN.2014.V2.73","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.73","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132580174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Satomi Honda, Yuki Unno, Koji Maruhashi, M. Takenaka, S. Torii
{"title":"Detection of Novel-Type Brute Force Attacks Used Ephemeral Springboard IPs as CamouflageDetection of Novel-Type Brute Force Attacks Used Ephemeral Springboard IPs as Camouflage","authors":"Satomi Honda, Yuki Unno, Koji Maruhashi, M. Takenaka, S. Torii","doi":"10.7763/JACN.2014.V2.126","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.126","url":null,"abstract":"In recent years, the way of brute force attacks has become more tactical and tricky to avoid being detected by intrusion detection or prevention systems (IDS/IPS). In this paper, we show that we have detected three organized or systematic brute force attack instances from actual network monitoring logs by visualization focused on source IPs and detection time. One of the instances shows that specific terminals have been attacked used innumerable IPs for a long time. These IPs were like ephemeral because they had appeared almost only one time. We also propose a new system, DEMITASSE, for detecting such terminals in the earlier phase and mitigating the damage caused by brute force attacks used ephemeral IPs. We conduct feasibility studies with our logs and evaluate DEMITASSE can detect and mitigate that kind of attacks effectively.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127830617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of H.264 Video Transmission Network Simulation","authors":"W. Lei, Hao Zheng, Wei Zhang","doi":"10.18178/JACN.2015.3.4.180","DOIUrl":"https://doi.org/10.18178/JACN.2015.3.4.180","url":null,"abstract":"To design and implement the network simulation scenario of H.264 video service based on OMNeT++ simulation platform can provide testing, validation and evaluation method for the key technologies, such as to evaluate the QoE (Quality of Experience) of network video service, to evaluate multipath transport control mechanism. Based on H.264 codec standard and RTP payload structure, real-time transmission mechanisms for H.264 video transmission frame is studied. Based on standard host structure of INET Framework, three logical entities are designed, including user agent, relay controller and relay server. The topology structure of simulation networks and logical entities are described by network description language (NED). The key is to design and implement RTP node to support H.264 service. RTP node realizes sending and receiving module in INET Framework. By importing video files and relevant configuration files, simulation of H.264 service based on OMNeT++ is conducted. The effect of delay and packet loss on quality of H.264 video session is evaluated by different network configuration parameters.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117239779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}