{"title":"Proposal and Evaluation of an Information Dissemination Method Based on Flooding for Energy Efficiency in Wireless Sensor Networks","authors":"Hiroki Oda, H. Hisamatsu, H. Noborio","doi":"10.7763/JACN.2014.V2.96","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.96","url":null,"abstract":"energy efficient. In this paper, we propose a new flooding method-based information dissemination method that tackles the issue of energy-efficient information dissemination in WSNs. By interpreting same message broadcasts from an adjacent node to a sending node as an acknowledgment of successful message transmission, we control message broadcasts and decrease the number of messages transmitted and received. We show by means of simulations that, in contrast to the conventional flooding method, our proposed method results in an improvement in the information delivery ratio with only a marginal increase in power consumption when packet loss probability is high. We also show that our proposed method results in less energy consumption in the overall network than the flooding method when the wireless radio range is long.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129530290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Ayoob, Sulaiman Norrozila, Muamer N. Mohammed, M. AbdilsahibGhaida
{"title":"Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs","authors":"A. Ayoob, Sulaiman Norrozila, Muamer N. Mohammed, M. AbdilsahibGhaida","doi":"10.7763/JACN.2014.V2.122","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.122","url":null,"abstract":"Communication between mobile users is becoming more popular than ever before due to the recent technological advances in wireless communication devices. Ad hoc networks are generally closed in that, it’s a collection of two or more devices equipped with wireless communications and networking capability; they do not connect to the Internet and are typically created between participants. This means that a formed network can be de-formed on-the-fly without the need for any system administration. Many routing protocol methods have been proposed in Mobile Ad-Hoc Network but still the challenges are to improve the routing performance. The DSR (Dynamic Source Routing) routing protocol dependent on the cache memory for every node to store the routing path from source to destination. This paper presented a new algorithm using DSR routing cache technique to improve the routing between mobile nodes to reduction the effect of mobility in link transmitting that can solve link broken problem. The simulation results show a low delay, stable link in routing and better performance in terms of Route Discovery Time. It indicates that DSR cache outperforms DSR standard and had a high quality of packet delivery.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130068480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oliver M. Membrere, Reynaldo M. Supan, J. Magtoto, Miles Kevin B. Galario, B. Comendador, R. Montaril
{"title":"TaAl-Lip: Application of Artificial Neural Network in Recognition of Select Tagalog Alphabet through Lip Reading","authors":"Oliver M. Membrere, Reynaldo M. Supan, J. Magtoto, Miles Kevin B. Galario, B. Comendador, R. Montaril","doi":"10.7763/JACN.2014.V2.128","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.128","url":null,"abstract":"The paper introduces TaAl–Lip: Application of Artificial Neural Network in Recognition of Select Tagalog Alphabet through Lip Reading. It is an experimental study designed to determine the accuracy of the recognition of select Tagalog alphabet or also known as the ABAKADA Alphabet. It utilized Artificial Neural Network (ANN), Computer Vision (CV), Macropixelling, and Image Processing (IP) to develop a tool that can recognize mouth’s movement by means of lip reading. After the tool was developed the degree of accuracy of the recognition of the application was evaluated by the proponents according to the: (a) light orientation; (b) viewing angle and (c) the user’s distance from the camera. Based on the experiment conducted, the researchers concluded that the mouth’s movement is most recognizable with a front side light orientation with an average of 70.34%.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing Rule on Open Source Firewall Using Content and PCRE Combination","authors":"G. B. Satrya, S. Shin","doi":"10.18178/JACN.2015.3.4.188","DOIUrl":"https://doi.org/10.18178/JACN.2015.3.4.188","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126393493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the Effect of Clustering the Training Data in Naive Bayes Classifier for Anomaly Network Intrusion Detection","authors":"U. Subramanian, H. Ong","doi":"10.7763/JACN.2014.V2.87","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.87","url":null,"abstract":"This paper presents the analysis of the effect of clustering the training data and test data in classification efficiency of Naive Bayes classifier. KDD cup 99 benchmark dataset is used in this research. The training set is clustered using k means clustering algorithm into 5 clusters. Then 8800 samples are taken from the clusters to form the training and test set. The results are compared with that of two Naive Bayes classifiers trained on random sampled data containing 8800 and 17600 instances respectively. The main contribution of this paper is that it is empirically proved that the training set derived from clusters generated by k-means clustering algorithm improves the classification efficiency of the Naive Bayes classifier. The results show the accuracy of the Naive Bayes classifier trained with clustered instances is 94.4% while that of normal instances are 85.41% and 89.26%.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126317063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMANetMS - An Intelligent Mobile Agent-Based Network Management Approach for a Real Scenario","authors":"J. Teixeira, M. J. Viamonte","doi":"10.7763/JACN.2013.V1.21","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.21","url":null,"abstract":" Abstract—Current Network Management paradigms are rigid and lack flexibility. Therefore, a new kind of management system and strategy must be provided to enhance the reliability and performance of Network Management. This paper presents the results of our work on Mobile Agent technology as a new paradigm for developing Network Management applications. Problems existing in traditional Network Management are discussed and a distributed solution is proposed. In this new approach, Mobile agents are the lead characters, in a world where networks grow in a larger and complicated way. Finally, we present the results from an implemented architecture for a real network scenario. Our efforts resulted in IMANetMS, an Intelligent Mobile Agent Network Management System.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"14 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114014209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improvement in HB-Family Lightweight Authentication Protocols for Practical Use of RFID System","authors":"Ziyi Lin, Joo-Seok Song","doi":"10.7763/JACN.2013.V1.13","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.13","url":null,"abstract":"—Radio frequency identification (RFID) is a booming technology which identifies objects automatically. As the low-cost passive tag in RFID system lacks computational, storage, power, and communication resources, lightweight authentication protocols are necessary for security and privacy issues. The HB-family has been developed since Hopper and Blum proposed the HB protocol in 2001, which is a lightweight authentication protocol for RFID system. Afterwards, many improvements have been developed based on the HB protocol, such as HB+ in 2005, HB-MP in 2007 and HB-MP+ in 2008. In this paper, we propose an improved protocol which is a secure and lightweight. We give the security and performance analysis to prove its advantages over past HB-family protocols and its practicality in reality.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122740392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of Spectral Amplitude Coding OCDMA Using Multi-identity High Power Code","authors":"A. Kandouci","doi":"10.18178/JACN.2016.4.4.228","DOIUrl":"https://doi.org/10.18178/JACN.2016.4.4.228","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131110392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent MAC and Routing Protocols for Wireless Sensor Networks","authors":"Murat Dener","doi":"10.18178/jacn.2016.4.2.218","DOIUrl":"https://doi.org/10.18178/jacn.2016.4.2.218","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131465932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Genetic Algorithm with Descendants Idea for Scheduling Tasks Graph in the Multi-Processor Architecture","authors":"Mostafa Mahi, H. Kodaz","doi":"10.7763/JACN.2014.V2.72","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.72","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132533875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}