2015 World Symposium on Computer Networks and Information Security (WSCNIS)最新文献

筛选
英文 中文
Impact of imperfect channel estimation on successive group interference cancellation techniques 不完全信道估计对连续群干扰消除技术的影响
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368291
O. Abu-Ella, M. Elmusrati
{"title":"Impact of imperfect channel estimation on successive group interference cancellation techniques","authors":"O. Abu-Ella, M. Elmusrati","doi":"10.1109/WSCNIS.2015.7368291","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368291","url":null,"abstract":"In this paper we study the effect of the channel estimation error on the performance of successive group decoding (SGD) schemes. The contribution of this paper is to evaluate the performance of such systems in the interference MIMO channel environment. Precisely, we aim to assess the sensitivity of such decoding techniques to the imperfect estimation of the channel state information (CSI). The system reliability will be judged using the evaluation of bit error rate (BER) performance. The results of this paper clearly show the critical importance of the accuracy of channel estimation for the receive side group-based interference cancellation (SGIC) schemes.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129674672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of routing protocols in uniform and normal node distributions using inter-mesh wireless networks 网格间无线网络中均匀和正态节点分布下路由协议的性能评估
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368292
Nombuso Sibeko, P. Mudali, O. Oki, Akingbesote Alaba
{"title":"Performance evaluation of routing protocols in uniform and normal node distributions using inter-mesh wireless networks","authors":"Nombuso Sibeko, P. Mudali, O. Oki, Akingbesote Alaba","doi":"10.1109/WSCNIS.2015.7368292","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368292","url":null,"abstract":"Wireless Mesh Networks (WMNs) is a promising technology which has a potential of providing inexpensive solutions to a wide range of applications. These networks have been applied in the context of home, community, and enterprise scenarios. The nodes in these application scenarios can be distributed either in a uniform or normal fashion. The key issue is for the network to continuously manage and share the resources regardless of the node location within the network. However, it is not clear how individual node position relative to the Internet gateway and network's center affect the wireless mesh network's performance. Hence, this research paper evaluates AODV, OLSR, and HWMP routing protocols in normal and uniform node distribution in inter-mesh wireless networks. Three performance metrics were considered; throughput, packet delivery ratio, and end to end delay.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122055109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IEEE 802.11p performance evaluation at different driving environments 不同驾驶环境下的IEEE 802.11p性能评估
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368286
Abduladhim Ashtaiwi, Ali Altayesh, Khairai Belghet
{"title":"IEEE 802.11p performance evaluation at different driving environments","authors":"Abduladhim Ashtaiwi, Ali Altayesh, Khairai Belghet","doi":"10.1109/WSCNIS.2015.7368286","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368286","url":null,"abstract":"Vehicular Ad hoc Networks (VANET) is an part of future Intelligent Transportation System (ITS) that enables vehicles and roadside units to communicate with each other. Different driving environments, i.e., downtown, residential, and suburban, have different roads topology and characteristics. Downtown environment is mostly characterized with cluttered dense obstacles, residential is characterized with more open spaces mixed with scattered obstacles, while suburban environment is mostly characterized with open spaces. These different characteristics of different driving environments have direct impact on vehicle's degrees-of-mobility, the communication channel, and on the routing protocol classes used. Selecting the right radio propagation model and the routing category for each driving environment is very crucial to achieve reliable performance evaluation of IEEE 802.11p. In the work, using VanetMobiSim tool we create different driving environment models that have all the micro and macro driving details. For each created driving environment we examine the effect of using different radio propagation models (i.e., two-ray ground, Shadowing, or Nakagami) and routing protocol classes (i.e., proactive or reactive routing protocols) on the performance evaluation of IEEE 802.11p. We conclude that obtained results are more valid when radio propagation model and routing protocol classes are paired with the proper driving environment.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121546921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptanalysis of a Hill cipher using genetic algorithm 用遗传算法分析Hill密码
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368278
A. S. Al-Khalid, Alaa O. Al-Khfagi
{"title":"Cryptanalysis of a Hill cipher using genetic algorithm","authors":"A. S. Al-Khalid, Alaa O. Al-Khfagi","doi":"10.1109/WSCNIS.2015.7368278","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368278","url":null,"abstract":"A Genetic algorithm is a search tool that's used to insure high probability of finding a solution by decreasing the amount of time in key space searching. In this paper the focus will be on the cryptanalysis of a Hill cipher by using genetic algorithm and study the algorithm factors that affect finding solution taking in consideration the time and efficiency of the cryptanalysis process, the Different type of crossover, population size and mutation rate that used to find the optimal solution.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Adapting the artificial bee colony metaheuristic to optimize image multilevel thresholding 采用人工蜂群元启发式算法优化图像多级阈值
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368298
Mariem Miledi, S. Dhouib
{"title":"Adapting the artificial bee colony metaheuristic to optimize image multilevel thresholding","authors":"Mariem Miledi, S. Dhouib","doi":"10.1109/WSCNIS.2015.7368298","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368298","url":null,"abstract":"The main idea of this paper is to adapt the Artificial Bee Colony metaheuristic to solve the problem of multilevel thresholding for image segmentation. More precisely, this method is exploited to optimize two maximizing functions namely the between-class variance (the Otsu's function) and the entropy thresholding (the Kapur's function). This leads, respectively, to two versions of the ABC metaheuristic: the ABC-Otsu and the ABC-Kapur. The robustness and proficiency of these two thresholding algorithms are demonstrated by applying them on a set of well-known benchmark images. Furthermore, the experimental results show the efficiency of these two thresholding methods.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130730753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security operations center — A need for an academic environment 安全操作中心-需要一个学术环境
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368297
Lubna Aijaz, B. Aslam, Umar Khalid
{"title":"Security operations center — A need for an academic environment","authors":"Lubna Aijaz, B. Aslam, Umar Khalid","doi":"10.1109/WSCNIS.2015.7368297","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368297","url":null,"abstract":"Academic Institutes are considered as a backbone of any country. Security of its information resources (academic and research) is of paramount importance. The statistics have shown that academic institutions are among the top three targets for cybercrimes. There are many security steps that are taken by institutes to address this challenge. Firewalls, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are some of the security controls that are deployed to circumvent these threats. However, the sophistication and novelty in the attacks make the normal security procedures inadequate. To fulfill the changing requirements of information security, the institutes need to invest in developing the Security Operation Centers (SOC). SOC is a comprehensive infrastructure that works in tandem with Computer Security Incident Response Team (CSIRT) to manage the security operations of the organization. SOC can provide better coordinated security and rapid response against threats and vulnerabilities throughout the networks. This paper highlights the need of establishing a SOC in academic institutes.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The effect of network traffic on Duplicate Address Detection in wireless ad-hoc networks 无线自组织网络中网络流量对重复地址检测的影响
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368304
Murimo Bethel Mutanga, M. Adigun, Tarirai Chani
{"title":"The effect of network traffic on Duplicate Address Detection in wireless ad-hoc networks","authors":"Murimo Bethel Mutanga, M. Adigun, Tarirai Chani","doi":"10.1109/WSCNIS.2015.7368304","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368304","url":null,"abstract":"While much effort has been put in the development of IP new address auto-configuration protocols for wireless ad-hoc networks, very little has been done in testing how different network conditions affect the performance of these protocols. Conditions such as network topology, mobility etc, have been found to have an effect on routing protocol performance. As a result more robust routing protocols are being designed. Just like routing protocols, auto configuration protocols are also affected by different network conditions. Inorder to design robust protocols, investigations on how different network conditions affect the performance of auto configuration protocols are thus important. In this paper, we investigate the effects of network traffic on Duplicate Address Detection. Address uniqueness, communication overhead and latency were used for analysis. In our simulation, we considered the performance of strongDAD under three different types of network traffic: Pareto, Exponential and CBR.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116962155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effect of color spaces on video segmentation performances 色彩空间对视频分割性能的影响
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368293
Wajdi Farhat, H. Faiedh, C. Souani, K. Besbes
{"title":"Effect of color spaces on video segmentation performances","authors":"Wajdi Farhat, H. Faiedh, C. Souani, K. Besbes","doi":"10.1109/WSCNIS.2015.7368293","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368293","url":null,"abstract":"Color segmentation is a preliminary step in many application computer vision systems today, as the detection of human movement, recognition of road traffic signs and video intelligent. Detection stage performance is therefore closely linked to the results obtained from the color segmentation. Detection and recognition automatic road traffic signs are applied in the color spaces RGB, HSV, and HSI. We present in this paper a comparative study on the color detection of road signs by thresholding according to the color spaces: RGB, HSV and HSI We proceed after that to verify the results of the detection rate and false detection rate obtained for each color space. The results have been validated on video under different lighting conditions.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129447638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Plagiarism detection using free-text fingerprint analysis 利用自由文本指纹分析进行抄袭检测
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368306
Mohamed Elkhidir, Mohannad Ibrahim, T. A. Khalid, S. Ibrahim, M. Awadalla
{"title":"Plagiarism detection using free-text fingerprint analysis","authors":"Mohamed Elkhidir, Mohannad Ibrahim, T. A. Khalid, S. Ibrahim, M. Awadalla","doi":"10.1109/WSCNIS.2015.7368306","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368306","url":null,"abstract":"Plagiarism generally defined as using other people's ideas or work and representing it as one's own original work. Free-text plagiarism detection is an application based on analyzing the texts contained in researches, thesis, scientific reports and also literary products, these analyzed data will be used to compare a group of documents to find out how much these documents are similar. This paper proposes a Free Text Plagiarism Detection Software (FTPDS); which is a software tool that uses documents' fingerprints to detect the likelihood that the documents are plagiarized from each other. The system is able to detect plagiarism between two given documents, given document and group of local documents, and between given document and online available documents. Agile software methodology was used to develop the software and some open source libraries were manipulated and used to search the internet and read PDF documents respectively. The speed of the detection process, the inaccurate detection of the same file and the lag of online search and downloading are stated as future work aspects. Source in this paper means the suspected document which we want to detect the amount of plagiarized data contained in it. The target is the document which is probably the document where the author plagiarized the data from it and claimed that heshe owns that data.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117237950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Democratic multi-robot exploration: New method to compute Particle Swarm Optimizations' global best parameter 民主多机器人探索:计算粒子群优化全局最优参数的新方法
2015 World Symposium on Computer Networks and Information Security (WSCNIS) Pub Date : 2015-09-01 DOI: 10.1109/WSCNIS.2015.7368299
O. Moslah, Yassine Hachaichi, Younes Lahbib, Raed Kouki, A. Mami
{"title":"Democratic multi-robot exploration: New method to compute Particle Swarm Optimizations' global best parameter","authors":"O. Moslah, Yassine Hachaichi, Younes Lahbib, Raed Kouki, A. Mami","doi":"10.1109/WSCNIS.2015.7368299","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368299","url":null,"abstract":"In multi-robot exploration operation, each robot has to continuously decide which place to move next, after exploring their current location. In this paper we use the extended version of Particle Swarm Optimization (PSO) to robotic application, which is referred to as Robotic Particle Swarm Optimization (RPSO), a technique to compute robots' new location. To better adapt this technique to the collective exploration problem, and maximize the exploring area, we used a new method for computing PSOs' global best parameter. Experiment results obtained in a simulated environment show that our new method of computing PSOs' global best parameter increase the explored area.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126298992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信