{"title":"Impact of imperfect channel estimation on successive group interference cancellation techniques","authors":"O. Abu-Ella, M. Elmusrati","doi":"10.1109/WSCNIS.2015.7368291","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368291","url":null,"abstract":"In this paper we study the effect of the channel estimation error on the performance of successive group decoding (SGD) schemes. The contribution of this paper is to evaluate the performance of such systems in the interference MIMO channel environment. Precisely, we aim to assess the sensitivity of such decoding techniques to the imperfect estimation of the channel state information (CSI). The system reliability will be judged using the evaluation of bit error rate (BER) performance. The results of this paper clearly show the critical importance of the accuracy of channel estimation for the receive side group-based interference cancellation (SGIC) schemes.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129674672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nombuso Sibeko, P. Mudali, O. Oki, Akingbesote Alaba
{"title":"Performance evaluation of routing protocols in uniform and normal node distributions using inter-mesh wireless networks","authors":"Nombuso Sibeko, P. Mudali, O. Oki, Akingbesote Alaba","doi":"10.1109/WSCNIS.2015.7368292","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368292","url":null,"abstract":"Wireless Mesh Networks (WMNs) is a promising technology which has a potential of providing inexpensive solutions to a wide range of applications. These networks have been applied in the context of home, community, and enterprise scenarios. The nodes in these application scenarios can be distributed either in a uniform or normal fashion. The key issue is for the network to continuously manage and share the resources regardless of the node location within the network. However, it is not clear how individual node position relative to the Internet gateway and network's center affect the wireless mesh network's performance. Hence, this research paper evaluates AODV, OLSR, and HWMP routing protocols in normal and uniform node distribution in inter-mesh wireless networks. Three performance metrics were considered; throughput, packet delivery ratio, and end to end delay.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122055109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abduladhim Ashtaiwi, Ali Altayesh, Khairai Belghet
{"title":"IEEE 802.11p performance evaluation at different driving environments","authors":"Abduladhim Ashtaiwi, Ali Altayesh, Khairai Belghet","doi":"10.1109/WSCNIS.2015.7368286","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368286","url":null,"abstract":"Vehicular Ad hoc Networks (VANET) is an part of future Intelligent Transportation System (ITS) that enables vehicles and roadside units to communicate with each other. Different driving environments, i.e., downtown, residential, and suburban, have different roads topology and characteristics. Downtown environment is mostly characterized with cluttered dense obstacles, residential is characterized with more open spaces mixed with scattered obstacles, while suburban environment is mostly characterized with open spaces. These different characteristics of different driving environments have direct impact on vehicle's degrees-of-mobility, the communication channel, and on the routing protocol classes used. Selecting the right radio propagation model and the routing category for each driving environment is very crucial to achieve reliable performance evaluation of IEEE 802.11p. In the work, using VanetMobiSim tool we create different driving environment models that have all the micro and macro driving details. For each created driving environment we examine the effect of using different radio propagation models (i.e., two-ray ground, Shadowing, or Nakagami) and routing protocol classes (i.e., proactive or reactive routing protocols) on the performance evaluation of IEEE 802.11p. We conclude that obtained results are more valid when radio propagation model and routing protocol classes are paired with the proper driving environment.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121546921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of a Hill cipher using genetic algorithm","authors":"A. S. Al-Khalid, Alaa O. Al-Khfagi","doi":"10.1109/WSCNIS.2015.7368278","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368278","url":null,"abstract":"A Genetic algorithm is a search tool that's used to insure high probability of finding a solution by decreasing the amount of time in key space searching. In this paper the focus will be on the cryptanalysis of a Hill cipher by using genetic algorithm and study the algorithm factors that affect finding solution taking in consideration the time and efficiency of the cryptanalysis process, the Different type of crossover, population size and mutation rate that used to find the optimal solution.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adapting the artificial bee colony metaheuristic to optimize image multilevel thresholding","authors":"Mariem Miledi, S. Dhouib","doi":"10.1109/WSCNIS.2015.7368298","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368298","url":null,"abstract":"The main idea of this paper is to adapt the Artificial Bee Colony metaheuristic to solve the problem of multilevel thresholding for image segmentation. More precisely, this method is exploited to optimize two maximizing functions namely the between-class variance (the Otsu's function) and the entropy thresholding (the Kapur's function). This leads, respectively, to two versions of the ABC metaheuristic: the ABC-Otsu and the ABC-Kapur. The robustness and proficiency of these two thresholding algorithms are demonstrated by applying them on a set of well-known benchmark images. Furthermore, the experimental results show the efficiency of these two thresholding methods.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130730753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security operations center — A need for an academic environment","authors":"Lubna Aijaz, B. Aslam, Umar Khalid","doi":"10.1109/WSCNIS.2015.7368297","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368297","url":null,"abstract":"Academic Institutes are considered as a backbone of any country. Security of its information resources (academic and research) is of paramount importance. The statistics have shown that academic institutions are among the top three targets for cybercrimes. There are many security steps that are taken by institutes to address this challenge. Firewalls, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are some of the security controls that are deployed to circumvent these threats. However, the sophistication and novelty in the attacks make the normal security procedures inadequate. To fulfill the changing requirements of information security, the institutes need to invest in developing the Security Operation Centers (SOC). SOC is a comprehensive infrastructure that works in tandem with Computer Security Incident Response Team (CSIRT) to manage the security operations of the organization. SOC can provide better coordinated security and rapid response against threats and vulnerabilities throughout the networks. This paper highlights the need of establishing a SOC in academic institutes.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The effect of network traffic on Duplicate Address Detection in wireless ad-hoc networks","authors":"Murimo Bethel Mutanga, M. Adigun, Tarirai Chani","doi":"10.1109/WSCNIS.2015.7368304","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368304","url":null,"abstract":"While much effort has been put in the development of IP new address auto-configuration protocols for wireless ad-hoc networks, very little has been done in testing how different network conditions affect the performance of these protocols. Conditions such as network topology, mobility etc, have been found to have an effect on routing protocol performance. As a result more robust routing protocols are being designed. Just like routing protocols, auto configuration protocols are also affected by different network conditions. Inorder to design robust protocols, investigations on how different network conditions affect the performance of auto configuration protocols are thus important. In this paper, we investigate the effects of network traffic on Duplicate Address Detection. Address uniqueness, communication overhead and latency were used for analysis. In our simulation, we considered the performance of strongDAD under three different types of network traffic: Pareto, Exponential and CBR.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116962155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of color spaces on video segmentation performances","authors":"Wajdi Farhat, H. Faiedh, C. Souani, K. Besbes","doi":"10.1109/WSCNIS.2015.7368293","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368293","url":null,"abstract":"Color segmentation is a preliminary step in many application computer vision systems today, as the detection of human movement, recognition of road traffic signs and video intelligent. Detection stage performance is therefore closely linked to the results obtained from the color segmentation. Detection and recognition automatic road traffic signs are applied in the color spaces RGB, HSV, and HSI. We present in this paper a comparative study on the color detection of road signs by thresholding according to the color spaces: RGB, HSV and HSI We proceed after that to verify the results of the detection rate and false detection rate obtained for each color space. The results have been validated on video under different lighting conditions.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129447638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Elkhidir, Mohannad Ibrahim, T. A. Khalid, S. Ibrahim, M. Awadalla
{"title":"Plagiarism detection using free-text fingerprint analysis","authors":"Mohamed Elkhidir, Mohannad Ibrahim, T. A. Khalid, S. Ibrahim, M. Awadalla","doi":"10.1109/WSCNIS.2015.7368306","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368306","url":null,"abstract":"Plagiarism generally defined as using other people's ideas or work and representing it as one's own original work. Free-text plagiarism detection is an application based on analyzing the texts contained in researches, thesis, scientific reports and also literary products, these analyzed data will be used to compare a group of documents to find out how much these documents are similar. This paper proposes a Free Text Plagiarism Detection Software (FTPDS); which is a software tool that uses documents' fingerprints to detect the likelihood that the documents are plagiarized from each other. The system is able to detect plagiarism between two given documents, given document and group of local documents, and between given document and online available documents. Agile software methodology was used to develop the software and some open source libraries were manipulated and used to search the internet and read PDF documents respectively. The speed of the detection process, the inaccurate detection of the same file and the lag of online search and downloading are stated as future work aspects. Source in this paper means the suspected document which we want to detect the amount of plagiarized data contained in it. The target is the document which is probably the document where the author plagiarized the data from it and claimed that heshe owns that data.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117237950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Moslah, Yassine Hachaichi, Younes Lahbib, Raed Kouki, A. Mami
{"title":"Democratic multi-robot exploration: New method to compute Particle Swarm Optimizations' global best parameter","authors":"O. Moslah, Yassine Hachaichi, Younes Lahbib, Raed Kouki, A. Mami","doi":"10.1109/WSCNIS.2015.7368299","DOIUrl":"https://doi.org/10.1109/WSCNIS.2015.7368299","url":null,"abstract":"In multi-robot exploration operation, each robot has to continuously decide which place to move next, after exploring their current location. In this paper we use the extended version of Particle Swarm Optimization (PSO) to robotic application, which is referred to as Robotic Particle Swarm Optimization (RPSO), a technique to compute robots' new location. To better adapt this technique to the collective exploration problem, and maximize the exploring area, we used a new method for computing PSOs' global best parameter. Experiment results obtained in a simulated environment show that our new method of computing PSOs' global best parameter increase the explored area.","PeriodicalId":253256,"journal":{"name":"2015 World Symposium on Computer Networks and Information Security (WSCNIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126298992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}