Fapohunda K.O, Paulson Eberechukwu Numan, Zubair S, Dyaji Charles Bala, M. Fauzi, Kamaludin M. Yusof
{"title":"Bat-Inspired Hidden Node Detection Algorithm and Collision Minimization (BIHD-CM) Scheme for IEEE802.11AH","authors":"Fapohunda K.O, Paulson Eberechukwu Numan, Zubair S, Dyaji Charles Bala, M. Fauzi, Kamaludin M. Yusof","doi":"10.12785/ijcnt/060305","DOIUrl":"https://doi.org/10.12785/ijcnt/060305","url":null,"abstract":"Hidden node problem sometimes referred to as frequent packets collision that mostly leads to loss of packets is no longer new in wireless networks because it affects the previous IEEE802.11 standards. The new IEEE802.11ah standard which is also a substandard of IEEE 802.11 is no exemption. As a matter of fact, IEEE802.11ah suffers from hidden node problem more than networks (IEEE 802.11a/b/n/ac) due to their wider coverage which is up to 1km, high number of devices they can support (over 8000 nodes to one AP) and frequent simultaneous sleeping and sending of the nodes (power saving mode). A few researchers have worked on this hidden node problem in IEEE802.11ah but could not get a lasting solution to it. Therefore, this paper proposes an algorithm which detects hidden nodes and also proposes a theoretical solution based on previous works which was also experimentally verified through the BIHD-CM.","PeriodicalId":352753,"journal":{"name":"International Journal of Computing & Network Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121426830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Saeed, Noor Zaman Jhanjhi, A. Abdullah, M. Naqvi
{"title":"Current Trends and Issues Legacy Application of the Serverless Architecture","authors":"S. Saeed, Noor Zaman Jhanjhi, A. Abdullah, M. Naqvi","doi":"10.12785/IJCNT/060304","DOIUrl":"https://doi.org/10.12785/IJCNT/060304","url":null,"abstract":"Serverless computing has emerged as a new compelling paradigm for the deployment of applications and services. It represents an evolution of cloud programming models, abstractions, and platforms, and is a testament to the maturity and wide adoption of cloud technologies. In this research, we discuss the new concept in cloud computing that allows the services computation that triggers the code execution as a response for certain events. Cloud computing as provisioning more servers on demand are one of the primary issues and traffic of servers or load is not consistent. The Services are moved to the cloud and a great change is observed in all fields. People are more comfortable having their services on the Internet. As E-commerce services have reached exponential growth. The problem associated with this research is that the organization often spends huge chunks of dollars only for server provisioning, and another chunk for its security and management. As compared to serverless, the vendor serves all security and management aspects. Mostly the Online service providers are often stuck with unexpected traffic. Having more provisioned servers creates a hike in prices. There are needed to be a solution where vendors can only have to pay for the services on demand and describes serverless infrastructure, which assists to do all without taking care of these as a simple model and a simple structure. In this research, the serverless architecture service is providing the use of functions, which are on clusters and compels users “Pay as you go”, is more refined in serverless, and now is known by “Pay what is used”. It represents an evolution of cloud programming models has gained increasing attention by researchers. It concludes the impact, legacy application migration and using this new approach as standard to build the application. Serverless architecture is far greater than having a legacy approach. Its word to mouth to say serverless will prevail all others but still having the approach might take time. This is not only a cost-effective factor; rather a huge portion of service is somehow is outsource to a vendor. An extension of the restricted time limit by cloud vendors will allow running the complete workflow using the serverless architecture with avoiding the scheduling problem.","PeriodicalId":352753,"journal":{"name":"International Journal of Computing & Network Technology","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116904865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Switching of Scheduling Algorithm for Uplink LTE System","authors":"Ali Othman, S. Ameen, H. Al‐Rizzo","doi":"10.12785/ijcnt/060301","DOIUrl":"https://doi.org/10.12785/ijcnt/060301","url":null,"abstract":"Packet Scheduling (PS) is essential in Long Term Evolution (LTE) cellular system to handle huge traffic via allocating common resources among users. The main target of PS, in LTE systems, is the Radio Resource Management (RRM) by including strategies, algorithms, and schemes to control important parameters and factors such as transmit power, data rates, modulation scheme, and error coding scheme. The paper presents a performance comparison of two scheduling schemes for LTE uplink, Best Channel Quality Indicator BCQI, and Round Robin RR schedulers. Next, a new packet scheduler for uplink LTE networks, that adapts dynamically between the two mentioned packet scheduling algorithms is proposed, evaluated and compared with the performance of the two schedulers, BCQ and RR. The results of the performance, throughput, and fairness indicate that the proposed scheme gives compromise fairness between BCQI and RR in resource distributions in the LTE and maintains the system’s capacity as high as possible. The same improvement has also been observed with delay-sensitive services traffic.","PeriodicalId":352753,"journal":{"name":"International Journal of Computing & Network Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Lane keeping Controller Using Image processing","authors":"Moveh Samuel, M. Mohamad, M. Hussein, S. M. Saad","doi":"10.12785/ijcnt/060303","DOIUrl":"https://doi.org/10.12785/ijcnt/060303","url":null,"abstract":": Motivated by the need to overcome dynamic traffic congestion problems and driving safety issues, lane keeping control of vehicles has become a very active research area and is a driver-assistance vehicle feature that automatically controls a vehicle’s lateral direction at a certain look-ahead distance. This study presents the development of autonomous lane keeping controller using image processing in simulation environment and experimental setup. In the simulation study, a single tracked bicycle model was adopted as vehicle model. All simulation study of controller was based on the developed model in MATLAB environment while for experimental study; a scale vehicle was developed and used as a platform to test the lane keeping algorithm in a closed environmental setting. The lane keeping algorithm development comprises of two major parts. They are lane detection using image processing and lane keeping control. The lane detection provide important data like the lane boundaries and position of the vehicle with respect to the road and feed these data to the lane keeping controller for steering control. Proportional derivative controller (PD controller) control was developed to steer the vehicle and keep it on its lane at varying longitudinal speeds. Results in terms of stability of vehicle and maneuverability indicated that the range of values of both proportional and derivative gain altered the performance as can be seen in the simulation result and also suggested the inclusion of an Integral term I in an uncontrolled environment. The lane keeping algorithm was then implemented on the scaled vehicle and tested in a controlled environment and results indicated that the mobile robot was able to follow the desired reference trajectory by correcting the cross track error to the barest minimum. Experimental results also showed a similarity with simulations results of the mobile robot steering control","PeriodicalId":352753,"journal":{"name":"International Journal of Computing & Network Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130536694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Detection and Prevention (DAP) Framework for Abuse of cloud service threat","authors":"I. Ahmad, H. Bakht","doi":"10.12785/IJCNT/060302","DOIUrl":"https://doi.org/10.12785/IJCNT/060302","url":null,"abstract":"Cloud security mitigation techniques has not reached the level of transparency and hence, the journey of understanding and accepting cloud computing services still remains uncharted for many organizations or individuals. While mitigation techniques for different security issues are actively being researched, however, there is still insignificancy in research on Abuse of Cloud Services threat, in particular. The threat has been identified as one of the top amongst nine by Cloud Security Alliance (CSA). The study proposes a Detection and Prevention (DAP) framework with fourteen major security measures for significant areas of concern in cloud business, operational and organizational. The key benefits of the framework are: it has improved the process of registration, resource allocation and asset inventory system. It has modeled an improvised human resource system for managing information processing facilities more efficiently, along with employee inventory system and malicious insider activity index. A universal cloud APIs process has been proposed to act as an integrator and decode service providers APIs to run business seamlessly. Furthermore, strategic plan for business continuity, disaster recovery and risk assessment processes have been proposed to define policies and procedures for running business during adverse circumstances. The security measures will be validated and evaluated with existing security infrastructure in cloud. The DAP framework is fully capable of providing better security preservation to the identified threat, which could be utilized for further development in cloud security infrastructure.","PeriodicalId":352753,"journal":{"name":"International Journal of Computing & Network Technology","volume":"46 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129777887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}