Journal of Computer Networks and Communications最新文献

筛选
英文 中文
Long Range Based IoT Search and Rescue System, a Human-Computer Interaction Preliminary Study and Implementation 远程物联网搜救系统——人机交互的初步研究与实现
IF 2
Journal of Computer Networks and Communications Pub Date : 2022-11-11 DOI: 10.37256/cnc.1120231753
Christos Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado
{"title":"Long Range Based IoT Search and Rescue System, a Human-Computer Interaction Preliminary Study and Implementation","authors":"Christos Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado","doi":"10.37256/cnc.1120231753","DOIUrl":"https://doi.org/10.37256/cnc.1120231753","url":null,"abstract":"Nowadays, IoT has been introduced in different aspects of our lives giving solutions to several problems, one of which is the Search and Rescue (SAR) operations. People that suffer from dementia or people with disease in the autism spectrum tend to elope from their caretaker’s attention, a fact that can lead to serious problems. Thus, a system that takes into consideration of the multiple requirements is of paramount importance. In this paper, a LoRa based SAR system is proposed in order to help in the localization of people with high risk of going missing. In contrast to most of the related systems, in this research article a different approach has been followed. Instead of focusing on the technology, in our approach a human-centered design has been used, leveraging the knowledge of Human-Computer Interaction (HCI) domain. Thus, the technologies used, are an outcome of the initial study. Finally, the system is evaluated using heuristic evaluation and questionnaires.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86570100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Linear and Non-Linear Precoders for Massive MIMO Systems 大规模MIMO系统的节能线性和非线性预编码器
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-08-30 DOI: 10.47277/ijcncs/8(8)1
S. H. Sackey, Michael Ansong, S. N. Kofie, Abdul Karim Armahy
{"title":"Energy Efficient Linear and Non-Linear Precoders for Massive MIMO Systems","authors":"S. H. Sackey, Michael Ansong, S. N. Kofie, Abdul Karim Armahy","doi":"10.47277/ijcncs/8(8)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(8)1","url":null,"abstract":"The term Massive MIMO means, Massive multiple input multiple output also known as (large-scale antenna system, very large MIMO). Massive Multiple-Input-MultipleOutput (MIMO) is the major key technique for the future Fifth Generation (5G) of mobile wireless communication network due to its characteristics, elements and advantages. Massive MIMO will be comprised of five major elements; antennas, electronic components, network architectures, protocols and signal processing. We realize that precoding technique is a processing technique that utilizes Channel State Information Technique (CSIT) by operating on the signals before transmitting them. This technique varies base on the type of CSIT and performance criterion. Precoding technique is the last digital processing block at the transmitting side. In this paper, linear and non-linear Precoding technique was reviewed and we proposed two techniques under each that is Minimum Mean Square Error (MMSE), Block Diagonalization (BD), Tomlinson-Harashima (TH) and Dirty paper coding (DPC). Four Precoding techniques: MMSE, BD, DPC and TH were used in the studies to power consumption, energy efficiency and area throughput for single-cell and multi-cell scenarios. In comparing the proposed techniques, in terms of energy efficiency and area throughput, reuse factor (Reuse 4) performs better than other techniques when there is an imperfect CSI is used","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48503049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Man in the Middle Attacks: Analysis, Motivation and Prevention 中路进攻:分析、动机与预防
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-07-31 DOI: 10.47277/ijcncs/8(7)1
D. Javeed, U. MohammedBadamasi, C. Ndubuisi, F. Soomro, M. Asif
{"title":"Man in the Middle Attacks: Analysis, Motivation and Prevention","authors":"D. Javeed, U. MohammedBadamasi, C. Ndubuisi, F. Soomro, M. Asif","doi":"10.47277/ijcncs/8(7)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(7)1","url":null,"abstract":"Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44006369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Tampering Reveal Technique for Iris Images 虹膜图像的篡改显示技术
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-06-30 DOI: 10.47277/ijcncs/8(6)1
Rasha Thabit, J. Ali, Doaa Subhi
{"title":"Tampering Reveal Technique for Iris Images","authors":"Rasha Thabit, J. Ali, Doaa Subhi","doi":"10.47277/ijcncs/8(6)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(6)1","url":null,"abstract":"Nowadays, many biometric based security systems depend on the iris images for authentication because of their features and ease of use. However, storing and sharing these sensitive images through open access networks will expose them to tampering. In order to ensure the safety of the iris images, this paper presents a new tampering reveal technique based on watermarking in the transform domain. In the proposed technique, the iris region is selected and isolated using interactive segmentation process (ISA). The authentication bits have been generated from the iris region (IR) and embedded in the Slantlet transform coefficients of the remaining part of the iris image which has been named as non-iris region (NIR). The use of ISA ensures the intactness of IR because it has been excluded from the embedding process. Several experiments have been conducted to test the visual quality, capacity, payload, and the tampering reveal performance. The experiments proved the ability of the proposed technique to reveal and localize any tampering in IR, in addition, the difference between the original iris image and the watermarked iris image is imperceptible","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43096220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Community Development Training with Eco-print Training Wukirsari Village, Sleman District, Indonesia 印尼Sleman地区Wukirsari村的社区发展培训
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-04-30 DOI: 10.47277/ijcncs/8(4)1
T. Mardiana, A. Warsiki, Sucahyo Heriningsih
{"title":"Community Development Training with Eco-print Training Wukirsari Village,\u0000 Sleman District, Indonesia","authors":"T. Mardiana, A. Warsiki, Sucahyo Heriningsih","doi":"10.47277/ijcncs/8(4)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(4)1","url":null,"abstract":"This community empowerment aims to explore the natural potential of the\u0000 village of Wukirsari, Sleman Regency, as well as develop the villages\u0000 creative economy through ecoprint training, as a vehicle for the villages\u0000 creative economy based on leaf potential. The training method using various\u0000 references and empowering the community to make ecoprints was followed by 15\u0000 mothers who were representatives of the joint business group. The results of\u0000 this community empowerment produce village potential namely leaves, and\u0000 training approaches by studying the conditions and rural life of, with, and\u0000 by village communities. The concept of the ecoprint training approach\u0000 emphasizes community involvement in all activities. The community is\u0000 involved in the planners and implementers of the ecoprint training program\u0000 and not just as an audience in ecoprint making training. The results of the\u0000 ecoprint training are expected to increase the creative economy that has the\u0000 potential to be developed by villagers, as a form of participation in\u0000 building village businesses, and to be able to provide welfare for the\u0000 residents of their village","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47374924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cyber-attacks on Saudi Arabia Environment 对沙特阿拉伯环境的网络攻击
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-03-31 DOI: 10.47277/ijcncs/8(3)1
Rawan Abdulaziz Al-Mulhim, Lama Alzamil, Fay Mohammed Al-Dossary
{"title":"Cyber-attacks on Saudi Arabia Environment","authors":"Rawan Abdulaziz Al-Mulhim, Lama Alzamil, Fay Mohammed Al-Dossary","doi":"10.47277/ijcncs/8(3)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(3)1","url":null,"abstract":"Even though cyber-attacks can’t be compared to a nuclear attack but they both pose a serious threat to national and international security. As we witness today cyberwarfare is increasing and Saudi Arabia has become a major target of Cyber-attacks as a result of its economic and digital revolution, high technology adoption and the growth of the gas and oil industry. This paper presents, a case study of the cyber-attacks on the Saudi environment. We focused on two specific malwares Shamoon and Mamba Ransomware. It also explores their methodologies and structure for future defense.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47217888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Hybrid Dragonfly Algorithm with Modified Conjugate Gradient Method 一种改进共轭梯度法的混合蜻蜓算法
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-02-29 DOI: 10.47277/ijcncs/8(2)2
Layth Riyadh Khaleel, Ban Ahmed Mitras Prof.
{"title":"A Novel Hybrid Dragonfly Algorithm with Modified Conjugate Gradient Method","authors":"Layth Riyadh Khaleel, Ban Ahmed Mitras Prof.","doi":"10.47277/ijcncs/8(2)2","DOIUrl":"https://doi.org/10.47277/ijcncs/8(2)2","url":null,"abstract":"Dragonfly Algorithm (DA) is a meta-heuristic algorithm, It is a new algorithm proposed by Mirjalili in (2015) and it simulate the behavior of dragonflies in their search for food and migration. In this paper, a modified conjugate gradient algorithm is proposed by deriving new conjugate coefficient. The sufficient descent and the global convergence properties for the proposed algorithm are proved. Novel hybrid algorithm of the dragonfly (DA) was proposed with modified conjugate gradient Algorithm which develops the elementary society that is randomly generated as the primary society for the dragonfly optimization algorithm using the characteristics of the modified conjugate gradient algorithm. The efficiency of the hybrid algorithm was measured by applying it to (10) of the optimization functions of high measurement with different dimensions and the results of the hybrid algorithm were very good in comparison with the original algorithm.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45212044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Development of Trend Analysis of Scoring for Good Corporate Governance based on the Decree of the Ministry of State Owned Enterprises Number SK-16/S.MBU/2012 in State Owned Banks that Went Public in the Period 2013-2018 基于国有企业部令SK-16/S的良好公司治理评分趋势分析的发展2013-2018年上市国有银行MBU/2012
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-02-29 DOI: 10.47277/IJCNCS/8(2)1
Hks Negara Di Purnamasari, B. Khaleel
{"title":"The Development of Trend Analysis of Scoring for Good Corporate Governance based on the Decree of the Ministry of State Owned Enterprises Number SK-16/S.MBU/2012 in State Owned Banks that Went Public in the Period 2013-2018","authors":"Hks Negara Di Purnamasari, B. Khaleel","doi":"10.47277/IJCNCS/8(2)1","DOIUrl":"https://doi.org/10.47277/IJCNCS/8(2)1","url":null,"abstract":"The aims of this research is to evaluate the development of Trend Analysis of Good Corporate Governance Scoring based on the Decree of the Ministry of State Owned Enterprises Number SK-16/S.MBU/2012 in SOEs that went public in the next period of the earlier study in 2012, i.e. 2013-2018 (the latest financial statement at the moment). In this study we employed a population sample of SOEs in banking sector that are listed in BEI for the period 2012-2018. Therefore, this period of study is expected to reflect the actual condition on a more consistent basis from year to year. Publicly traded SOEs are selected because every company that has made public offering is required to publish its annual report in order to make its Annual Report more accessible. We can conclude that the development of scoring for Good Corporate Governance—based on the Decree of the Ministry of State Owned Enterprises Number SK16/S.MBU/2012 in State Owned Banks that went public in the period 2013-2018—follows an upward trend that put them into the Excellent category.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42767531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks 基于洪水的分布式拒绝服务攻击性能验证研究
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-01-31 DOI: 10.47277/ijcncs/8(1)1
S. Singh, Ea Bhandari, Kk Saluja, A. L. Sangal
{"title":"Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks","authors":"S. Singh, Ea Bhandari, Kk Saluja, A. L. Sangal","doi":"10.47277/ijcncs/8(1)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(1)1","url":null,"abstract":"Network technology has experienced explosive growth in the past decades. The generally accepted viewpoint in the security world is that no system or network is totally protected which makes network security an important concern. The work done in this paper focuses on Distributed Denial of Service Attacks (DDoS) where legitimate users are prevented from accessing network services. Distributed Denial of Service (DDoS) Attacks has been increasingly found to be disturbing the normal working of organizations causing billions of rupees of losses. Organizations are trying their best to reduce their losses from these systems. The focus of this paper is to providing our results of experiments in this regard for flooding based DDoS attacking in the simulation environment with NS2.35. This paper point out that the bandwidth may be more easily flooded by UDP-type attacking than by TCP-type one at different attack strength. In this paper we done the validation of DropTail and RED queue under the flooding based DDoS attack, which is better for the legitimate user under the flooding attack.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41835560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues of 5th Generation Technology: A Review 第五代技术安全问题综述
IF 2
Journal of Computer Networks and Communications Pub Date : 2020-01-01 DOI: 10.47277/ijcncs/8(9)1
A. Younas
{"title":"Security Issues of 5th Generation Technology: A Review","authors":"A. Younas","doi":"10.47277/ijcncs/8(9)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(9)1","url":null,"abstract":"In the 20th century, communication placed an important role in our life, whereas 5G technology is known to be the central area for future networking infrastructure. However, with the high pace of gigantic assaults and protection issues, users and other organizations are not quite sure of the security parameters. In this article, we spotlight the elementary security doubts of 5G Technology. A large portion of the data based on literature and studies released by famous networking giants. Consequently, the paper can illuminate it peruses on what is required from 5G Technology and what are fundamental issues in accomplishing those objects","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70809793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信