Christos Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado
{"title":"Long Range Based IoT Search and Rescue System, a Human-Computer Interaction Preliminary Study and Implementation","authors":"Christos Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado","doi":"10.37256/cnc.1120231753","DOIUrl":"https://doi.org/10.37256/cnc.1120231753","url":null,"abstract":"Nowadays, IoT has been introduced in different aspects of our lives giving solutions to several problems, one of which is the Search and Rescue (SAR) operations. People that suffer from dementia or people with disease in the autism spectrum tend to elope from their caretaker’s attention, a fact that can lead to serious problems. Thus, a system that takes into consideration of the multiple requirements is of paramount importance. In this paper, a LoRa based SAR system is proposed in order to help in the localization of people with high risk of going missing. In contrast to most of the related systems, in this research article a different approach has been followed. Instead of focusing on the technology, in our approach a human-centered design has been used, leveraging the knowledge of Human-Computer Interaction (HCI) domain. Thus, the technologies used, are an outcome of the initial study. Finally, the system is evaluated using heuristic evaluation and questionnaires.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86570100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. H. Sackey, Michael Ansong, S. N. Kofie, Abdul Karim Armahy
{"title":"Energy Efficient Linear and Non-Linear Precoders for Massive MIMO Systems","authors":"S. H. Sackey, Michael Ansong, S. N. Kofie, Abdul Karim Armahy","doi":"10.47277/ijcncs/8(8)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(8)1","url":null,"abstract":"The term Massive MIMO means, Massive multiple input multiple output also known as (large-scale antenna system, very large MIMO). Massive Multiple-Input-MultipleOutput (MIMO) is the major key technique for the future Fifth Generation (5G) of mobile wireless communication network due to its characteristics, elements and advantages. Massive MIMO will be comprised of five major elements; antennas, electronic components, network architectures, protocols and signal processing. We realize that precoding technique is a processing technique that utilizes Channel State Information Technique (CSIT) by operating on the signals before transmitting them. This technique varies base on the type of CSIT and performance criterion. Precoding technique is the last digital processing block at the transmitting side. In this paper, linear and non-linear Precoding technique was reviewed and we proposed two techniques under each that is Minimum Mean Square Error (MMSE), Block Diagonalization (BD), Tomlinson-Harashima (TH) and Dirty paper coding (DPC). Four Precoding techniques: MMSE, BD, DPC and TH were used in the studies to power consumption, energy efficiency and area throughput for single-cell and multi-cell scenarios. In comparing the proposed techniques, in terms of energy efficiency and area throughput, reuse factor (Reuse 4) performs better than other techniques when there is an imperfect CSI is used","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48503049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Javeed, U. MohammedBadamasi, C. Ndubuisi, F. Soomro, M. Asif
{"title":"Man in the Middle Attacks: Analysis, Motivation and Prevention","authors":"D. Javeed, U. MohammedBadamasi, C. Ndubuisi, F. Soomro, M. Asif","doi":"10.47277/ijcncs/8(7)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(7)1","url":null,"abstract":"Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44006369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tampering Reveal Technique for Iris Images","authors":"Rasha Thabit, J. Ali, Doaa Subhi","doi":"10.47277/ijcncs/8(6)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(6)1","url":null,"abstract":"Nowadays, many biometric based security systems depend on the iris images for authentication because of their features and ease of use. However, storing and sharing these sensitive images through open access networks will expose them to tampering. In order to ensure the safety of the iris images, this paper presents a new tampering reveal technique based on watermarking in the transform domain. In the proposed technique, the iris region is selected and isolated using interactive segmentation process (ISA). The authentication bits have been generated from the iris region (IR) and embedded in the Slantlet transform coefficients of the remaining part of the iris image which has been named as non-iris region (NIR). The use of ISA ensures the intactness of IR because it has been excluded from the embedding process. Several experiments have been conducted to test the visual quality, capacity, payload, and the tampering reveal performance. The experiments proved the ability of the proposed technique to reveal and localize any tampering in IR, in addition, the difference between the original iris image and the watermarked iris image is imperceptible","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43096220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Community Development Training with Eco-print Training Wukirsari Village,\u0000 Sleman District, Indonesia","authors":"T. Mardiana, A. Warsiki, Sucahyo Heriningsih","doi":"10.47277/ijcncs/8(4)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(4)1","url":null,"abstract":"This community empowerment aims to explore the natural potential of the\u0000 village of Wukirsari, Sleman Regency, as well as develop the villages\u0000 creative economy through ecoprint training, as a vehicle for the villages\u0000 creative economy based on leaf potential. The training method using various\u0000 references and empowering the community to make ecoprints was followed by 15\u0000 mothers who were representatives of the joint business group. The results of\u0000 this community empowerment produce village potential namely leaves, and\u0000 training approaches by studying the conditions and rural life of, with, and\u0000 by village communities. The concept of the ecoprint training approach\u0000 emphasizes community involvement in all activities. The community is\u0000 involved in the planners and implementers of the ecoprint training program\u0000 and not just as an audience in ecoprint making training. The results of the\u0000 ecoprint training are expected to increase the creative economy that has the\u0000 potential to be developed by villagers, as a form of participation in\u0000 building village businesses, and to be able to provide welfare for the\u0000 residents of their village","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47374924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}