N. Raza, Muhammad Umar Aftab, Muhammad Akbar, O. Ashraf, Muhammad Irfan
{"title":"Mobile Ad-Hoc Networks Applications and Its Challenges","authors":"N. Raza, Muhammad Umar Aftab, Muhammad Akbar, O. Ashraf, Muhammad Irfan","doi":"10.4236/CN.2016.83013","DOIUrl":"https://doi.org/10.4236/CN.2016.83013","url":null,"abstract":"Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of autonomous collection \u0000of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.). Network is self-configured to reconstruct \u0000its topology and routing table information for the exchange of data packets on the joining \u0000and leaving of each node on ad-hoc basis. This paper is based on the MANET applications and \u0000challenges. The researchers can get the overall concept of MANET as well as its applications and \u0000challenges.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"12 1","pages":"131-136"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81976927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing Perceived Importance in the Middle Eastern Firms: The Cases of Jordan, Saudi Arabia and United Arab Emirates from the Operational Level","authors":"R. Masa’deh","doi":"10.4236/CN.2016.83011","DOIUrl":"https://doi.org/10.4236/CN.2016.83011","url":null,"abstract":"Firms need cloud computing adoption for strategic and competitive goals, generating business value, and at last gaining competitive advantage. This study reviews the literature regarding cloud computing and IT governance, and presents a research model along with its hypotheses formulation to examine the factors impacting cloud computing perceived importance in several Arab firms, specifically Jordan, Saudi Arabia and United Arab Emirates by using the integration of Technology Acceptance Model (TAM) model and Technology-Organizational-Environmental (TOE) framework as adapted from [1]. 329 returned surveys from top, middle-level IT managers, and IT employees from the operational level of the studied firms were analyzed using the structural equation modeling technique. The study found relative advantage, compatibility, complexity, organizational readiness, top management commitment, and training and education as important variables for impacting cloud computing adoption using perceived ease of use and perceived usefulness as mediating variables. The model explained 61%, 63%, and 74% of cloud computing adoption for perceived usefulness, perceived ease of use and perceived importance respectively.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"22 1","pages":"103-117"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88107256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Osama Rababah, A. K. Hwaitat, D. A. Qudah, R. Halaseh
{"title":"Hybrid Algorithm to Evaluate E-Business Website Comments","authors":"Osama Rababah, A. K. Hwaitat, D. A. Qudah, R. Halaseh","doi":"10.4236/CN.2016.83014","DOIUrl":"https://doi.org/10.4236/CN.2016.83014","url":null,"abstract":"Online reviews are considered of an important indicator for users to decide on the activity they wish to do, whether it is watching a movie, going to a restaurant, or buying a product. It also serves businesses as it keeps tracking user feedback. The sheer volume of online reviews makes it difficult for a human to process and extract all significant information to make purchasing choices. As a result, there has been a trend toward systems that can automatically summarize opinions from a set of reviews. In this paper, we present a hybrid algorithm that combines an auto-summarization algorithm with a sentiment analysis (SA) algorithm, to offer a personalized user experiences and to solve the semantic-pragmatic gap. The algorithm consists of six steps that start with the original text document and generate a summary of that text by choosing the N most relevant sentences in the text. The tagged texts are then processed and then passed to a Naive Bayesian classifier along with their tags as training data. The raw data used in this paper belong to the tagged corpus positive and negative processed movie reviews introduced in [1]. The measures that are used to gauge the performance of the SA and classification algorithm for all test cases consist of accuracy, recall, and precision. We describe in details both the aspect of extraction and sentiment detection modules of our system.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"46 1","pages":"137-143"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83957320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Automated Approach for Software Fault Detection and Recovery","authors":"A. Hudaib, H. Fakhouri","doi":"10.4236/CN.2016.83016","DOIUrl":"https://doi.org/10.4236/CN.2016.83016","url":null,"abstract":"Autonomic software recovery enables software to automatically detect and recover software faults. This feature makes the software to run more efficiently, actively, and reduces the maintenance time and cost. This paper proposes an automated approach for Software Fault Detection and Recovery (SFDR). The SFDR detects the cases if a fault occurs with software components such as component deletion, replacement or modification, and recovers the component to enable the software to continue its intended operation. The SFDR is analyzed and implemented in parallel as a standalone software at the design phase of the target software. The practical applicability of the proposed approach has been tested by implementing an application demonstrating the performance and effectiveness of the SFDR. The experimental results and the comparisons with other works show the effectiveness of the proposed approach.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"211 1","pages":"158-169"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76499686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Low-Load QoS Routing Method for OpenFlow Networks","authors":"Shinnosuke Kimura, Kenya Sato","doi":"10.4236/CN.2016.83015","DOIUrl":"https://doi.org/10.4236/CN.2016.83015","url":null,"abstract":"As the volume of Internet traffic continues to grow, there is a need for mechanisms that ensure \u0000communication quality that is suitable for different applications. OpenFlow implements per-flow \u0000routing control but can have adverse effects on communication quality when the number of flow \u0000entries is increased. In this study, we propose a routing method that controls traffic flows by labeling \u0000them with numbers representing the source switch, destination switch and required communication \u0000quality. The OpenFlow controller then sets up flow entries on a per-label basis rather \u0000than on a per-flow basis, allowing it to reduce the number of flow entries. In an evaluation test, we \u0000confirmed that the labeling method could prevent this reduction in communication quality.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"30 1","pages":"144-157"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90790958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Reusability Classification and Predication Using Self-Organizing Map (SOM)","authors":"A. Hudaib, Ammar Huneiti, Islam M. Othman","doi":"10.4236/CN.2016.83018","DOIUrl":"https://doi.org/10.4236/CN.2016.83018","url":null,"abstract":"Due to rapid development in software industry, it was necessary to reduce time and efforts in the \u0000software development process. Software Reusability is an important measure that can be applied \u0000to improve software development and software quality. Reusability reduces time, effort, errors, \u0000and hence the overall cost of the development process. Reusability prediction models are established \u0000in the early stage of the system development cycle to support an early reusability assessment. \u0000In Object-Oriented systems, Reusability of software components (classes) can be obtained \u0000by investigating its metrics values. Analyzing software metric values can help to avoid developing \u0000components from scratch. In this paper, we use Chidamber and Kemerer (CK) metrics suite in order \u0000to identify the reuse level of object-oriented classes. Self-Organizing Map (SOM) was used to \u0000cluster datasets of CK metrics values that were extracted from three different java-based systems. \u0000The goal was to find the relationship between CK metrics values and the reusability level of the \u0000class. The reusability level of the class was classified into three main categorizes (High Reusable, \u0000Medium Reusable and Low Reusable). The clustering was based on metrics threshold values that \u0000were used to achieve the experiments. The proposed methodology succeeds in classifying classes \u0000to their reusability level (High Reusable, Medium Reusable and Low Reusable). The experiments \u0000show how SOM can be applied on software CK metrics with different sizes of SOM grids to provide \u0000different levels of metrics details. The results show that Depth of Inheritance Tree (DIT) and \u0000Number of Children (NOC) metrics dominated the clustering process, so these two metrics were \u0000discarded from the experiments to achieve a successful clustering. The most efficient SOM topology \u0000[2 × 2] grid size is used to predict the reusability of classes.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"499 1","pages":"179-192"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85513010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Osama Harfoushi, A. H. Akhorshaideh, N. Aqqad, Marwa Na’el Khalil Al Janini, Ruba Obiedat
{"title":"Factors Affecting the Intention of Adopting Cloud Computing in Jordanian Hospitals","authors":"Osama Harfoushi, A. H. Akhorshaideh, N. Aqqad, Marwa Na’el Khalil Al Janini, Ruba Obiedat","doi":"10.4236/CN.2016.82010","DOIUrl":"https://doi.org/10.4236/CN.2016.82010","url":null,"abstract":"The purpose of this study is to examine the different factors that are expected to influence the intention of hospitals to adopt cloud computing in Jordan. This study is conducted using quatititative methodology. 223 questionnaires were distributed to the IT departments of different hospitals to evaluate their ability and willingness to adopt cloud computing. The data were tested using multiple regression in order to determine whether Technology, Organizational, and Environmental factors (TOE) played a role in hospitals’ decision to consider cloud computing as a beneficial investment. The findings of this study showed that all the factors had a significant positive impact on the intention of hospitals to adopt cloud computing, with the Technological factor having the most impact on the decision made.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"121 1","pages":"88-101"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75867714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection Strategies against Cascading Failure for Power Systems of Ring Network","authors":"Arun K. Kumar, H. Y. Shwe, P. Chong","doi":"10.4236/CN.2016.82008","DOIUrl":"https://doi.org/10.4236/CN.2016.82008","url":null,"abstract":"Power grid vulnerability is a key issue with large blackouts, causing power disruption for millions of people. The complexity of power grid, together with excessive number of components, makes it difficult to be modeled. Currently, researchers use complex networks to model and study the performance of power grids. In fact, power grids can be modeled into a complex network by making use of ring network topology, with substations and transmission lines denoted as nodes and edges, respectively. In this paper, three protection schemes are proposed and their effectiveness in protecting the power network under high and low-load attacks is studied. The proposed schemes, namely, Cascaded Load Cut-off (CLC), Cascaded Load Overflow (CLO) and Adaptive-Cascaded Load Overflow (A-CLO), improve the robustness of the power grids, i.e., decrease the value of critical tolerance. Simulation results show that CLC and CLO protection schemes are more effective in improving the robustness of networks than the A-CLO protection scheme. However, the CLC protection scheme is effective only at the expense that certain percentage of the network will have no power supply. Thus, results show that the CLO protection scheme dominates the other protection schemes, CLC and A-CLO, in terms of the robustness of the network, improved with the precise amount of load cut-off determined.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"97 1","pages":"67-78"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85064224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Colluding Jamming Attack on a Grand Coalition by Aggrieved Nodes","authors":"A. Sharah, T. Oyedare, S. Shetty","doi":"10.4236/CN.2016.82007","DOIUrl":"https://doi.org/10.4236/CN.2016.82007","url":null,"abstract":"Mobile Ad-Hoc Networks (MANETs) are highly vulnerable to insider jamming \u0000attacks. Several approaches to detect insider jammers in MANET have been \u0000proposed. However, once the insider jammer is detected and removed from the \u0000network, it is possible for the insider jammer to leverage the knowledge of \u0000insider information to launch a future attack. In this paper, we focus on collaborative \u0000smart jamming attacks, where the attackers who have been detected as insider jammers \u0000in a MANET, return to attack the MANET based on the knowledge learned. The \u0000MANET uses a reputation-based coalition game to detect insider jammers. In the \u0000collaborative smart jamming attack, two or more smart jammers will form a \u0000coalition to attack the coalitions in the MANET. The smart jammers were \u0000detected and then excluded from their initial coalition, they then regrouped to \u0000start their own coalition and share previously gained knowledge about \u0000legitimate nodes in their erstwhile coalition with the aim of achieving a \u0000highly coordinated successful jamming attack on the legitimate coalition. The \u0000success of the attack largely depends on the insider jammer’s collective \u0000knowledge about the MANET. We present a technique to appropriately represent \u0000knowledge gathered by insider jammers which would lead to a successful attack. \u0000Simulation results in NS2 depict that coalition of jammers can leverage past \u0000knowledge to successfully attack MANET.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"20 1","pages":"57-66"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82422625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Load Sensitive Power Saving Technique for 4G Mobile Network under Limited User Traffic","authors":"M. Hossain, Mohammad Imdadul Islam, M. Amin","doi":"10.4236/CN.2016.82009","DOIUrl":"https://doi.org/10.4236/CN.2016.82009","url":null,"abstract":"Power saving is one of the key factors of emerging 4G mobile network as well as in IEEE 802.16e \u0000wireless metropolitan area networks (Wireless MAN). An efficient power saving mechanism is the \u0000heart for the guarantee of a long operating lifetime for a mobile subscriber station (MS), because \u0000MSs are normally driven by rechargeable batteries. It is a vital factor for Base Station (BS) of the \u0000same network. One of the most important features of 5G mobile is the extension of battery energy \u000010 times greater than the present days. In this context, the evaluation of duration of sleep mode of \u0000BS or MS based on traffic load of a network is now a new era of research work. In this paper, such \u0000analysis has been done based on two statistical models: Poisson’s pdf and Engset pdf. The concept \u0000of complete sharing and partitioning of user group of teletraffic engineering is applied to measure \u0000the possibility of getting leisure time of BS or MS. Both the traffic models used in the paper are applicable \u0000in both limited and unlimited user network, i.e. in micro and fem to cellular network of 4G \u0000and 5G.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"47 1","pages":"79-87"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86309997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}